<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 - Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550705#M607282</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, I saw that Mike answer first and we both thought the same. He is really good in what he does..... In that switch do you have any type of acl or restriction of any type? Are you able to access it from the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Nov 2010 18:48:15 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2010-11-09T18:48:15Z</dc:date>
    <item>
      <title>ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550700#M607268</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I stuck with a static nat configuration problem on ASA 5505 equipment.&lt;/P&gt;&lt;P&gt;While there is already quite a few post regarding NAT on this forum I could not find anything solving my problem so any help from the community would be most welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem is quite simple : I would like external computers (coming through outside interface) to access one internal HTTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; text-decoration: underline; "&gt;&lt;STRONG&gt;Here's my test configuration :&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;ASA outside address : 192.168.0.11&lt;/LI&gt;&lt;LI&gt;ASA inside address : 192.168.1.1&lt;/LI&gt;&lt;LI&gt;Internal server address : 192.168.1.6&lt;/LI&gt;&lt;LI&gt;External computer trying to access to the internal server : 192.168.0.10&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;ASA configuration :&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "show running-config"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;access-list inside_access_in remark autorise le reseau interne a accéder à internet&lt;BR /&gt;access-list inside_access_in extended permit ip 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list outside_access_in remark Autorise le reseau interne a faire des pings externes&lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended permit object-group TCPUDP any interface outside eq www &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) tcp interface www 192.168.1.6 www netmask 255.255.255.255 &lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.0.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcp-client client-id interface outside&lt;BR /&gt;dhcpd auto_config outside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.132 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:2e0ea6f12299faadcb90b77fbaea79cb&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Access Log:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Tableau Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:10.0pt;
	mso-para-margin-left:0cm;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Tableau Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-qformat:yes;
	mso-style-parent:"";
	mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
	mso-para-margin-top:0cm;
	mso-para-margin-right:0cm;
	mso-para-margin-bottom:10.0pt;
	mso-para-margin-left:0cm;
	line-height:115%;
	mso-pagination:widow-orphan;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-fareast-font-family:"Times New Roman";
	mso-fareast-theme-font:minor-fareast;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;}
&lt;/style&gt;
&lt;![endif]--&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" class="MsoNormalTable"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Source IP&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Source Port&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Destination&amp;nbsp;&amp;nbsp; IP&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Destination&amp;nbsp;&amp;nbsp; Port&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN lang="EN-US" style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Description&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Nov 09&amp;nbsp;&amp;nbsp; 2010&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;10:26:07&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;302013&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;192.168.0.10&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;1649&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;192.168.1.6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;80&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN lang="EN-US" style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Built inbound TCP connection 473 for outside:192.168.0.10/1649&amp;nbsp;&amp;nbsp; (192.168.0.10/1649) to inside:192.168.1.6/80 (192.168.0.11/80)&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Nov 09&amp;nbsp;&amp;nbsp; 2010&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;10:26:37&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;302014&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;192.168.0.10&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;1649&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;192.168.1.6&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;80&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="padding: 0.75pt;"&gt;&lt;P class="MsoNormal" style="margin-bottom: 0.0001pt; line-height: normal;"&gt;&lt;SPAN lang="EN-US" style="font-size: 12pt; font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;;"&gt;Teardown TCP connection 473 for outside:192.168.0.10/1649 to&amp;nbsp;&amp;nbsp; inside:192.168.1.6/80 duration 0:00:30 bytes 0 SYN Timeout&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:06:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550700#M607268</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2019-03-11T19:06:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550701#M607270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jean-Francois,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config looks okay and the logs indicate that the connection is allowed. However, the connection eventually closes due to a SYN timeout. This means that the ASA never saw a reply from your web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify that the server is listening on TCP/80 and that there is nothing else in the path that would filter this traffic? Also, double check to make sure the server doesn't have a host-based firewall or security software that would block this connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to connect to the server from inside your network? A packet capture on the server will help to verify if the request is being received by the server or if the server is not replying.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 17:57:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550701#M607270</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-11-09T17:57:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550702#M607273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike here &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;, NAT is right, problem is that the server is not responding (SYN timeout). You can check the following things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that the server default gateway is the ASA&lt;/P&gt;&lt;P&gt;Put wireshark on the server and check if the server is receiving the packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need anything just let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 17:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550702#M607273</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-09T17:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550703#M607276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the super fast answer ! Unfortunately it makes me even more confuse ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the test purposes, the "internal server" (192.168.1.6) was a SLM switch and I was trying to access its http admin server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To reply to your post, I updated the test configuration and replaced the SLM with a PC running EasyPHP and WireShark.&lt;/P&gt;&lt;P&gt;This setup was supposed to allow me the see what was wrong with the reply.&lt;/P&gt;&lt;P&gt;To my surprise with this new configuration the setup works just fine ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I switch back to the SLM configuration, it just fails ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea why the switch would reject/not reply to the connection coming from the ASA ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 18:31:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550703#M607276</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2010-11-09T18:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550704#M607279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply, please see my reply to the other Mike &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was setting up exactly was you were suggesting and the result was quite surprising ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the SLM configuration, it has the ASA as default gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 18:36:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550704#M607279</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2010-11-09T18:36:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550705#M607282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, I saw that Mike answer first and we both thought the same. He is really good in what he does..... In that switch do you have any type of acl or restriction of any type? Are you able to access it from the inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 18:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550705#M607282</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-09T18:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 - Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550706#M607285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I can access it from inside. I will try to fond what's wrong with wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I consider the issue solved and tag the thread as such.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks you guys for the support !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;JF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Nov 2010 22:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-static-nat/m-p/1550706#M607285</guid>
      <dc:creator>jfendrody</dc:creator>
      <dc:date>2010-11-09T22:06:29Z</dc:date>
    </item>
  </channel>
</rss>

