<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Simple 8.3 firewall rules issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634734#M594999</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you run the packet tracer again with a random ip rather then using 63.x.x.x ip ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running a packet tracer right now and the outside acl is checked after the NAT process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post output using some other public ip address, just to see the difference. Also clear xlate before doing that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Jan 2011 01:56:30 GMT</pubDate>
    <dc:creator>manish arora</dc:creator>
    <dc:date>2011-01-07T01:56:30Z</dc:date>
    <item>
      <title>Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634731#M594996</link>
      <description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt; &lt;o:OfficeDocumentSettings&gt; &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt; &lt;/o:OfficeDocumentSettings&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin-top:0in;
	mso-para-margin-right:0in;
	mso-para-margin-bottom:10.0pt;
	mso-para-margin-left:0in;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;P&gt;I am new to 8.3 and any help is much appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to allow access from any IP on the internet to a server on the inside but my firewall is denying access due to an access-list issue (I believe).&amp;nbsp; I need users on the internet to use the IP address that is applied to my outside interface, specify TCP port 24499 and NAT them through to a server on the inside.&amp;nbsp; When I configured the outside ACL and a corresponding NAT rule the connection is being blocked due to the ACL.&amp;nbsp; I am testing from the internet and using the capture feature to view the connection.&amp;nbsp; I am also using the "packet-tracer" and the firewall tells me that the connection fails due to an ACL issue.&amp;nbsp; Here is my config, captures and packet-tracer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;++++++++++&lt;/P&gt;&lt;P&gt;CONFIG&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE extended permit tcp any host 10.10.10.6 eq 24499&lt;/P&gt;&lt;P&gt;access-group OUTSIDE in interface OUTSIDE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SYNC_SERVER&lt;BR /&gt;&amp;nbsp; host 10.10.10.6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SYNC_SERVER&lt;BR /&gt;&amp;nbsp; nat (INSIDE,OUTSIDE) static interface service tcp 24499 24499&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;++++++++++++&lt;/P&gt;&lt;P&gt;PACKET_TRACER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input OUTSIDE tcp 65.33.3.3 4444 98.26.6.21 24499&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt; Type: CAPTURE&lt;BR /&gt; Subtype: &lt;BR /&gt; Result: ALLOW&lt;BR /&gt; Config:&lt;BR /&gt; Additional Information:&lt;BR /&gt; MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt; Type: ACCESS-LIST&lt;BR /&gt; Subtype: &lt;BR /&gt; Result: ALLOW&lt;BR /&gt; Config:&lt;BR /&gt; Implicit Rule&lt;BR /&gt; Additional Information:&lt;BR /&gt; MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt; Type: ROUTE-LOOKUP&lt;BR /&gt; Subtype: input&lt;BR /&gt; Result: ALLOW&lt;BR /&gt; Config:&lt;BR /&gt; Additional Information:&lt;BR /&gt; in&amp;nbsp;&amp;nbsp; 98.26.6.21&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt; Phase: 4&lt;BR /&gt; Type: ACCESS-LIST&lt;BR /&gt; Subtype: &lt;BR /&gt; Result: DROP&lt;BR /&gt; Config:&lt;BR /&gt; Implicit Rule&lt;BR /&gt; Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt; input-interface: OUTSIDE&lt;BR /&gt; input-status: up&lt;BR /&gt; input-line-status: up&lt;BR /&gt; output-interface: NP Identity Ifc&lt;BR /&gt; output-status: up&lt;BR /&gt; output-line-status: up&lt;BR /&gt; Action: drop&lt;BR /&gt; Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+++++++++++++&lt;/P&gt;&lt;P&gt;CAPTURE&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh access-list pcap&lt;BR /&gt; access-list pcap; 1 elements; name hash: 0x39c806fe&lt;BR /&gt; access-list pcap line 1 extended permit tcp any any eq 24499 (hitcnt=7) 0x3795d772&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh capture&lt;BR /&gt; capture tony type raw-data access-list tony interface OUTSIDE [Capturing - 122 bytes]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh capture pcap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 18:30:32.556978 802.1Q vlan#1 P0 63.23.2.99.32389 &amp;gt; 98.26.6.21.24499: S 3527242145:3527242145(0) win 16384 &amp;lt;mss 1260,nop,wscale 0,nop,nop,nop,nop&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2: 18:30:35.561097 802.1Q vlan#1 P0 63.23.2.99.32389 &amp;gt; 98.26.6.21.24499: S 3527242145:3527242145(0) win 16384 &amp;lt;mss 1260,nop,wscale 0,nop,nop,nop,nop&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3: 18:30:41.554750 802.1Q vlan#1 P0 63.23.2.99.32389 &amp;gt; 98.26.6.21.24499: S 3527242145:3527242145(0) win 16384 &amp;lt;mss 1260,nop,nop,nop,nop&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4: 18:31:00.722679 802.1Q vlan#1 P0 63.23.2.99.3303 &amp;gt; 98.26.6.21.24499: S 3106203956:3106203956(0) win 16384 &amp;lt;mss 1260,nop,wscale 0,nop,nop,nop,nop&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5: 18:31:03.716881 802.1Q vlan#1 P0 63.43.2.99.3303 &amp;gt; 98.26.6.21.24499: S 3106203956:3106203956(0) win 16384 &amp;lt;mss 1260,nop,wscale 0,nop,nop,nop,nop&amp;gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6: 18:31:09.791661 802.1Q vlan#1 P0 63.23.2.99.3303 &amp;gt; 98.26.6.21.24499: S 3106203956:3106203956(0) win 16384 &amp;lt;mss 1260,nop,nop,nop,nop&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+++++++++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After running the test I am not seeing any hit counts on my outside ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# sh access-list OUTSIDE&lt;BR /&gt; access-list OUTSIDE; 1 elements; name hash: 0x97f9426&lt;BR /&gt; access-list OUTSIDE line 1 extended permit tcp any host 10.10.10.6 eq 24499 log informational interval 300 (hitcnt=0) 0xc73bec9a&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634731#M594996</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2019-03-11T19:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634732#M594997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you check few things :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1&amp;gt; There isn't any access list applied to the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2&amp;gt; the server is listening on the port 24499 internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 00:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634732#M594997</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-07T00:59:26Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634733#M594998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No access-list on the inside interface and I was able to verify that the server is listening on port TCP 24499.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for taking a look.&amp;nbsp; Any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 01:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634733#M594998</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2011-01-07T01:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634734#M594999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you run the packet tracer again with a random ip rather then using 63.x.x.x ip ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running a packet tracer right now and the outside acl is checked after the NAT process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post output using some other public ip address, just to see the difference. Also clear xlate before doing that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 01:56:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634734#M594999</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-07T01:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634735#M595000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Manish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for all the help!&amp;nbsp; Here is the info you requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;++++++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# clear xlate&lt;BR /&gt;INFO: 29 xlates deleted&lt;BR /&gt;ASA# &lt;BR /&gt;ASA# packet-tracer input OUTSIDE tcp 54.33.22.3 4444 98.26.6.21 24499&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 98.26.6.21&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: OUTSIDE&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 02:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634735#M595000</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2011-01-07T02:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634736#M595001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A class="jiveTT-hover-user jive-username-link" href="https://community.cisco.com/people/anowell" id="jive-3773044,949,311,042,534,061"&gt;anowell&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try this in the global config mode :-&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic any interface &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 02:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634736#M595001</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-07T02:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634737#M595002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, here is what I got.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# clear xlate&lt;/P&gt;&lt;P&gt;INFO: 12 xlates deleted&lt;/P&gt;&lt;P&gt;ASA(config)# packet-tracer input OUTSIDE tcp 54.33.22.3 4444&amp;nbsp; 98.26.6.21 24499&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 98.26.6.21&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: OUTSIDE&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;ASA(config)# sh access-list&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; alert-interval 300&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;access-list OUTSIDE; 1 elements; name hash: 0x97f9426&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;SPAN&gt;access-list OUTSIDE line 1 extended permit tcp any host 10.10.10.6 eq 24499 log informational interval 300 (hitcnt=0) 0xc73bec9a&lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;+++++++&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh run nat&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source dynamic obj-10.10.11.0 interface&lt;/P&gt;&lt;P&gt;nat (INSIDE,any) source static any any destination static obj-10.10.11.0 obj-10.10.11.0&lt;/P&gt;&lt;P&gt;nat (INSIDE,any) source static obj-10.10.11.0 obj-10.10.11.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj-10.10.11.0&lt;/P&gt;&lt;P&gt; nat (OUTSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj-10.10.10.0&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) dynamic interface&lt;/P&gt;&lt;P&gt;object network SYNC_SERVER&lt;/P&gt;&lt;P&gt; nat (INSIDE,OUTSIDE) static interface service tcp 24499 24499&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# show nat&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 1)&lt;/P&gt;&lt;P&gt;1 (OUTSIDE) to (OUTSIDE) source dynamic obj-10.10.11.0 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;2 (INSIDE) to (any) source static any any destination static obj-10.10.11.0 obj-10.10.11.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;3 (INSIDE) to (any) source static obj-10.10.11.0 obj-10.10.11.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;1 (INSIDE) to (OUTSIDE) source static SYNC_SERVER interface service tcp 24499 24499&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;2 (INSIDE) to (OUTSIDE) source dynamic obj-10.10.10.0 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 987, untranslate_hits = 95&lt;/P&gt;&lt;P&gt;3 (OUTSIDE) to (OUTSIDE) source dynamic obj-10.10.11.0 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manual NAT Policies (Section 3)&lt;/P&gt;&lt;P&gt;1 (INSIDE) to (OUTSIDE) source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 02:41:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634737#M595002</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2011-01-07T02:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634738#M595004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what version of 8.3 are you running ? should check the Bugkit now as the config seems preety much perfect. &lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 03:07:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634738#M595004</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-07T03:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634739#M595006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the purpose of this line?&lt;/P&gt;&lt;P&gt;nat (OUTSIDE,OUTSIDE) source dynamic obj-10.10.11.0 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you pls. remove this and let us know?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet-tracer output clearly says that you are trying to talk to the outside interface on that tcp port 24499 and the firewall itself is simply not listening on that port at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp;&amp;nbsp; 98.26.6.21&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 03:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634739#M595006</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-07T03:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634740#M595007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That was it! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you all for the help, I really appreciate it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 04:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634740#M595007</guid>
      <dc:creator>anowell</dc:creator>
      <dc:date>2011-01-07T04:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634741#M595008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear and thanks for rating and marking it solved. Now the packet-tracer output should NOT show you identity. It will show you the nat rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 04:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634741#M595008</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2011-01-07T04:20:41Z</dc:date>
    </item>
    <item>
      <title>Re: Simple 8.3 firewall rules issue</title>
      <link>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634742#M595009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Catch Ms. Sankar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jan 2011 06:02:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/simple-8-3-firewall-rules-issue/m-p/1634742#M595009</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2011-01-07T06:02:08Z</dc:date>
    </item>
  </channel>
</rss>

