<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic destination NAT problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883380#M5916</link>
    <description>&lt;P&gt;I am having a wired issue, I am trying to put my DMZ VM to outside do 1:1 NAT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It can not hit the NAT&amp;nbsp; rule. For internal, the server is working fine. I disable the firewall of VM already.&lt;/P&gt;&lt;P&gt;for the external, I put myself computer on the public IP address. and that IP is working fine without the FW.&lt;/P&gt;&lt;P&gt;Does anyone have any idea how to troubleshoot this problem?&lt;/P&gt;&lt;PRE&gt;nat (DMZ,outside) source static stoneraft-linux stoneraft-out

access-list 103 extended permit tcp any object stoneraft-linux

object network stoneraft-linux
 host 192.168.27.137

object network stoneraft-out
 host 8.8.8.8&lt;/PRE&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:16:09 GMT</pubDate>
    <dc:creator>yeharold94@gmail.com</dc:creator>
    <dc:date>2020-02-21T17:16:09Z</dc:date>
    <item>
      <title>destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883380#M5916</link>
      <description>&lt;P&gt;I am having a wired issue, I am trying to put my DMZ VM to outside do 1:1 NAT.&amp;nbsp;&lt;/P&gt;&lt;P&gt;It can not hit the NAT&amp;nbsp; rule. For internal, the server is working fine. I disable the firewall of VM already.&lt;/P&gt;&lt;P&gt;for the external, I put myself computer on the public IP address. and that IP is working fine without the FW.&lt;/P&gt;&lt;P&gt;Does anyone have any idea how to troubleshoot this problem?&lt;/P&gt;&lt;PRE&gt;nat (DMZ,outside) source static stoneraft-linux stoneraft-out

access-list 103 extended permit tcp any object stoneraft-linux

object network stoneraft-linux
 host 192.168.27.137

object network stoneraft-out
 host 8.8.8.8&lt;/PRE&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883380#M5916</guid>
      <dc:creator>yeharold94@gmail.com</dc:creator>
      <dc:date>2020-02-21T17:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883436#M5917</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Static NAT example:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;EM&gt;object network stoneraft-linux&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; host 192.168.27.137&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nat (dmz,outside) static 8.8.8.8&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;access-list 103 extended permit tcp any host 192.168.27.137&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 19:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883436#M5917</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-07-02T19:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883441#M5918</link>
      <description>&lt;P&gt;I got 0 hit on this NAT rule&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 19:15:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883441#M5918</guid>
      <dc:creator>yeharold94@gmail.com</dc:creator>
      <dc:date>2019-07-02T19:15:08Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883475#M5919</link>
      <description>If you are trying to do source only nat it should look something like this:&lt;BR /&gt;nat (DMZ,outside) source static &amp;lt;srcIP&amp;gt;&amp;lt;mappedIP&amp;gt;&lt;BR /&gt;For future troubleshooting I would recommend running a packet-tracer from CLI that may better assist you with troubleshooting your issue.&lt;BR /&gt;packet-tracer input DMZ tcp 192.168.27.137 12345 8.8.8.8 80&lt;BR /&gt;</description>
      <pubDate>Tue, 02 Jul 2019 19:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883475#M5919</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-02T19:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883490#M5920</link>
      <description>&lt;PRE&gt;Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   0.0.0.0         0.0.0.0         outside

Phase: 2
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group DMZ_access_in in interface DMZ
access-list DMZ_access_in extended permit ip any any 
Additional Information:

Phase: 3
Type: NAT
Subtype: 
Result: ALLOW
Config:
nat (TTN-DMZ,outside) source static stoneraft-linux stoneraft-out
Additional Information:
Static translate 192.168.27.137/22 to 8.8.8.8/22

Phase: 4
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 5
Type: IP-OPTIONS
Subtype: 
Result: ALLOW
Config:
Additional Information:

Phase: 6
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
nat (TTN-DMZ,outside) source static stoneraft-linux stoneraft-out
Additional Information:

Phase: 7      
Type: USER-STATISTICS
Subtype: user-statistics
Result: ALLOW
Config:
Additional Information:

Result:
input-interface: TTN-DMZ
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/PRE&gt;</description>
      <pubDate>Tue, 02 Jul 2019 19:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883490#M5920</guid>
      <dc:creator>yeharold94@gmail.com</dc:creator>
      <dc:date>2019-07-02T19:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883593#M5921</link>
      <description>That output looks like your NAT rule worked:&lt;BR /&gt;Static translate 192.168.27.137/22 to 8.8.8.8/22&lt;BR /&gt;&lt;BR /&gt;Not sure why you would translate to 8.8.8.8 though. What is the exact goal you are trying to accomplish?&lt;BR /&gt;#sh xlate --&amp;gt;shows NAT translations&lt;BR /&gt;#sh nat --&amp;gt;shows NAT counters</description>
      <pubDate>Tue, 02 Jul 2019 23:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3883593#M5921</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-02T23:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884004#M5922</link>
      <description>&lt;P&gt;8.8.8.8 is an example, just in case, I don't want to send my public IP to everywhere.&lt;/P&gt;&lt;PRE&gt;ASA# sh xlate local 192.168.27.137
1104 in use, 5491 most used
Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,
       s - static, T - twice, N - net-to-net
NAT from DMZ:192.168.27.137 to outside:8.8.8.8
    flags sT idle 0:02:25 timeout 0:00:00
	

ASA# sh nat 192.168.27.137  detail 
Manual NAT Policies (Section 1)
1 (DMZ) to (outside) source static stoneraft-linux stoneraft-out  
    translate_hits = 284, untranslate_hits = 5
    Source - Origin: 192.168.27.137/32, Translated: 8.8.8.8/32
	
ASA# sh nat 192.168.27.137  translated 8.8.8.8
Manual NAT Policies (Section 1)
1 (DMZ) to (outside) source static stoneraft-linux stoneraft-out  
    translate_hits = 284, untranslate_hits = 5&lt;/PRE&gt;</description>
      <pubDate>Wed, 03 Jul 2019 14:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884004#M5922</guid>
      <dc:creator>yeharold94@gmail.com</dc:creator>
      <dc:date>2019-07-03T14:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884065#M5923</link>
      <description>Cool so you are working now! Enjoy!</description>
      <pubDate>Wed, 03 Jul 2019 14:59:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884065#M5923</guid>
      <dc:creator>Mike.Cifelli</dc:creator>
      <dc:date>2019-07-03T14:59:10Z</dc:date>
    </item>
    <item>
      <title>Re: destination NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884411#M5924</link>
      <description>&lt;P&gt;still not works, same issue. do you have any idea?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jul 2019 00:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-problem/m-p/3884411#M5924</guid>
      <dc:creator>yeharold94@gmail.com</dc:creator>
      <dc:date>2019-07-04T00:04:50Z</dc:date>
    </item>
  </channel>
</rss>

