<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static PAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603320#M577490</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints friends i m waiting for experts suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 20 Dec 2010 18:10:16 GMT</pubDate>
    <dc:creator>estelamathew</dc:creator>
    <dc:date>2010-12-20T18:10:16Z</dc:date>
    <item>
      <title>Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603311#M577481</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem with static PAT when i specify with two ports HTTPS and SMTP for 2 different servers with 1 public IP it does'nt work for SMTP but it only works for HTTPS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below are the commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ1,outside) tcp X.154.25.X https 172.16.1.5 https netmask 255.255.255.255&lt;BR /&gt; static (DMZ1,outside) tcp X.154.25.X smtp 172.16.1.2 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list outside permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside in&amp;nbsp; interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IOS version is 8.2(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603311#M577481</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2019-03-11T19:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603312#M577482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The port forwarding should work for almost any TCP application.&lt;/P&gt;&lt;P&gt;One thing that you can do to check if the SMTP traffic is reaching the ASA is create an ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear config access-list outside&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host x.x.x.x eq 80&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host x.x.x.x eq 25&lt;/P&gt;&lt;P&gt;access-list outside permit ip any any&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way when sending SMTP traffic you should see hitcounts on the ACL (show access-list outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 16:05:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603312#M577482</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-18T16:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603313#M577483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello federico&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ1,outside) X.154.250.X 172.16.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it works fine ,but when i change to use 1 public IP with different ports it doesn't work.Mail's are flowing very well by the above command i dont think so i need to create access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 18:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603313#M577483</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-18T18:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603314#M577484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Estela,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you use the static command without ports you are redirecting all IP traffic from the public IP to the private one and vice versa.&lt;/P&gt;&lt;P&gt;When you're doing TCP ports, then only that single port is being redirected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will say that the fact that it won't work when specifying SMTP to be redirected, it's because the traffic is not coming on port 25 or other ports are required for the communication to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do any of this:&lt;/P&gt;&lt;P&gt;You can check the logs on the ASA to see which ports are being used for this communication and redirect on those ports (add them to the static PAT), so that it will work.&lt;/P&gt;&lt;P&gt;Can capture the packets from the remote IP to the public IP to check the ports used.&lt;/P&gt;&lt;P&gt;Can create a deny ip host x.x.x.x to see which ports are being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 18:18:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603314#M577484</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-18T18:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603315#M577485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As u mentioned how can i do the below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can capture the packets from the remote IP to the public IP to check the ports used.&lt;/P&gt;&lt;P&gt;Can create a deny ip host x.x.x.x to see which ports are being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 18:40:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603315#M577485</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-18T18:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603316#M577486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure Estela,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I'm saying.&lt;/P&gt;&lt;P&gt;Probably the easiest way to go is just enable logs:&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, having the static 1-1 command, connect the SMTP.&lt;/P&gt;&lt;P&gt;The logs will show which ports are used in the transaction.&lt;/P&gt;&lt;P&gt;I'm pretty sure that SMTP is indeed reaching the ASA and redirected to the internal IP but there's another required port not being forwared and that's why it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the ACL:&lt;/P&gt;&lt;P&gt;access-list outside deny ip any any log&lt;/P&gt;&lt;P&gt;This will log all packets for a moment (be aware that this will break all communication through the ASA, you should have a console access to do thisto be on the safe side and traffic will be interrupted)&lt;/P&gt;&lt;P&gt;The ''show log'' will show the transactions being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the capture:&lt;/P&gt;&lt;P&gt;capture SMTP interface outside match tcp host SOURCE_IP host PUBLIC_IP&lt;/P&gt;&lt;P&gt;Where SOURCE_IP is the IP where the SMTP connection originates and PUBLIC_IP is the public IP on the static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 18:55:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603316#M577486</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-18T18:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603317#M577487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the ACL you could be more specific to avoid breaking any non-related thing.&lt;/P&gt;&lt;P&gt;Instead of:&lt;/P&gt;&lt;P&gt;access-list outside deny ip any any log&lt;/P&gt;&lt;P&gt;Can do:&lt;/P&gt;&lt;P&gt;access-list outside deny ip any host PUBLIC_IP log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 19:13:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603317#M577487</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-12-18T19:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603318#M577488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very Nice explanation, i will apply tomorrow and i will reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope the below also can help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list abc permit tcp host &lt;MAIL server=""&gt; any&lt;/MAIL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture cpz access-lst abc interface DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Dec 2010 19:21:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603318#M577488</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-18T19:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603319#M577489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public IP is 85.154.250.45&lt;/P&gt;&lt;P&gt;Real IP is 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I have applied the below command for DMZ1 interface where mail server is connected on DMZ and the attached file named "DMZ1" belongs to this capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture cde interface DMZ1 match tcp host 172.16.1.2 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have applied the below command for outside interface where traffic is hitting for mail server and the attached 2 file's named OUTSIDE belongs to this capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; capture abc interface outside match tcp any host 85.154.250.45,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; Also&amp;nbsp; i tried by access-list outside deny ip any any and captured the logging,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PLEASE HAVE A LOOK ON ATTACHED FILES AND PLEASE SUGGEST,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Federico if u say that there must be some port allowed with smtp then how it is working with the below command with only smtp allowed in outside access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (DMZ1,outside) 85.154.250.45 172.16.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 19 Dec 2010 16:21:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603319#M577489</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-19T16:21:07Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603320#M577490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints friends i m waiting for experts suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Dec 2010 18:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603320#M577490</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-20T18:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603321#M577491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When redirecting just port TCP/25, do you se any syslogs for dropped packets on the ASA? I am unable to open the attachment so apologies if i am asking something already in there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Dec 2010 03:24:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603321#M577491</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-12-21T03:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603322#M577492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached are the logs!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 19:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603322#M577492</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-27T19:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603323#M577493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Estela,&lt;/P&gt;&lt;P&gt;The logs show the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp; Dec 19 2010 20:53:09: %ASA-4-106023: Deny tcp src outside:85.158.139.163/21716 dst DMZ1:85.154.250.45/25 by access-group "acl-outside" &lt;BR /&gt;&amp;nbsp; Dec 19 2010 20:54:09: %ASA-4-106023: Deny tcp src outside:85.158.139.163/22427 dst DMZ1:85.154.250.45/25 by access-group "acl-outside" &lt;BR /&gt;&amp;nbsp; Dec 19 2010 20:57:57: %ASA-4-106023: Deny tcp src outside:85.158.139.211/35721 dst DMZ1:85.154.250.45/25 by access-group "acl-outside" &lt;BR /&gt;&amp;nbsp; Dec 19 2010 20:58:20: %ASA-4-106023: Deny tcp src outside:85.158.143.51/32943 dst DMZ1:85.154.250.45/25 by access-group "acl-outside" &lt;BR /&gt;&amp;nbsp; Dec 19 2010 20:58:32: %ASA-4-106023: Deny tcp src outside:85.158.143.51/33255 dst DMZ1:85.154.250.45/25 by access-group "acl-outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It see that the flow is not allowed in the acl-outside. 443 isn't allowed either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-4-106023: Deny tcp src outside:82.178.104.237/46502 dst DMZ1:85.154.250.45/443 by access-group "acl-outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure the acl has permission.&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;access-list acl-outside line 1 permit tcp any host 85.154.250.45 eq 443&lt;/P&gt;&lt;P&gt;access-list acl-outside line 2 permit tcp any host 85.154.250.45 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try again and let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 27 Dec 2010 22:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603323#M577493</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-27T22:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603324#M577494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Very lucky to see replies from all experts uptill now, Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per Federico in previous mail.&lt;/P&gt;&lt;P&gt;For the ACL:&lt;/P&gt;&lt;P&gt;access-list outside deny ip any any log&lt;/P&gt;&lt;P&gt;This&amp;nbsp; will log all packets for a moment (be aware that this will break all&amp;nbsp; communication through the ASA, you should have a console access to do&amp;nbsp; thisto be on the safe side and traffic will be interrupted)&lt;/P&gt;&lt;P&gt;The ''show log'' will show the transactions being denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Sankar I have done the above as per hint by federico,i have seen https and smtp getting drop when i deny everything on outside access-list, &lt;STRONG style="color: #ff0000; "&gt;BUT the goal is to figure out why it is not working with the below static PAT command,when SMTP is permitted in access-list.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;static (DMZ1,outside) tcp 85.154.250.45 smtp 172.16.1.2 smtp netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2)&amp;nbsp; When i apply the below command it is working fine even though HTTPS is blocked ,the flow of mail are streaming.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG style="color: #ff0000; "&gt;static (DMZ1,outside) 85.154.250.45 172.16.1.2 netmask 255.255.255.255 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;access-list acl-outside extended permit tcp any host 85.154.250.45 eq smtp &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 09:41:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603324#M577494</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2010-12-31T09:41:44Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603325#M577495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Estela,&lt;/P&gt;&lt;P&gt;This is very interesting.&lt;/P&gt;&lt;P&gt;Here is an action plan:&lt;/P&gt;&lt;P&gt;1. remove the static 1-1 nat if you have it&lt;/P&gt;&lt;P&gt;2. add both the static pat lines and make sure the outside acl has permission for both 25 and 443 before any denies.&lt;/P&gt;&lt;P&gt;3. clear local &lt;STRONG style="color: #000000; "&gt;172.16.1.2 and clear local&amp;nbsp; 172.16.1.5&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;4. Now apply the following captures.&lt;/P&gt;&lt;P&gt;cap capin int dmz1 match tcp any host &lt;STRONG style="color: #000000; "&gt;172.16.1.2 eq 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cap capin int dmz1 match tcp any host &lt;STRONG style="color: #000000; "&gt;172.16.1.5 eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cap capout int outside match tcp any ho &lt;STRONG style="color: #ff0000;"&gt; &lt;SPAN style="color: #000000;"&gt;85.154.250.45 eq 25&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cap capout int outside match tcp any ho &lt;STRONG style="color: #ff0000;"&gt; &lt;SPAN style="color: #000000;"&gt;85.154.250.45 eq 443&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;cap cap-asp type asp-drop all&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;5. Do your test from the outside and&lt;/STRONG&gt; save all three captures&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://ip_address_of_asa/capture/capin/pcap"&gt;https://ip_address_of_asa/capture/capin/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://ip_address_of_asa/capture/capout/pcap"&gt;https://ip_address_of_asa/capture/capout/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://ip_address_of_asa/capture/capasp/pcap"&gt;https://ip_address_of_asa/capture/capasp/pcap&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since the problem has been going on since Dec 18th, I'd suggest opening a TAC case and include sh tech, syslogs and all the captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Dec 2010 14:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603325#M577495</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-12-31T14:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Static PAT</title>
      <link>https://community.cisco.com/t5/network-security/static-pat/m-p/1603326#M577496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Dears,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank U very much everybodywho&amp;nbsp; contribute in thread to give me success.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Jan 2011 12:20:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat/m-p/1603326#M577496</guid>
      <dc:creator>estelamathew</dc:creator>
      <dc:date>2011-01-03T12:20:24Z</dc:date>
    </item>
  </channel>
</rss>

