<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing External Traffic on Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3785079#M7668</link>
    <description>&lt;P&gt;you have not change the nat rules put in this order&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source static SERVER interface service CUSTOM80 CUSTOM81&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (inside,outside) source static SERVER interface service CUSTOM81 CUSTOM80&lt;/STRONG&gt;&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no access-list outside_access_in extended permit tcp any object SERVER eq 80&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;access-list outside_access_in extended permit tcp any object SERVER eq 81&lt;/STRONG&gt;&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 8.8.8.8 81 96.89.224.197 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;====================================================================&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;This is the config you just put them earlier change them as describe above. I test them in lab enviroment you should be ok now. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static Utility1 interface service CUSTOM80 CUSTOM81&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 22 Jan 2019 14:17:09 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-01-22T14:17:09Z</dc:date>
    <item>
      <title>Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782224#M7641</link>
      <description>&lt;P&gt;Hi - I have a Cisco ASA and I'm really struggling with something very simple. I have an outside interface and I would like to allow traffic to hit the outside interface on TCP Port 81 and get NAT'd to a private IP on a webserver. I believe I have the NAT piece of the equation solved but the ACL is processed first and I can't figure out the ACL for the life of me. Here's what I have:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the outside interface, I created an incoming rule with any source, any destination and a service of TCP Port 81. However, when I run a Packet Tracer from any public IP to the IP of the outside interface on Port 81 the packet is dropped via an implicit rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm running ASA 9.9, thoughts?&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PacketTracer.png" style="width: 0px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/28083i47624FD6D09265D0/image-size/small?v=v2&amp;amp;px=200" width="0" height="0" role="button" title="PacketTracer.png" alt="PacketTracer.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rule.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/28081i66462E40204B9B04/image-size/large?v=v2&amp;amp;px=999" role="button" title="Rule.png" alt="Rule.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Interfaces.png" style="width: 758px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/28082i6172E502F47450D5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Interfaces.png" alt="Interfaces.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PacketTracer.png" style="width: 748px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/28084iD6D41E0382514E93/image-size/large?v=v2&amp;amp;px=999" role="button" title="PacketTracer.png" alt="PacketTracer.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:40:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782224#M7641</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2020-02-21T16:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782268#M7642</link>
      <description>Hi,&lt;BR /&gt;Not 100% sure of your exact configuration, but you would specify the real IP address and port in the ACL. See example:-&lt;BR /&gt;&lt;BR /&gt;object nat SRV1&lt;BR /&gt; host 10.2.2.5&lt;BR /&gt; nat (inside,outside) static 96.89.224.197 service tcp 80 81&lt;BR /&gt;access-list OUTSIDE_IN permit tcp any host 10.2.2.5 eq 80&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Thu, 17 Jan 2019 16:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782268#M7642</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-17T16:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782278#M7643</link>
      <description>&lt;P&gt;You need this.&lt;BR /&gt;&lt;BR /&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.2.2.5&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 80 81&lt;BR /&gt;!&lt;BR /&gt;access-list outside_in permit tcp any host 10.2.2.5 eq 80&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;!&lt;BR /&gt;packet tracer input outside tcp 8.8.8.8 1234 10.2.2.5 eq 81&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 17:05:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782278#M7643</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-17T17:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782323#M7644</link>
      <description>&lt;P&gt;So, unfortunately I'm having trouble with the NAT statement you suggested. I think via my Googling I've found that 8.3+ requires a new NAT format and syntax. Here is what I typed to try to get it as close to yours as possible:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had to create Service Objects as it wouldn't let me specify the port explicitly. I also&amp;nbsp;had to add the source parameter before the word static.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately, even with this command and the the access-list/access-group commands I still get dropped packets via an implicit rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Config snippets:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.1.2.0_26 NETWORK_OBJ_10.1.2.0_26 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source dynamic obj_any interface&lt;BR /&gt;nat (wlan,outside) source dynamic obj_any interface&lt;BR /&gt;nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service Port80&lt;BR /&gt; service tcp source eq www destination eq www&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object service Port81&lt;BR /&gt; service tcp destination eq 81&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list outside_in extended permit tcp any host 10.1.1.79 eq www &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;access-group inside_access_out_1 out interface inside&lt;BR /&gt;access-group wlan_access_in_1 in interface wlan&lt;BR /&gt;access-group wlan_access_out out interface wlan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've attached the entire config file if that would be more helpful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 18:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782323#M7644</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2019-01-17T18:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782353#M7645</link>
      <description>&lt;P&gt;You've defined your nat statement globally, rather than under the object "Utility1", the ACL is also wrong, you need to reference the real port not the natted port. Example:-&lt;BR /&gt;&lt;BR /&gt;object network Utility1&lt;BR /&gt; host 10.1.1.79&lt;BR /&gt; nat (INSIDE,OUTSIDE) static interface service tcp www 81&lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Utility1 eq 80&lt;BR /&gt;&lt;BR /&gt;You don't have an access-group inbound on the outside interface. E.g- &lt;BR /&gt;&lt;BR /&gt;"access-group outside_access_in in interface outside"&lt;BR /&gt; &lt;BR /&gt;Remove the old configuration:- &lt;BR /&gt;no access-list outside_access_in extended permit tcp any host 10.1.1.79 range 81 81 &lt;BR /&gt;no nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 20:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782353#M7645</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-17T20:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782361#M7646</link>
      <description>&lt;P&gt;can you test this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) 1 source static SERVER interface service Port80 Port81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any host 10.1.1.79 range 81 81&lt;BR /&gt;no nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object SERVER eq 80&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(OR)&lt;/P&gt;&lt;P&gt;as i stated in my earlier post&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static interface service tcp 80 81&lt;BR /&gt;!&lt;BR /&gt;access-list outside_in permit tcp any host 10.1.1.79 eq 80&lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any host 10.1.1.79 range 81 81&lt;BR /&gt;no nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 19:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782361#M7646</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-17T19:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782373#M7647</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&lt;BR /&gt;is that typo error&lt;BR /&gt;access-list outside_access_in extended permit tcp any &lt;STRONG&gt;object Utility1 10.1.1.79&lt;/STRONG&gt; eq 80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;--------------&amp;gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jan 2019 19:49:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782373#M7647</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-17T19:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782387#M7648</link>
      <description>Good spot, amended original post</description>
      <pubDate>Thu, 17 Jan 2019 20:38:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3782387#M7648</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-17T20:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783205#M7649</link>
      <description>&lt;P&gt;Hi - Unfortunately that didn't seem to make a difference. My packet-tracer still fails with an implicit rule drop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the snippets from my config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network Utility1&lt;BR /&gt; host 10.1.1.79&lt;/P&gt;
&lt;P&gt;access-list outside_access_in extended permit tcp any object Utility1 eq www&lt;/P&gt;
&lt;P&gt;object network Utility1&lt;BR /&gt; nat (inside,outside) static interface service tcp www 81&lt;/P&gt;
&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 19:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783205#M7649</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2019-01-18T19:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783209#M7650</link>
      <description>If you provide the output of the packet-tracer (run it from the CLI) we might be able to determine what the issue is.&lt;BR /&gt;My guess is possibly there is another NAT rule above the new NAT rule which it is matching against and therefore failing. &lt;BR /&gt;&lt;BR /&gt;You could also run "show nat" and check the output</description>
      <pubDate>Fri, 18 Jan 2019 19:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783209#M7650</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-18T19:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783210#M7651</link>
      <description>&lt;P&gt;Hey - Below is my show NAT and the packet tracer output. Thanks again for all of the help!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# show nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.1.2.0_26 NETWORK_OBJ_10.1.2.0_26 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 818, untranslate_hits = 881&lt;BR /&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 292844, untranslate_hits = 14867&lt;BR /&gt;3 (wlan) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 4092438, untranslate_hits = 308198&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static Utility1 interface service tcp www 81&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (any) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 15869, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa# packet-tracer input outside tcp 8.8.8.8 1234 10.1.1.79 81&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.1.1.79 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;ciscoasa#&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 19:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783210#M7651</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2019-01-18T19:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783211#M7652</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) 1 source static SERVER interface service Port80 Port81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any host 10.1.1.79 range 81 81&lt;BR /&gt;no nat (inside,outside) source static any interface service Port80 Port81&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apply these config as mentioned above it will work&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 20:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783211#M7652</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-18T20:00:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783214#M7653</link>
      <description>&lt;P&gt;It's probably being natted on this rule:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.1.2.0_26 NETWORK_OBJ_10.1.2.0_26 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 818, untranslate_hits = 881&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;2 (inside) to (outside) source dynamic obj_any interface&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt; translate_hits = 292844, untranslate_hits = 14867&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which would be processed before the new nat rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static Utility1 interface service tcp www 81&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try removing the Manual NAT rule #2, and configure a global nat rule that would be processed after the Auto NAT rules, this would move the rule to Section 3. e.g:-&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (INSIDE,OUTSIDE) after-auto source dynamic&amp;nbsp;obj_any interface interface&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 20:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783214#M7653</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-18T20:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783215#M7654</link>
      <description>&lt;P&gt;corret if you apply these it will work and fix your issue&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) 1 source static SERVER interface service Port80 Port81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 20:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783215#M7654</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-18T20:03:25Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783216#M7655</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;why you putting the rule in section 3. it should be in section 1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) 1 source static SERVER interface service Port80 Port81&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 20:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783216#M7655</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-18T20:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783265#M7656</link>
      <description>&lt;P&gt;Unfortunately, neither of the new NAT rules worked using the after-auto or "1" command to specify the order. I still get the same results of a dropped packet via an implicit rule. I also don't see any hits on the NAT rule or ACL. It's my understanding that the ACL is processed before the NAT rule so I'm wondering if that's where the issue resides...there has to be something I'm missing though...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Updated NAT table and packet-tracer below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa# show nat&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.1.2.0_26 NETWORK_OBJ_10.1.2.0_26 no-proxy-arp route-lookup&lt;BR /&gt; translate_hits = 818, untranslate_hits = 881&lt;BR /&gt;2 (wlan) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 4103849, untranslate_hits = 314450&lt;/P&gt;
&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static Utility1 interface service tcp www 81&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;2 (any) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 15919, untranslate_hits = 4&lt;/P&gt;
&lt;P&gt;Manual NAT Policies (Section 3)&lt;BR /&gt;1 (inside) to (outside) source dynamic obj_any interface&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input outside tcp 8.8.8.8 1234 10.1.1.79 81&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.1.1.79 using egress ifc inside&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jan 2019 21:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783265#M7656</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2019-01-18T21:40:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783286#M7657</link>
      <description>Your packet-tracer syntax was to the private ip address of the server not the public ip address. Change that and try again.&lt;BR /&gt;Did you actually test accessing the server over the internet?&lt;BR /&gt;&lt;BR /&gt;Can you provide the updated configuration acl, nat, objects etc.</description>
      <pubDate>Fri, 18 Jan 2019 22:04:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783286#M7657</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-01-18T22:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783311#M7658</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I have lab this up. your configuration were wrong. here is the right configuration.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.1.1.79&lt;/P&gt;&lt;P&gt;&amp;nbsp;!&lt;/P&gt;&lt;P&gt;object service CUSTOM80&lt;BR /&gt;&amp;nbsp;service tcp source eq 80&lt;BR /&gt;!&lt;BR /&gt;object service CUSTOM81&lt;BR /&gt;&amp;nbsp;service tcp source eq 81&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) source static SERVER interface service CUSTOM80 CUSTOM81&lt;BR /&gt;!&lt;BR /&gt;access-list outside_access_in extended permit tcp any object SERVER eq 80&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 8.8.8.8 1234 96.89.224.197 81&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 19 Jan 2019 11:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3783311#M7658</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-19T11:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3784226#M7659</link>
      <description>&lt;P&gt;Hi - I appreciate the help. Unfortunately, this didn't seem to work either. Although, this time the packet-tracer hits the NAT and gets through it but is stopped by the ACL. I've also re-attached the config.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input outside tcp 8.8.8.8 1234 96.89.224.197 81&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 96.89.224.197 using egress ifc identity&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jan 2019 12:47:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3784226#M7659</guid>
      <dc:creator>jweier_elys</dc:creator>
      <dc:date>2019-01-21T12:47:46Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing External Traffic on Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3784240#M7660</link>
      <description>&lt;P&gt;can you try this and give us the output. the reason i said in our access-list we allow www (80) not 81&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 8.8.8.8 1234 96.89.224.197 80&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jan 2019 13:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-external-traffic-on-cisco-asa/m-p/3784240#M7660</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-01-21T13:05:35Z</dc:date>
    </item>
  </channel>
</rss>

