<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Portmap Error creation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478047#M635038</link>
    <description>&lt;P&gt;we have 3 networks. Outside(172.14.XX.XX), Inside(172.20.XX.XX) and Local (INTF2 192.168.XX.XX) , inside outside network is working fine , but when we tryed to access the INTF2 Network we are getting Pormap Cration Errors. We are using ASA 5510 with Ver 8.2&amp;nbsp; The second Issues we are not able to ping from the work stations (ICMP) is not working . Please help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.17.XX.XX 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.20.XX.XX.10 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif intf2&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.4 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network natpool&lt;BR /&gt; network-object 172.17.XX.XX 255.255.255.128&lt;BR /&gt;object-group network MainstayCCnetwork&lt;BR /&gt; network-object 203.XXX.XXX.0 255.255.255.0&lt;BR /&gt;object-group network InstaCCnetwork&lt;BR /&gt; network-object 203.XXX.XXX.0 255.255.255.128&lt;BR /&gt;object-group network nonatinside&lt;BR /&gt; network-object 172.20.XX.XX.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended permit udp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq h323 &lt;BR /&gt;access-list outside_access_in extended permit udp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq sip &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6498 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6499 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6500 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6565 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq smtp &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq ldap &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit udp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 14300 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq h323 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6498 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6499 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6503 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6565 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq www &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq smtp &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq ldap &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6500 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6505 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6508 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork range 14001 14015 &lt;BR /&gt;access-list inside_access_in extended permit udp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq sip &lt;BR /&gt;access-list intf2_access_in extended permit ip 172.20.XX.XX.0 255.255.255.0 192.168.0.0 255.255.252.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group intf2_access_in in interface intf2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.17.XX.XX 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:17956bfe428fcf5154645159f0d68b55&lt;BR /&gt;: end&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:57:30 GMT</pubDate>
    <dc:creator>rsjavahar</dc:creator>
    <dc:date>2019-03-11T17:57:30Z</dc:date>
    <item>
      <title>Portmap Error creation</title>
      <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478047#M635038</link>
      <description>&lt;P&gt;we have 3 networks. Outside(172.14.XX.XX), Inside(172.20.XX.XX) and Local (INTF2 192.168.XX.XX) , inside outside network is working fine , but when we tryed to access the INTF2 Network we are getting Pormap Cration Errors. We are using ASA 5510 with Ver 8.2&amp;nbsp; The second Issues we are not able to ping from the work stations (ICMP) is not working . Please help me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# sh run &lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.0(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ciscoasa&lt;BR /&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 172.17.XX.XX 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 172.20.XX.XX.10 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif intf2&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.4 255.255.252.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;ftp mode passive&lt;BR /&gt;object-group network natpool&lt;BR /&gt; network-object 172.17.XX.XX 255.255.255.128&lt;BR /&gt;object-group network MainstayCCnetwork&lt;BR /&gt; network-object 203.XXX.XXX.0 255.255.255.0&lt;BR /&gt;object-group network InstaCCnetwork&lt;BR /&gt; network-object 203.XXX.XXX.0 255.255.255.128&lt;BR /&gt;object-group network nonatinside&lt;BR /&gt; network-object 172.20.XX.XX.0 255.255.255.0&lt;BR /&gt;access-list outside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list outside_access_in extended permit udp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq h323 &lt;BR /&gt;access-list outside_access_in extended permit udp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq sip &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6498 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6499 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6500 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6565 &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq smtp &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq ldap &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list inside_access_in extended permit udp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 14300 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq h323 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6498 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6499 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6503 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6565 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq www &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq smtp &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq ldap &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6500 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6505 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6508 &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork range 14001 14015 &lt;BR /&gt;access-list inside_access_in extended permit udp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq sip &lt;BR /&gt;access-list intf2_access_in extended permit ip 172.20.XX.XX.0 255.255.255.0 192.168.0.0 255.255.252.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu intf2 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-602.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group intf2_access_in in interface intf2&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.17.XX.XX 2&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout uauth 0:05:00 absolute&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;no crypto isakmp nat-traversal&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:17956bfe428fcf5154645159f0d68b55&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478047#M635038</guid>
      <dc:creator>rsjavahar</dc:creator>
      <dc:date>2019-03-11T17:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap Error creation</title>
      <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478048#M635039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For inside to intf2 traffic, you will need something like the following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (intf2) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will PAT your inside traffic to the interface intf2 when trying to get to that side of the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to icmp failures, since you are using interface overload, you should configure the following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt; inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jun 2010 12:17:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478048#M635039</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-10T12:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap Error creation</title>
      <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478049#M635040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it its not working . after adding the Global statement also , i am not able to access my DNS server IP is 192.168.1.11 my cleints PC ip is 172.20.16.19 .. here i am sending the ASA LOG , Please give me solution..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;6|Jun 16 2010|07:11:54|305012|172.20.16.19|192.168.1.4|Teardown dynamic UDP translation from inside:172.20.16.19/64660 to intf2:192.168.1.4/1029 duration 0:00:30&lt;BR /&gt;6|Jun 16 2010|07:11:46|305012|172.20.16.19|192.168.1.4|Teardown dynamic UDP translation from inside:172.20.16.19/54316 to intf2:192.168.1.4/1028 duration 0:00:30&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|207.46.197.32|172.20.16.19|Built outbound UDP connection 58 for intf2:207.46.197.32/123 (207.46.197.32/123) to inside:172.20.16.19/123 (192.168.1.4/5)&lt;BR /&gt;6|Jun 16 2010|07:11:24|305011|172.20.16.19|192.168.1.4|Built dynamic UDP translation from inside:172.20.16.19/123 to intf2:192.168.1.4/5&lt;BR /&gt;6|Jun 16 2010|07:11:24|302016|192.168.1.14|172.20.16.19|Teardown UDP connection 53 for intf2:192.168.1.14/53 to inside:172.20.16.19/64660 duration 0:00:00 bytes 411&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|192.168.1.11|172.20.16.19|Built outbound UDP connection 57 for intf2:192.168.1.11/138 (192.168.1.11/138) to inside:172.20.16.19/138 (192.168.1.4/4)&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|192.168.1.13|172.20.16.19|Built outbound UDP connection 56 for intf2:192.168.1.13/138 (192.168.1.13/138) to inside:172.20.16.19/138 (192.168.1.4/4)&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|192.168.1.12|172.20.16.19|Built outbound UDP connection 55 for intf2:192.168.1.12/138 (192.168.1.12/138) to inside:172.20.16.19/138 (192.168.1.4/4)&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|192.168.1.14|172.20.16.19|Built outbound UDP connection 54 for intf2:192.168.1.14/138 (192.168.1.14/138) to inside:172.20.16.19/138 (192.168.1.4/4)&lt;BR /&gt;6|Jun 16 2010|07:11:24|305011|172.20.16.19|192.168.1.4|Built dynamic UDP translation from inside:172.20.16.19/138 to intf2:192.168.1.4/4&lt;BR /&gt;6|Jun 16 2010|07:11:24|302015|192.168.1.14|172.20.16.19|Built outbound UDP connection 53 for intf2:192.168.1.14/53 (192.168.1.14/53) to inside:172.20.16.19/64660 (192.168.1.4/1029)&lt;BR /&gt;6|Jun 16 2010|07:11:24|305011|172.20.16.19|192.168.1.4|Built dynamic UDP translation from inside:172.20.16.19/64660 to intf2:192.168.1.4/1029&lt;BR /&gt;6|Jun 16 2010|07:11:16|302016|192.168.1.14|172.20.16.19|Teardown UDP connection 52 for intf2:192.168.1.14/53 to inside:172.20.16.19/54316 duration 0:00:00 bytes 266&lt;BR /&gt;6|Jun 16 2010|07:11:16|302015|192.168.1.14|172.20.16.19|Built outbound UDP connection 52 for intf2:192.168.1.14/53 (192.168.1.14/53) to inside:172.20.16.19/54316 (192.168.1.4/1028)&lt;BR /&gt;6|Jun 16 2010|07:11:16|305011|172.20.16.19|192.168.1.4|Built dynamic UDP translation from inside:172.20.16.19/54316 to intf2:192.168.1.4/1028&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jun 2010 07:54:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478049#M635040</guid>
      <dc:creator>rsjavahar</dc:creator>
      <dc:date>2010-06-16T07:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap Error creation</title>
      <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478050#M635041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The portmap creation error is now gone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the correction on the NAT for inside to intf2 worked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hoiwever, looking at the configuration further, and the access-list you have been trying to implement (though they are wrong) appears that you want the inside to go to the intf2 as untranslated. so instead of doing dynamic nat, we should have done identity nat to itself.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let us remove that global we previously added and implement statics instead, and then clear the nat tables&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;##############&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no global&amp;nbsp; (intf2) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,intf2) 172.20.xx.0 172.20.xx.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;! (put correct address on xx)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear local-host&lt;/P&gt;&lt;P&gt;###############&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last 2 commands will tear down existing connections, and then they will get rebuilt when establishing new one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also note, a number of your access-lists have wrong direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one applied to intf2 is completely wrong.&lt;/P&gt;&lt;P&gt;access-list intf2_access_in extended permit ip 172.20.XX.XX.0&amp;nbsp; 255.255.255.0 192.168.0.0 255.255.252.0 (it should be the other way around)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list intf2_access_in extended permit ip 192.168.0.0 255.255.252.0&amp;nbsp; 172.20.XX.XX.0&amp;nbsp; 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you need traffic flowing from intf2 to inside, please correct this, by puttin no in front of first line, and reissue the corrected command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;######&lt;/P&gt;&lt;P&gt;no access-list intf2_access_in extended permit ip 172.20.XX.XX&amp;nbsp; 255.255.255.0 192.168.0.0 255.255.252.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list intf2_access_in extended permit ip&amp;nbsp; 192.168.0.0 255.255.252.0&amp;nbsp; 172.20.XX.XX.0&amp;nbsp; 255.255.255.0&lt;/P&gt;&lt;P&gt;#######&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above command have to be modified a bit to be taken in by firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lots of the lines in the other applied access-lists are wrong and don't make sense (source/destination reversed) , however so far things go though due to the first few line being permit ip any any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;####################&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit udp object-group&amp;nbsp; MainstayCCnetwork 172.17.XX.XX 255.255.255.240 &lt;BR /&gt;access-list&amp;nbsp; outside_access_in extended permit tcp object-group MainstayCCnetwork&amp;nbsp; 172.17.XX.XX 255.255.255.240 eq h323 &lt;BR /&gt;access-list outside_access_in&amp;nbsp; extended permit udp object-group MainstayCCnetwork 172.17.XX.XX&amp;nbsp; 255.255.255.240 eq sip &lt;BR /&gt;access-list outside_access_in extended permit&amp;nbsp; tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6498&amp;nbsp; &lt;BR /&gt;access-list outside_access_in extended permit tcp object-group&amp;nbsp; MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq 6499 &lt;BR /&gt;access-list&amp;nbsp; outside_access_in extended permit tcp object-group MainstayCCnetwork&amp;nbsp; 172.17.XX.XX 255.255.255.240 eq 6500 &lt;BR /&gt;access-list outside_access_in&amp;nbsp; extended permit tcp object-group MainstayCCnetwork 172.17.XX.XX&amp;nbsp; 255.255.255.240 eq 6565 &lt;BR /&gt;access-list outside_access_in extended&amp;nbsp; permit tcp object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240&amp;nbsp; eq smtp &lt;BR /&gt;access-list outside_access_in extended permit tcp&amp;nbsp; object-group MainstayCCnetwork 172.17.XX.XX 255.255.255.240 eq ldap&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp 172.17.XX.XX&amp;nbsp; 255.255.255.240 object-group MainstayCCnetwork &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240&amp;nbsp; object-group MainstayCCnetwork eq 14300 &lt;BR /&gt;access-list inside_access_in&amp;nbsp; extended permit tcp 172.17.XX.XX 255.255.255.240 object-group&amp;nbsp; MainstayCCnetwork eq h323 &lt;BR /&gt;access-list inside_access_in extended&amp;nbsp; permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork&amp;nbsp; eq 6498 &lt;BR /&gt;access-list inside_access_in extended permit tcp&amp;nbsp; 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork eq 6499 &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240&amp;nbsp; object-group MainstayCCnetwork eq 6503 &lt;BR /&gt;access-list inside_access_in&amp;nbsp; extended permit tcp 172.17.XX.XX 255.255.255.240 object-group&amp;nbsp; MainstayCCnetwork eq 6565 &lt;BR /&gt;access-list inside_access_in extended&amp;nbsp; permit tcp 172.17.XX.XX 255.255.255.240 object-group MainstayCCnetwork&amp;nbsp; eq www &lt;BR /&gt;access-list inside_access_in extended permit tcp 172.17.XX.XX&amp;nbsp; 255.255.255.240 object-group MainstayCCnetwork eq smtp &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240&amp;nbsp; object-group MainstayCCnetwork eq ldap &lt;BR /&gt;access-list inside_access_in&amp;nbsp; extended permit tcp 172.17.XX.XX 255.255.255.240 object-group&amp;nbsp; InstaCCnetwork eq 6500 &lt;BR /&gt;access-list inside_access_in extended permit&amp;nbsp; tcp 172.17.XX.XX 255.255.255.240 object-group InstaCCnetwork eq 6505 &lt;BR /&gt;access-list&amp;nbsp; inside_access_in extended permit tcp 172.17.XX.XX 255.255.255.240&amp;nbsp; object-group InstaCCnetwork eq 6508 &lt;BR /&gt;access-list inside_access_in&amp;nbsp; extended permit tcp 172.17.XX.XX 255.255.255.240 object-group&amp;nbsp; MainstayCCnetwork range 14001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#########################&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still have problems, pease provide the latest configuration you have, and the new logs you are getting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I do not see you testing the pings, does the pings work now?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jun 2010 02:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478050#M635041</guid>
      <dc:creator>edadios</dc:creator>
      <dc:date>2010-06-17T02:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: Portmap Error creation</title>
      <link>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478051#M635042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank You very much the now the network is fine .. Thank you for support&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jun 2010 07:44:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/portmap-error-creation/m-p/1478051#M635042</guid>
      <dc:creator>rsjavahar</dc:creator>
      <dc:date>2010-06-22T07:44:24Z</dc:date>
    </item>
  </channel>
</rss>

