<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5508-X NAT/PAT Intermittenly unresponsive in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809940#M6804</link>
    <description>&lt;P&gt;I have adjusted my syslog settings so it can take a look at the logs when I lose connection, checking on it every hour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also working to rewrite my ACLs using the method you posted, thank you for the information. I will reply again once I have logs during a failure.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Feb 2019 14:15:07 GMT</pubDate>
    <dc:creator>TobyB</dc:creator>
    <dc:date>2019-02-26T14:15:07Z</dc:date>
    <item>
      <title>ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3808707#M6790</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently installed a new 5508-X running 9.9(2) in our environment. All is well save for one server that we have a static NAT for. At a random point in the day, the NAT seems to break, and no traffic is passed to or from said server. xlate shows the NAT as idle, and the server remains accessible over the LAN and l2l VPN, but no true internet access on the server. I have confirmed with our ISP that the static is functioning properly, and have even migrated to a different static to verify this. My most recent troubleshooting step was to move to PAT for the websever/other services, and the behavior is still present.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I see nothing in the logs when the connection drops. Debugging doesn't show any TCP connections being built when I try to access the server from the outside, or when I try to access the internet from the server when i had the NAT in place. I have other servers/services using NAT that have no issues. I have not been able to nail down a consistent time that the behavior starts, but it seems to be when the server itself goes idle after work hours. The behavior started the day that I installed the firewall. Throwing the old firewall back in place resolves the issue (pre 8.3 if that matters.) I am not sure where to look next to troubleshoot this, but everything points to it being my ASA. Any help is greatly appreciated. Config below.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;names&amp;nbsp;&lt;/P&gt;
&lt;P&gt;name 172.31.250.1 HS-L3 description HS-3560&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nameif outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;security-level 0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip address 5.5.5.5 255.255.255.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nameif inside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;security-level 100&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip address 172.31.250.100 255.255.255.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/4&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/6&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/7&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/8&amp;nbsp;&lt;/P&gt;
&lt;P&gt;shutdown&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no ip address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;interface Management1/1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;management-only&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no nameif&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no security-level&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip address 192.168.45.45 255.255.255.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;banner motd *--UNAUTHORIZED ACCESS IS STRICTLY PROHIBITED BY LAW--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ftp mode passive&amp;nbsp;&lt;/P&gt;
&lt;P&gt;clock timezone EST -5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;clock summer-time EST recurring&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dns server-group DefaultDNS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;domain-name HSk12.org&amp;nbsp;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network obj_any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;subnet 0.0.0.0 0.0.0.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-LDAPS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.0.12&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-RDP-55550&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.0.22&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-WWW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.2.250&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-1911&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.2.250&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-3011&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.2.250&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-APPS3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.0.26&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-IPTVCOMMAND&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.72.10&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-SMOOTHWALL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;host 172.31.250.3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network PROBLEM-SERVER &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;host 172.31.0.30&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;object-group network Airwatch&amp;nbsp;&lt;/P&gt;
&lt;P&gt;description Airwatch Whitelist Addresses&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 63.128.77.234&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 209.66.96.114&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 63.128.77.238&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 209.208.228.192&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 209.208.228.198&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object host 216.235.137.253&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object-group network Edlio&amp;nbsp;&lt;/P&gt;
&lt;P&gt;description Edlio Whitelist for LDAP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object 192.40.145.0 255.255.255.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object-group network OBJ-LOCAL-SITE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object 172.31.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object-group network OBJ-REMOTE-SITE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;network-object 172.31.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--Inbound Access List--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--Smoothwall ACL Start--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq www&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq 805&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq 800&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq 442&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq 441&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.250.3 eq https&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--Smoothwall ACL End--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--RDP ALLOW--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.22 eq 55550&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--eSports ACL Start--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--League ACL Entries--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any eq 5223 any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp host 23.13.146.217 host 172.31.250.100&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp host 23.79.196.176 eq https host 172.31.250.100&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--eSports ACL End--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--HVAC ACL Start--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.2.250&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--HVAC ACL End--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq https&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In remark *--PROBLEM SERVER ACL Start--*&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq 8443&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq 7880&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq 5071&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq ftp&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq ftp-data&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq www&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In remark *--Remote Access to PROBLEM SERVER--*&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.0.30 eq 55550&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp host 204.14.14.18 gt 1023 host 172.31.0.30 eq sqlnet&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp host 204.14.12.2 gt 1023 host 172.31.0.30 eq sqlnet&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In remark *--ASM Connection to PROBLEM SERVER--*&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In extended permit tcp host 189.72.146.214 gt 1023 host 172.31.0.30 eq telnet&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;access-list HS-Filter-In remark *--PROBLEM SERVER ACL End--*&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--IPTV ACL Start--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit udp any gt 1023 host 172.31.71.101 eq snmp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any gt 1023 host 172.31.72.10 eq www&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp any host 172.31.72.10&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--IPTV ACL End--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--LDAPS ACL Start--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp object-group Edlio gt 1023 host 172.31.0.12 eq ldaps&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended permit tcp host 198.154.98.170 gt 1023 host 172.31.0.12 eq ldaps&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In remark *--LDAP ACL End--*&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny udp any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny tcp any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny icmp any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny gre any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny esp any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list HS-Filter-In extended deny ip any any log warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list VPN extended permit ip 172.31.0.0 255.255.0.0 172.31.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list VPN extended permit ip object-group OBJ-LOCAL-SITE object-group OBJ-REMOTE-SITE&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list NONAT extended permit ip 172.31.0.0 255.255.0.0 172.31.0.0 255.255.0.0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;pager lines 24&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging enable&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging timestamp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging buffer-size 60000&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging buffered debugging&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging trap debugging&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging asdm warnings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging host inside 172.31.0.26&amp;nbsp;&lt;/P&gt;
&lt;P&gt;mtu outside 1500&amp;nbsp;&lt;/P&gt;
&lt;P&gt;mtu inside 1500&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no failover&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no monitor-interface service-module&amp;nbsp;&lt;/P&gt;
&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no asdm history enable&amp;nbsp;&lt;/P&gt;
&lt;P&gt;arp timeout 14400&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no arp permit-nonconnected&amp;nbsp;&lt;/P&gt;
&lt;P&gt;arp rate-limit 16384&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static OBJ-LOCAL-SITE OBJ-LOCAL-SITE destination static OBJ-REMOTE-SITE OBJ-REMOTE-SITE no-proxy-arp route-lookup&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network obj_any&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) dynamic interface&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-LDAPS&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.6.152 service tcp ldaps ldaps&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-RDP-55550&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.7.116 service tcp 55550 55550&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-WWW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.6.152 service tcp www www&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-1911&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static XXX.XXX.6.152 service tcp 1911 1911&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-HVAC-3011&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.6.152 service tcp 3011 3011&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-APPS3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.7.136&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-IPTVCOMMAND&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.7.115&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network HS-SMOOTHWALL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static 5.5.7.116&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network PROBLEM-SERVER &lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) static 5.5.7.137 &lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;access-group HS-Filter-In in interface outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route outside 0.0.0.0 0.0.0.0 5.5.6.1 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route inside 172.31.0.0 255.255.248.0 HS-L3 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route inside 172.31.16.0 255.255.254.0 HS-L3 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route inside 172.31.28.0 255.255.252.0 HS-L3 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;route inside 172.31.72.0 255.255.255.0 HS-L3 1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout xlate 3:00:00&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout pat-xlate 0:00:30&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout floating-conn 0:00:00&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout conn-holddown 0:00:15&amp;nbsp;&lt;/P&gt;
&lt;P&gt;timeout igp stale-route 0:01:10&amp;nbsp;&lt;/P&gt;
&lt;P&gt;user-identity default-domain LOCAL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication serial console LOCAL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authorization exec authentication-server&amp;nbsp;&lt;/P&gt;
&lt;P&gt;aaa authentication login-history&amp;nbsp;&lt;/P&gt;
&lt;P&gt;snmp-server host inside 172.31.0.60 community *****&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no snmp-server location&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no snmp-server contact&amp;nbsp;&lt;/P&gt;
&lt;P&gt;snmp-server community *****&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no service sw-reset-button&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ipsec ikev1 transform-set VPN esp-aes esp-md5-hmac&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 match address VPN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 set pfs&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 set peer 6.6.6.6&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 set ikev1 transform-set VPN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 set security-association lifetime seconds 28800&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN 1 set security-association lifetime kilobytes 4608000&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto map VPN interface outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ca trustpoint _SmartCallHome_ServerCA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no validation-usage&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crl configure&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ca trustpool policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ca certificate chain _SmartCallHome_ServerCA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;certificate ca 0509&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 308205b7 3082039f a0030201 02020205 09300d06 092a8648 86f70d01 01050500&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3045310b 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6973204c 696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6f742043 41203230 1e170d30 36313132 34313832 3730305a 170d3331 31313234&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31383233 33335a30 45310b30 09060355 04061302 424d3119 30170603 55040a13&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1051756f 56616469 73204c69 6d697465 64311b30 19060355 04031312 51756f56&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 61646973 20526f6f 74204341 20323082 0222300d 06092a86 4886f70d 01010105&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 00038202 0f003082 020a0282 0201009a 18ca4b94 0d002daf 03298af0 0f81c8ae&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4c19851d 089fab29 4485f32f 81ad321e 9046bfa3 86261a1e fe7e1c18 3a5c9c60&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172a3a74 8333307d 615411cb edabe0e6 d2a27ef5 6b6f18b7 0a0b2dfd e93eef0a&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; c6b310e9 dcc24617 f85dfda4 daff9e49 5a9ce633 e62496f7 3fba5b2b 1c7a35c2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d667feab 66508b6d 28602bef d760c3c7 93bc8d36 91f37ff8 db1113c4 9c7776c1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; aeb7026a 817aa945 83e205e6 b956c194 378f4871 6322ec17 6507958a 4bdf8fc6&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5a0ae5b0 e35f5e6b 11ab0cf9 85eb44e9 f80473f2 e9fe5c98 8cf573af 6bb47ecd&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; d45c022b 4c39e1b2 95952d42 87d7d5b3 9043b76c 13f1dedd f6c4f889 3fd175f5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 92c391d5 8a88d090 ecdc6dde 89c26571 968b0d03 fd9cbf5b 16ac92db eafe797c&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; adebaff7 16cbdbcd 252be51f fb9a9fe2 51cc3a53 0c48e60e bdc9b476 0652e611&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 13857263 0304e004 362b2019 02e874a7 1fb6c956 66f07525 dc67c10e 616088b3&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3ed1a8fc a3da1db0 d1b12354 df44766d ed41d8c1 b222b653 1cdf351d dca1772a&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 31e42df5 e5e5dbc8 e0ffe580 d70b63a0 ff33a10f ba2c1515 ea97b3d2 a2b5bef2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8c961e1a 8f1d6ca4 6137b986 7333d797 969e237d 82a44c81 e2a1d1ba 675f9507&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a32711ee 16107bbc 454a4cb2 04d2abef d5fd0c51 ce506a08 31f991da 0c8f645c&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03c33a8b 203f6e8d 673d3ad6 fe7d5b88 c95efbcc 61dc8b33 77d34432 35096204&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 921610d8 9e2747fb 3b21e3f8 eb1d5b02 03010001 a381b030 81ad300f 0603551d&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 130101ff 04053003 0101ff30 0b060355 1d0f0404 03020106 301d0603 551d0e04&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1604141a 8462bc48 4c332504 d4eed0f6 03c41946 d1946b30 6e060355 1d230467&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30658014 1a8462bc 484c3325 04d4eed0 f603c419 46d1946b a149a447 3045310b&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30090603 55040613 02424d31 19301706 0355040a 13105175 6f566164 6973204c&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 696d6974 6564311b 30190603 55040313 1251756f 56616469 7320526f 6f742043&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 41203282 02050930 0d06092a 864886f7 0d010105 05000382 0201003e 0a164d9f&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 065ba8ae 715d2f05 2f67e613 4583c436 f6f3c026 0c0db547 645df8b4 72c946a5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 03182755 89787d76 ea963480 1720dce7 83f88dfc 07b8da5f 4d2e67b2 84fdd944&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fc775081 e67cb4c9 0d0b7253 f8760707 4147960c fbe08226 93558cfe 221f6065&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7c5fe726 b3f73290 9850d437 7155f692 2178f795 79faf82d 26876656 3077a637&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 78335210 58ae3f61 8ef26ab1 ef187e4a 5963ca8d a256d5a7 2fbc561f cf39c1e2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fb0aa815 2c7d4d7a 63c66c97 443cd26f c34a170a f890d257 a21951a5 2d9741da&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 074fa950 da908d94 46e13ef0 94fd1000 38f53be8 40e1b46e 561a20cc 6f588ded&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2e458fd6 e9933fe7 b12cdf3a d6228cdc 84bb226f d0f8e4c6 39e90488 3cc3baeb&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 557a6d80 9924f56c 01fbf897 b0945beb fdd26ff1 77680d35 6423acb8 55a103d1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4d4219dc f8755956 a3f9a849 79f8af0e b911a07c b76aed34 d0b62662 381a870c&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f8e8fd2e d3907f07 912a1dd6 7e5c8583 99b03808 3fe95ef9 3507e4c9 626e577f&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a75095f7 bac89be6 8ea201c5 d666bf79 61f33c1c e1b9825c 5da0c3e9 d848bd19&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; a2111419 6eb2861b 683e4837 1a88b75d 965e9cc7 ef276208 e291195c d2f121dd&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ba174282 97718153 31a99ff6 7d62bf72 e1a3931d cc8a265a 0938d0ce d70d8016&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; b478a53a 874c8d8a a5d54697 f22c10b9 bc5422c0 01506943 9ef4b2ef 6df8ecda&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; f1e3b1ef df918f54 2a0b25c1 2619c452 100565d5 8210eac2 31cd2e&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; quit&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ikev1 enable outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ikev1 policy 5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;authentication pre-share&amp;nbsp;&lt;/P&gt;
&lt;P&gt;encryption aes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hash md5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;group 2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;lifetime 86400&amp;nbsp;&lt;/P&gt;
&lt;P&gt;telnet timeout 5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh stricthostkeycheck&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh timeout 5&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh version 2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssh key-exchange group dh-group1-sha1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;console timeout 0&amp;nbsp;&lt;/P&gt;
&lt;P&gt;management-access outside&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no threat-detection basic-threat&amp;nbsp;&lt;/P&gt;
&lt;P&gt;threat-detection statistics access-list&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no threat-detection statistics tcp-intercept&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ntp server 172.31.0.12&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl cipher default low&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl cipher tlsv1 low&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl cipher tlsv1.1 low&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl cipher tlsv1.2 low&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ssl cipher dtlsv1 low&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username admin password XXX privilege 15&amp;nbsp;&lt;/P&gt;
&lt;P&gt;username admin attributes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;service-type admin&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tunnel-group 6.6.6.6 type ipsec-l2l&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tunnel-group 6.6.6.6 ipsec-attributes&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ikev1 pre-shared-key *****&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class-map inspection_default&amp;nbsp;&lt;/P&gt;
&lt;P&gt;match default-inspection-traffic&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map type inspect dns migrated_dns_map_1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;parameters&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum client auto&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum 512&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no tcp-inspection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map global_policy&amp;nbsp;&lt;/P&gt;
&lt;P&gt;class inspection_default&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect dns migrated_dns_map_1&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;policy-map type inspect dns migrated_dns_map_2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;parameters&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum client auto&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; message-length maximum 512&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; no tcp-inspection&amp;nbsp;&lt;/P&gt;
&lt;P&gt;!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3808707#M6790</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2020-02-21T16:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809244#M6791</link>
      <description>&lt;P&gt;i have few questions.&lt;/P&gt;&lt;P&gt;1. can you do packet trace to from server to outside when the NAT functionality fails and see what it says.&lt;/P&gt;&lt;P&gt;2. do yo need to use gt-1023 port on acls?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 17:50:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809244#M6791</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2019-02-25T17:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809480#M6793</link>
      <description>&lt;P&gt;1. Packet Trace. Please let me know if I did something incorrectly with my command, I am still learning a lot with ASA troubleshooting:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FW# packet-tracer input inside tcp 172.31.0.30 443 9.9.9.9 https detailed&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad9c49bf0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=2286783, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 5.5.5.1 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;&lt;STRONG&gt;object network PROBLEM SERVER&lt;/STRONG&gt;&lt;BR /&gt;nat (inside,outside) static 5.5.5.5&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 172.31.0.30/443 to 5.5.5.5/443&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad9cbfb20, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=53, user_data=0x2aaad9cbeda0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.31.0.30, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=outside&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad8918ef0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=325850, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad9c51f10, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=191699, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=inside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad8918ef0, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt;hits=325852, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad9bba1c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=202298, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=outside, output_ifc=any&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 194493, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 5.5.5.1 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 0000.8888.4444 hits 63 reference 105&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Is there a better/different option, or is that unnecessary? I am going from some notes that I had from a colleague plus the structure of my legacy firewall. It was pre 8.3 though, so I am still getting accustomed to some of the new commands.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for replying, I appreciate the help with this.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 00:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809480#M6793</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-26T00:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809511#M6798</link>
      <description>&lt;P&gt;i dont see any drops on packet trace. so far i can say is capture the logs during the failure and see what happend.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and can you add&lt;/P&gt;&lt;P&gt;"logging trap informational"&lt;BR /&gt;also can you export the logs from firewall to a remote syslog server so that we can see what happened when the "NAT" failed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;your acl structure is old fashioned like prior to 8.3 as you said. you have to use object-group format, which makes more sense to read and audit the firewall config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is suggested structure for configuration format to follow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network HS-LDAP-SVR&lt;BR /&gt;network-object host 172.31.0.12&lt;BR /&gt;object-group network HS-RDP-55550&lt;BR /&gt;network-object host 172.31.0.22&lt;BR /&gt;object-group network HS-HVAC-WWW&lt;BR /&gt;network-object host 172.31.2.250&lt;BR /&gt;object-group network PROBLEM-SVR&lt;BR /&gt;network-object host 172.31.0.30&lt;/P&gt;&lt;P&gt;object-group network HOST_204.14.14.18&lt;BR /&gt;network-object host 204.14.14.18&lt;BR /&gt;object-group network HOST_204.14.12.2&lt;BR /&gt;network-object host 204.14.12.2&lt;/P&gt;&lt;P&gt;object-group network SQL_HOSTS&lt;BR /&gt;group-object HOST_204.14.14.18&lt;BR /&gt;group-object HOST_204.14.12.2&lt;/P&gt;&lt;P&gt;object-group network 189-72-146-214.PVOCE702_IP&lt;BR /&gt;network-object host 189.72.146.214&lt;/P&gt;&lt;P&gt;object-group service tcpWWW tcp&lt;BR /&gt;port-object eq www&lt;BR /&gt;object-group service TCP_TELNET tcp&lt;BR /&gt;port-object eq telnet&lt;/P&gt;&lt;P&gt;object-group service tcpFTPDATA tcp&lt;BR /&gt;port-object eq ftp&lt;BR /&gt;port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group service tcpSSL tcp&lt;BR /&gt;port-object eq 8443&lt;BR /&gt;port-object eq 7880&lt;BR /&gt;port-object eq 5071&lt;/P&gt;&lt;P&gt;object-group service tcpRMT_ACCESS tcp&lt;BR /&gt;port-object eq 55550&lt;BR /&gt;object-group service tcpSQL tcp&lt;BR /&gt;port-object eq sqlnet&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list HS-Filter-In remark ***--PROBLEM SERVER ACL Start--***&lt;BR /&gt;access-list HS-Filter-In extended permit tcp any object-group PROBLEM-SVR object-group tcpSSL log&lt;BR /&gt;access-list HS-Filter-In extended permit tcp any object-group PROBLEM-SVR object-group tcpWWW log&lt;BR /&gt;access-list HS-Filter-In extended permit tcp any object-group PROBLEM-SVR object-group tcpFTPDATA log&lt;BR /&gt;access-list HS-Filter-In remark *--Remote Access to PROBLEM SERVER--*&lt;BR /&gt;access-list HS-Filter-In extended permit tcp any object-group PROBLEM-SVR object-group tcpRMT_ACCESS log&lt;BR /&gt;access-list HS-Filter-In extended permit tcp object-group SQL_HOSTS object-group PROBLEM-SVR object-group tcpSQL log&lt;/P&gt;&lt;P&gt;access-list HS-Filter-In remark *--ASM Connection to PROBLEM SERVER--*&lt;BR /&gt;access-list HS-Filter-In extended permit tcp object-group 189-72-146-214.PVOCE702_IP object-group PROBLEM-SVR object-group TCP_TELNET log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 02:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809511#M6798</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2019-02-26T02:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809940#M6804</link>
      <description>&lt;P&gt;I have adjusted my syslog settings so it can take a look at the logs when I lose connection, checking on it every hour.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am also working to rewrite my ACLs using the method you posted, thank you for the information. I will reply again once I have logs during a failure.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 14:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3809940#M6804</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-26T14:15:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810133#M6807</link>
      <description>&lt;P&gt;Great&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 16:49:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810133#M6807</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2019-02-26T16:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810200#M6809</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I see this repeated in the logs before I noticed the failure.&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:43:35 Local4.Info 172.31.250.100 Feb 26 2019 11:43:35: %ASA-6-302013: Built outbound TCP connection 1155584 for outside:52.37.78.48/443 (52.37.78.48/443) to inside:172.31.0.30/58724 (5.5.5.5/58724)&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2019-02-26 11:43:35 Local4.Info 172.31.250.100 Feb 26 2019 11:43:35: %ASA-6-302014: Teardown TCP connection 1155576 for outside:52.37.78.48/443 to inside:172.31.0.30/58723 duration 0:00:00 bytes 1931 TCP FINs from inside&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;2019-02-26 11:43:35 Local4.Info 172.31.250.100 Feb 26 2019 11:43:35: %ASA-6-106015: Deny TCP (no connection) from 172.31.0.30/58723 to 52.37.78.48/443 flags RST on interface inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I check my mobile device to see if the service is still working, webpage times out&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:43:43 Local4.Info 172.31.250.100 Feb 26 2019 11:43:43: %ASA-6-106100: access-list HS-Filter-In permitted tcp outside/34.211.131.161(2197) -&amp;gt; inside/172.31.0.30(443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:43:43&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:43:43: %ASA-6-302013: Built inbound TCP connection 1155765 for outside:34.211.131.161/2197 (34.211.131.161/2197) to inside:172.31.0.30/443 (5.5.5.5/443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;ACL hits showing permitted but service still unavailable, no tcp builds&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:44:17&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:44:17: %ASA-6-106100: access-list HS-Filter-In permitted tcp outside/34.211.131.161(21578) -&amp;gt; inside/172.31.0.30(443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:44:17&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:44:17: %ASA-6-106100: access-list HS-Filter-In permitted tcp outside/34.211.131.161(65136) -&amp;gt; inside/172.31.0.30(443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Large chunks of tcp builds from a client accessing service via VPN can be seen (service still works on my LAN and over VPN, just thought this seemed like a rather large chunk of requests?) There are several large groups of these. This user is not on site in the evenings when the service fails though, so I don’t believe this is to blame?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159261 for outside:172.31.11.58/52057 (172.31.11.58/52057) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159262 for outside:172.31.11.58/52056 (172.31.11.58/52056) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159263 for outside:172.31.11.58/52058 (172.31.11.58/52058) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159264 for outside:172.31.11.58/52059 (172.31.11.58/52059) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159265 for outside:172.31.11.58/52060 (172.31.11.58/52060) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159266 for outside:172.31.11.58/52061 (172.31.11.58/52061) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159267 for outside:172.31.11.58/52062 (172.31.11.58/52062) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159268 for outside:172.31.11.58/52063 (172.31.11.58/52063) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159270 for outside:172.31.11.58/52066 (172.31.11.58/52066) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159273 for outside:172.31.11.58/52069 (172.31.11.58/52069) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:45:51&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:45:51: %ASA-6-302013: Built inbound TCP connection 1159269 for outside:172.31.11.58/52065 (172.31.11.58/52065) to inside:172.31.0.30/443 (172.31.0.30/443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;I remove the NAT statement for server, RDP to server, access the internet via browser on the affected server, replace NAT statement, open a browser on the server again, and then the connections become available again. Only solution that I have found to restore access temporarily.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;2019-02-26 11:43:43&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:43:43: %ASA-6-106100: access-list HS-Filter-In permitted tcp outside/34.211.131.161(2197) -&amp;gt; inside/172.31.0.30(443)&lt;/P&gt;
&lt;P&gt;2019-02-26 11:43:43&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local4.Info&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.31.250.100 Feb 26 2019 11:43:43: %ASA-6-302013: Built inbound TCP connection 1155765 for outside:34.211.131.161/2197 (34.211.131.161/2197) to inside:172.31.0.30/443 (5.5.5.5/443)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't see anything out of the ordinary here, just the sudden drop of TCP connections being built. Strange that it built one when I checked on my mobile device if the service was working or not. Again, thank you for taking the time to look.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 18:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810200#M6809</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-26T18:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810363#M6810</link>
      <description>&lt;P&gt;You need to change the order of NAT rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network PROBLEM-SERVER&lt;BR /&gt;host 172.31.0.30&lt;BR /&gt;!&lt;BR /&gt;object network PROBLEM-SERVER-MAP-IP&lt;BR /&gt;host 5.5.7.137&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) 2 source static PROBLEM-SERVER PROBLEM-SERVER-MAP-IP&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 21:37:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810363#M6810</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-02-26T21:37:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810367#M6811</link>
      <description>&lt;P&gt;I thought that the way I had things set up that it would be dynamically taken care of. I've made the changes, will monitor to see if behavior continues and report back. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 21:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3810367#M6811</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-26T21:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3811378#M6812</link>
      <description>&lt;P&gt;Apologies for taking a while to respond to if this has worked or not...several power outages this week have interrupted my ability to monitor performance. It has been acting better, but I don't have a clear grasp on if it is solved or yet.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 01:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3811378#M6812</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-28T01:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3811683#M6813</link>
      <description>&lt;P&gt;Still seeing the same behavior. My syslog server did not come back up properly after the power outage last night, so I am working on capturing more logs now.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Feb 2019 12:30:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3811683#M6813</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-02-28T12:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3813522#M6814</link>
      <description>&lt;P&gt;After having more time to observe and catching logs, the issue persists, but the behavior is now different after adjusting the NAT statement. Before moving my NAT rule, one the connection was severed, I had to remove then re-add the NAT rule to bring access back online. Now, access comes back after a short period of time (roughly 1 hour seems to be the trend) with no intervention from me. Logs are still the same as posted previously, no warnings/errors, there is just a random point where TCP builds stop happening, and a random point where they resume for that one NAT.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 13:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3813522#M6814</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-03-04T13:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3813569#M6815</link>
      <description>&lt;P&gt;Is this server is access able on the VPN. as you have site-to-site vpn configured. if so could you also confirm the site-to-site vpn user having this issue too?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what is the average load of traffic on your ASA box?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have look into your config. Cant see any issue in regards to the NAT rules and other config. none spotted any issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Mar 2019 15:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3813569#M6815</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-04T15:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5508-X NAT/PAT Intermittenly unresponsive</title>
      <link>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3817392#M6816</link>
      <description>&lt;P&gt;Follow up on this. After initially making the changes, the behavior changed but I still had some issues. A week later it has now gone away completely. I believe that there was more than one issue at play here, but this step is what stabilized things. Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5508-x-nat-pat-intermittenly-unresponsive/m-p/3817392#M6816</guid>
      <dc:creator>TobyB</dc:creator>
      <dc:date>2019-03-11T13:46:06Z</dc:date>
    </item>
  </channel>
</rss>

