<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat on ASA not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259328#M799463</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sadly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That didn't work, I still get the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 24 2009 12:26:18: %ASA-3-305005: No translation group found for tcp src dmz:172.16.96.39/34088 dst inside:10.44.4.91/3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt; description Inside Interface&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.45.81.252 255.255.255.0 standby 10.45.81.251&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt; description DMZ&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.96&lt;BR /&gt; description DMZ&lt;BR /&gt; vlan 96&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 60&lt;BR /&gt; ip address 10.45.96.1 255.255.255.0 standby 10.45.96.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 21 10.45.64.23&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (dmz) 21 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 24 Nov 2009 12:42:47 GMT</pubDate>
    <dc:creator>dan_track</dc:creator>
    <dc:date>2009-11-24T12:42:47Z</dc:date>
    <item>
      <title>Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259324#M799362</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In an earlier thread I had opened I was advised to use the following configuration to nat traffic from my vpn clients to the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the config I put in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 21 172.16.96.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (inside) 21 10.45.64.23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vpn clients have the address range 172.16.96.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259324#M799362</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2019-03-11T16:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259325#M799374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;dan_track wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In an earlier thread I had opened I was advised to use the following configuration to nat traffic from my vpn clients to the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the config I put in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 21 172.16.96.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (inside) 21 10.45.64.23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The vpn clients have the address range 172.16.96.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts on this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the VPN clients on the dmz interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way, whether they are on the dmz or outside interface you need the "outside" keyword in your NAT statement ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;choose the relevant nat from above depending on which interface your VPN clients come in on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 12:09:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259325#M799374</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-24T12:09:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259326#M799406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgot to include the loggin entry here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 24 2009 11:45:09: %ASA-3-305005: No translation group found for tcp src dmz:172.16.96.39/32851 dst inside:10.44.4.91/3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 12:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259326#M799406</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-24T12:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259327#M799428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;dan_track wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I forgot to include the loggin entry here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 24 2009 11:45:09: %ASA-3-305005: No translation group found for tcp src dmz:172.16.96.39/32851 dst inside:10.44.4.91/3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add the "outside" keyword in your nat statement on the DMZ and see if that fixes it. If not can you post ASA config ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 12:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259327#M799428</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-24T12:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259328#M799463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sadly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That didn't work, I still get the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 24 2009 12:26:18: %ASA-3-305005: No translation group found for tcp src dmz:172.16.96.39/34088 dst inside:10.44.4.91/3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt; description Inside Interface&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.45.81.252 255.255.255.0 standby 10.45.81.251&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;BR /&gt; description DMZ&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2.96&lt;BR /&gt; description DMZ&lt;BR /&gt; vlan 96&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 60&lt;BR /&gt; ip address 10.45.96.1 255.255.255.0 standby 10.45.96.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 21 10.45.64.23&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (dmz) 21 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 12:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259328#M799463</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-24T12:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259329#M799470</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would you pls. list your no-nat access-list?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 13:27:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259329#M799470</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-24T13:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259330#M799479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the no-nat list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip host 10.240.45.1 host 10.240.9.1 &lt;BR /&gt;access-list no-nat extended permit ip host 10.240.45.1 host 10.240.44.1 &lt;BR /&gt;access-list no-nat extended permit ip host 10.45.81.253 host 10.49.2.253 &lt;BR /&gt;access-list no-nat extended permit ip host 10.45.81.253 host 10.34.2.253 &lt;BR /&gt;access-list no-nat extended permit ip 10.0.0.0 255.0.0.0 10.45.96.0 255.255.255.0 &lt;BR /&gt;access-list no-nat extended permit ip 10.45.64.0 255.255.255.0 10.34.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 14:01:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259330#M799479</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-24T14:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259331#M799486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I don't think this would be possible unless you get rid of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 21 10.45.64.23&lt;BR /&gt;nat (dmz) 21 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 10.45.64.0 255.255.255.0 172.16.96.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Vikram&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 16:52:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259331#M799486</guid>
      <dc:creator>Vikram_Anumukonda_2</dc:creator>
      <dc:date>2009-11-24T16:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259332#M799491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, but I really don't want to do that, there must be someway to nat it. Any thoughts please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 17:31:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259332#M799491</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-24T17:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259333#M799493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;could this be because the IP in the global statement is not on the same subnet as the Inside interface? Does it work if you chnage it to "global (inside) 21 interface"?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 17:58:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259333#M799493</guid>
      <dc:creator>grant.maynard</dc:creator>
      <dc:date>2009-11-24T17:58:36Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259334#M799497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Grant,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the info. No that didn't work either:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 21 interface&lt;/P&gt;&lt;P&gt;nat (dmz) 21 172.16.96.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still get the same translation error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any further thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Nov 2009 18:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259334#M799497</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-24T18:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259335#M799501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check this link, there's an example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/cfgnat.html#wp1042960"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/configuration/guide/cfgnat.html#wp1042960&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 04:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259335#M799501</guid>
      <dc:creator>Vikram_Anumukonda_2</dc:creator>
      <dc:date>2009-11-25T04:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259336#M799504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the info, the summary of which is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;When you specify a group of IP address(es) in a &lt;STRONG class="cBold"&gt;nat&lt;/STRONG&gt; command, then you must perform NAT on that group of addresses when they access any lower or same security level interface; you must apply a &lt;STRONG class="cBold"&gt;global&lt;/STRONG&gt; command with the same NAT ID on each interface, or use a &lt;STRONG class="cBold"&gt;static&lt;/STRONG&gt; command. NAT is not required for that group when it accesses a higher security interface, because to perform NAT from outside to inside, you must create a separate &lt;STRONG class="cBold"&gt;nat&lt;/STRONG&gt; command using the &lt;STRONG class="cBold"&gt;outside&lt;/STRONG&gt; keyword. If you do apply outside NAT, then the NAT requirements preceding come into effect for that group of addresses when they access all higher security interfaces. Traffic identified by a &lt;STRONG class="cBold"&gt;static&lt;/STRONG&gt; command is not affected. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to my thinking isn't this what I've done? Is there another problem here or am I missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 10:09:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259336#M799504</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-25T10:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259337#M799507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry it is taking us this long to resolve this. Here is what I'd like done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. use the packet-tracker command (just do question mark and finish it) and see where it says as the reason for&amp;nbsp; dropping this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Nov 24 2009 11:45:09: %ASA-3-305005: No translation group found for tcp src dmz:172.16.96.39/32851 dst inside:10.44.4.91/3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No translation group message means - there is problem with the nat line&lt;/P&gt;&lt;P&gt;port map translation creation failed means - there is problem with the global line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Now you have provided translation from high to low for the source. We need this for high to low (return traffic) as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Pls. document the source IP and destination IP for all interfaces. For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the outside the source IP will be 172.16.96.36 ---&amp;gt; 10.44.4.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the inside the source IP will be the translated 10.x.x.x address ---&amp;gt;10.44.4.91&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for the response traffic from this RDC server listening on port 3389:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Returning from the 10.44.4.91 ----&amp;gt; the source will be 10.44.4.91 and destination will be 10.x.x.x translated address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now you need to excempt this in the nat 0 acl that you have applied on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add static (inside,outside) 10.44.4.91 10.44.4.91&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 12:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259337#M799507</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-25T12:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259338#M799509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fantastic!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very very much. You solved my problem. The issue was definetly with the static command. As soon as I added it I got access. Can you please point me to documentation on nat/static/global that's easy to understand.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 14:31:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259338#M799509</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-25T14:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: Nat on ASA not working</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259339#M799510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear that.&amp;nbsp; Our config guide may be overwhelming if you don't do this on a daily basis. We say we eat, sleep and drink this stuff and still we get stuck on many occasions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can get these 3 rules down you can become a master.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;RTP&lt;/P&gt;&lt;P&gt;1. Route&lt;/P&gt;&lt;P&gt;2. Translation&lt;/P&gt;&lt;P&gt;3. Permission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Write down what the source ip and destination IP will be, with respect to each interface and see if RTP is there for the flow, for both request and response.&amp;nbsp; That is all. This is exactly what I did this morning before I posted my suggestion. There was translation missing for the response from the RDC server to get back to the client. Once you added that it resolved the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a CCO doc may not be as intense as the config guide. Pls. refer this one:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Nov 2009 16:30:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-not-working/m-p/1259339#M799510</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-11-25T16:30:55Z</dc:date>
    </item>
  </channel>
</rss>

