<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614772#M577265</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need outbound access for those devices then you use nat/global.&lt;/P&gt;&lt;P&gt;ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 First_Range MASK&lt;/P&gt;&lt;P&gt;global (outside) 1 PUBLIC_IP_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 Second_Range MASK&lt;/P&gt;&lt;P&gt;global (outside) 2 PUBLIC_IP_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, the First_Range private IPs will be translated to PUBLIC_IP_1&lt;/P&gt;&lt;P&gt;The second range will be translated to PUBLIC_IP_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand if you need inbound access, you require a STATIC NAT.&lt;/P&gt;&lt;P&gt;Static NAT is bidirectional so it will work both inbound/outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use Port Redirection in the static NAT to translate a range of private IPs to a single public IP and vice versa.&lt;/P&gt;&lt;P&gt;For inbound access, an ACL allowing the traffic is required as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 21 Dec 2010 03:47:27 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-12-21T03:47:27Z</dc:date>
    <item>
      <title>ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614771#M577264</link>
      <description>&lt;P&gt;I hope someone can point me in the correct direction here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a client that needs 4 machines with static internal addresses. He is using a remote filtering service that filters by public IP. I have set the proper NAT and Global statements I believe. The unfiltered and filtered machines are all on the same /24 subnet so I setup object-group lists with individual ip ranges for filtered and unfiltered and then created access-lists that are mapped via the NAT statements. Basically, I need client IP's 192.168.1.1-35 to be on one public IP and clients 192.168.1.130-140 on a separate public IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After setting all that up I get a SYN Timeout statement in the logs, it looks to me as if the traffic gets out but does not route back in. The second public IP I am using is available and points through our perimeter router so there is no issue there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need a static statement to translate the secondary IP in to the public side?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614771#M577264</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2019-03-11T19:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614772#M577265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need outbound access for those devices then you use nat/global.&lt;/P&gt;&lt;P&gt;ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 First_Range MASK&lt;/P&gt;&lt;P&gt;global (outside) 1 PUBLIC_IP_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 Second_Range MASK&lt;/P&gt;&lt;P&gt;global (outside) 2 PUBLIC_IP_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the above example, the First_Range private IPs will be translated to PUBLIC_IP_1&lt;/P&gt;&lt;P&gt;The second range will be translated to PUBLIC_IP_2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand if you need inbound access, you require a STATIC NAT.&lt;/P&gt;&lt;P&gt;Static NAT is bidirectional so it will work both inbound/outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use Port Redirection in the static NAT to translate a range of private IPs to a single public IP and vice versa.&lt;/P&gt;&lt;P&gt;For inbound access, an ACL allowing the traffic is required as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 03:47:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614772#M577265</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T03:47:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614773#M577266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your quick response Federico.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The example that you displayed is essentially what I have, accept for the ACL. How would I write that to reference the secondart public ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 03:56:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614773#M577266</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T03:56:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614774#M577267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to check if there's an ACL already applied in the inbound direction on the outside interface:&lt;/P&gt;&lt;P&gt;sh run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say the name of the ACL is OUTSIDE (or create a new ACL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE permit tcp any host PUBLIC_IP_2 eq 80&lt;/P&gt;&lt;P&gt;access-list OUTSIDE permit tcp any host PUBLIC_IP_2 eq 25&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;access-group OUTSIDE in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL allows incoming TCP traffic from any source (Internet) to PUBLIC_IP_2 for web traffic and SMTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 04:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614774#M577267</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T04:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614775#M577268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will take a look at this in the morning. As I recall, there was not an inbound ACL present. I feel better about this since I have some sort of heading now. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to be sure, adding that ACL will not open up free access from the outside world without having a static entry in place correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 04:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614775#M577268</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T04:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614776#M577269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well.....&lt;/P&gt;&lt;P&gt;Creating an ACL (and applying it inbound on the outside interface), allows for inbound traffic (whatever traffic allowed on the ACL).&lt;/P&gt;&lt;P&gt;Remember there's an implicit deny any at the end (anything not explicity permitted is denied).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to be able to initiate inbound traffic, besides the ACL a static NAT is required. So one would think that if not having static NAT, then no traffic could enter the ASA.... BUT...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are other methods, ie NAT 0 with ACL also allows traffic from outside-to-inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, in normal circumstances, the fact of creating an ACL without static NAT should not be a problem, I will strongly recommend against that and instead just permit the desired traffic in the ACL (no more).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 04:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614776#M577269</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T04:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614777#M577270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Great. Thank you very much! This helped tremendously. Unlike a normal everyday forum, the CSC forums are almost like an instant help line for those of us still learning this Cisco stuff. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 04:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614777#M577270</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T04:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614778#M577271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the kind words, I honestly believe this is the best forum/community out there &lt;span class="lia-unicode-emoji" title=":winking_face_with_tongue:"&gt;😜&lt;/span&gt;&lt;/P&gt;&lt;P&gt;And believe me... we are all still learning &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you found this one helpful please mark it as answered and rate it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 04:55:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614778#M577271</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T04:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614779#M577272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will do. I'm on my Blackberry at the moment, but will do that as soon as I get a chance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 05:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614779#M577272</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T05:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614780#M577273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, unfortunately, no go on this. For testing purposes I created a NAT entry for a single host. I also have created a corresponding global entry as seen below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 client_ip 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 2 public_ip netmask 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems the traffic is going out of the ASA just fine, but it does not get back in for some reason or another. After checking the logs I see the connection build messages and a few teardown messages with "SYN Timeout" at the end about 30 seconds after the original translation entry is built.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe the NAT-ting is working fine from seeing this since the ASA looks to be expecting a response. My question is, would the issue be an ACL problem with my ASA, or with my ISP's router (which is the next hop) maybe not having this IP routed to us? I have left a message with our ISP contact already so I am hoping the issue may be on their side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't feel the issue could be with an ACL because I do not get any "connection denied" messages in the debug logging.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more help is greatly appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 22:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614780#M577273</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T22:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614781#M577274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see the traffic going out (NATing is working), and the SYN timeout indicates that there's no response from the outside host.&lt;/P&gt;&lt;P&gt;It sounds like traffic is going out but not replied received.&lt;/P&gt;&lt;P&gt;This is not a problem with the ACL, because the ACL applied to the outside interface only checks inbound traffic (not replies for traffic originated from inside).&lt;/P&gt;&lt;P&gt;In other words, the outside ACL only check inbound traffic initiated from the outside coming inside the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;Can you actually PING the outside host from the internal device? Or from the ASA?&lt;/P&gt;&lt;P&gt;Perhaps this outside device is just not responding to your requests.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 22:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614781#M577274</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T22:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614782#M577275</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, I forgot the meaning of the term stateful firewall. Ha ha.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am able to ping any internet host from the client that is being NAT-ted. The issue I am having is while trying to browse to a website, or IE: whatismyip.com to see if the NAT is working, or even just google or yahoo. No matter what website I go to, the page will not come up since there is no communication back from the server side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 22:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614782#M577275</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T22:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614783#M577276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, the host defintely gets to the internet (PING), the problem is just opening a web page (any page)?&lt;/P&gt;&lt;P&gt;This could be a DNS issue... can you check the ''nslookup cisco.com'' from the PC to make sure the DNS resolves correctly?&lt;/P&gt;&lt;P&gt;Can you set the DNS to 4.2.2.2 as a test?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What about opening a browser to: &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://198.133.219.25"&gt;http://198.133.219.25&lt;/A&gt;&lt;SPAN&gt; (should get cisco.com)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 22:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614783#M577276</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-21T22:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614784#M577277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, I tried pointing to sites via IP address and using nslookup and was still not getting a response. From EVERYTHING I have read online and in Cisco documentation, the NAT and Global entries are all I should need to make the outgoing/public IP address different than the standard Global pool. I have seen the Static command used also and have tried that also on a single host with the same response, or lack thereof.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming this is correct, my issue would most likely lie with the routing being done ahead of me based on the fact that I do not get a response from the distant host. Correct, or am I missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again Federico, you are helping keep another IT colleague sane for 1 more day.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 22:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614784#M577277</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T22:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614785#M577278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoPlainText"&gt;I also forgot to mention one thing. If I set the ASA's outside interface vlan IP to the IP I am trying to nat the inside client to, I cannot pass traffic. I would again assume the issue is down the line from me from this observation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 23:28:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614785#M577278</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-21T23:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614786#M577279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bryan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's nailed down the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. You say that you can PING the internet from the inside host? ie ping 4.2.2.2&lt;/P&gt;&lt;P&gt;2. If this is true, nat/global are working fine and you might have an ACL applied to the inside interface not allowing web or dns traffic.&lt;/P&gt;&lt;P&gt;3. To check that traffic is flowing through the ASA in the outbound direction, can do a ''sh xlate local x.x.x.x'' where x.x.x.x is the IP of the inside device. This will show the translation taking place.&lt;/P&gt;&lt;P&gt;4. To reassure that traffic is being sent out by the ASA can apply an ACL outbound to the outside interface&lt;/P&gt;&lt;P&gt;ie access-list TEST permit tcp host PUBLIC_IP any eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-list TEST permit ip any any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; access-group TEST out interface outside&lt;/P&gt;&lt;P&gt;If you do get hitcounts on the first line ''sh access-list TEST'' then traffic is being sent out by the ASA for outgoing web requests.&lt;/P&gt;&lt;P&gt;5. To check if traffic is coming back to the ASA, we can check the logs.&lt;/P&gt;&lt;P&gt;For web connections, the TCP should establish the three-way handshake.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this, you can share with us the running-config so we can check it out for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Dec 2010 02:12:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614786#M577279</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-22T02:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614787#M577280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, I will try this out and get back to you with the results. If I'm still not successful I will send my config also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Dec 2010 04:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614787#M577280</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-22T04:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614788#M577281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I may have a chance to visit the client tomorrow. I will put together the config for what you have suggested and report back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did hear back from the ISP and they say the address I am using is routed back to me, so I was wrong about that unfortunately.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Bryan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Dec 2010 04:58:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614788#M577281</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2010-12-23T04:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614789#M577282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, so I was able to figure out my issue here. Sorry for the long delay. I spoke with the ISP again after trying these suggestions and then just plugging my laptop in after the router and used the new public IP I was trying to set and also testing the original one that works on the ASA. As I suspected, I was able to get out with the same IP as our ASA but not with the new IP. I then found out that they block all traffic, aside from ICMP, with access lists so that they can prevent usage on other IP's withoug first using their proxy filter. I asked them to add the new IP to the access-list and voila... it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thankfully that is over and I can not try to re-grow my hair again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all of your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bryan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jan 2011 20:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-issue/m-p/1614789#M577282</guid>
      <dc:creator>bboston85</dc:creator>
      <dc:date>2011-01-06T20:45:12Z</dc:date>
    </item>
  </channel>
</rss>

