<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic outside,inside NAT not working in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748030#M8902</link>
    <description>&lt;P&gt;I'm trying to Port Map access to several inside servers by mapping both outside IP/PORT to a inside IP/PORT.&amp;nbsp; On a Cisco ASA 5520 I overloaded to get to the Internet and tried to NAT (outside,inside) to get to a web server from the outside.&amp;nbsp; I'm simulating this on my local network by overloading 192.168.168.233 from 192.169.171.0/24 to the internet router at 192.168.168.1.&amp;nbsp; The overload is working but the (outside,inside) is not.&amp;nbsp; My first attempt is to map an outside HTTP request to 192.168.168.233:8080 that should map to inside 191.168.171.66:80 (where I have Apache running).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See the following comment for config or the attached txt file.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:28:43 GMT</pubDate>
    <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
    <dc:date>2020-02-21T16:28:43Z</dc:date>
    <item>
      <title>outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748030#M8902</link>
      <description>&lt;P&gt;I'm trying to Port Map access to several inside servers by mapping both outside IP/PORT to a inside IP/PORT.&amp;nbsp; On a Cisco ASA 5520 I overloaded to get to the Internet and tried to NAT (outside,inside) to get to a web server from the outside.&amp;nbsp; I'm simulating this on my local network by overloading 192.168.168.233 from 192.169.171.0/24 to the internet router at 192.168.168.1.&amp;nbsp; The overload is working but the (outside,inside) is not.&amp;nbsp; My first attempt is to map an outside HTTP request to 192.168.168.233:8080 that should map to inside 191.168.171.66:80 (where I have Apache running).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See the following comment for config or the attached txt file.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748030#M8902</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2020-02-21T16:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748033#M8906</link>
      <description>&lt;P&gt;PAT&lt;BR /&gt;!&lt;BR /&gt;object network HTTP_ALLAN_OBJ&lt;BR /&gt; host 192.168.168.233&lt;BR /&gt; nat (outside,inside) static 192.168.171.66 service tcp 8080 80&lt;BR /&gt;&lt;BR /&gt;SH RUN&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.168.233 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.171.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE-IN extended permit ip any any&lt;BR /&gt;access-list OUTSIDE-IN extended permit icmp any any&lt;BR /&gt;access-list OUTSIDE-IN extended permit tcp any any&lt;BR /&gt;access-list OUTSIDE-IN extended permit tcp any any eq www&lt;BR /&gt;access-list OUTSIDE-OUT extended permit ip any any&lt;BR /&gt;access-list OUTSIDE-OUT extended permit icmp any any&lt;BR /&gt;access-list OUTSIDE-OUT extended permit tcp any any&lt;BR /&gt;access-list INSIDE-IN extended permit ip any any&lt;BR /&gt;access-list INSIDE-IN extended permit icmp any any&lt;BR /&gt;access-list INSIDE-IN extended permit tcp any any&lt;BR /&gt;access-list INSIDE-OUT extended permit ip any any&lt;BR /&gt;access-list INSIDE-OUT extended permit icmp any any&lt;BR /&gt;access-list INSIDE-OUT extended permit tcp any any&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;!&lt;BR /&gt;access-group OUTSIDE-IN in interface outside&lt;BR /&gt;access-group OUTSIDE-OUT out interface outside&lt;BR /&gt;access-group INSIDE-IN in interface inside&lt;BR /&gt;access-group INSIDE-OUT out interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 192.168.168.1 5&lt;BR /&gt;&lt;BR /&gt;dhcpd option 3 ip 192.168.171.1&lt;BR /&gt;dhcpd address 192.168.171.3-192.168.171.63 inside&lt;BR /&gt;&lt;BR /&gt;object network HTTP_ALLAN_OBJ&lt;BR /&gt; host 192.168.168.233QQ&lt;BR /&gt;object network HTTP_ALLAN_OBJ&lt;BR /&gt; nat (outside,inside) static 192.168.171.66 service tcp 8080 www&lt;BR /&gt;&lt;BR /&gt;DEBUG&lt;BR /&gt;ciscoasa# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt; translate_hits = 18965, untranslate_hits = 6&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (outside) to (inside) source static HTTP_ALLAN_OBJ 192.168.171.66 service tcp 8080 www&lt;BR /&gt; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ciscoasa# packet-tracer input outside tcp 192.168.171.66 8080 192.168.168.233 80 detailed&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.168.233 255.255.255.255 identity&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x741e62b8, priority=0, domain=nat-per-session, deny=false&lt;BR /&gt; hits=15379, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0x74830f08, priority=0, domain=permit, deny=true&lt;BR /&gt; hits=1798, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;BR /&gt; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: NP Identity Ifc&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 13:52:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748033#M8906</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T13:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748095#M8910</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;You are pretty there, you just need to flip everything around. See below:-&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;object network HTTP_ALLAN_OBJ&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; host 192.168.171.66 &lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; nat (inside,outside) static 192.168.168.233 service tcp 80 8080&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;A more specific ACL would be this, notice it references the real IP address and real port not the natted address/port. &lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;access-list OUTSIDE-IN extended permit tcp any host 192.168.171.66 eq 80&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 14:21:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748095#M8910</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-16T14:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748109#M8912</link>
      <description>&lt;P&gt;RJI thanks for your help.&amp;nbsp; Here is what happened... Do I have to put the IP address on the outside interface in a different way?&amp;nbsp; Something like a vlan or loopback?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# no object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config)# object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; host 192.168.171.66&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; nat (inside,outside) static 192.168.168.233 service tcp 80 8080&lt;BR /&gt;ERROR: Address 192.168.168.233 overlaps with outside interface address.&lt;BR /&gt;ERROR: NAT Policy is not downloaded&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 14:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748109#M8912</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T14:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748116#M8913</link>
      <description>Replace IP address with "interface"&lt;BR /&gt;&lt;BR /&gt; nat (INSIDE,OUTSIDE) static interface service tcp www 8080&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Nov 2018 14:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748116#M8913</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-16T14:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748130#M8915</link>
      <description>&lt;P&gt;Hi RJI, I'm finding the ASA syntax to be very confusing....&amp;nbsp; The "nat (inside,outside) static interface service tcp www 8080" went in OK but I still can't get to the web server.&amp;nbsp; I don't see any hits on the new NAT....&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# no object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config)# object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; host 192.168.171.66&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; nat (inside,outside) static interface service tcp www 8080&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;ciscoasa(config-network-object)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19595, untranslate_hits = 8&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp;&amp;nbsp; service tcp www 8080&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;telnet: Unable to connect to remote host: Connection timed out&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;allan@allandesk ~ $ ping 192.168.168.233&lt;BR /&gt;PING 192.168.168.233 (192.168.168.233) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=1 ttl=255 time=0.470 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=2 ttl=255 time=0.435 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=3 ttl=255 time=0.455 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=4 ttl=255 time=0.420 ms&lt;BR /&gt;^C&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ciscoasa(config-network-object)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19602, untranslate_hits = 8&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp;&amp;nbsp; service tcp www 8080&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;-------------from withing in the inside network---------------------&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;$ ip addr | grep 192&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inet 192.168.171.9/24 brd 192.168.171.255 scope global dynamic noprefixroute enp0s31f6&lt;BR /&gt;$ telnet 192.168.171.66 80&lt;BR /&gt;Trying 192.168.171.66...&lt;BR /&gt;Connected to 192.168.171.66.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;Connection closed by foreign host.&lt;BR /&gt;$ &lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 15:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748130#M8915</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T15:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748161#M8918</link>
      <description>&lt;P&gt;Somehow the comments got truncated???&amp;nbsp; So I'm repeating the results from changing ip address to "nat (inside,outside) static interface service tcp www 8080"&lt;/P&gt;
&lt;P&gt;ciscoasa(config)# no object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config)# object network HTTP_ALLAN_OBJ&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; host 192.168.171.66&lt;BR /&gt;ciscoasa(config-network-object)#&amp;nbsp; nat (inside,outside) static interface service tcp www 8080&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;ciscoasa(config-network-object)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19595, untranslate_hits = 8&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp;&amp;nbsp; service tcp www 8080&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;--------------from outside network------------------------&lt;BR /&gt;allan@allandesk ~ $ ping 192.168.168.233&lt;BR /&gt;PING 192.168.168.233 (192.168.168.233) 56(84) bytes of data.&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=1 ttl=255 time=0.470 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=2 ttl=255 time=0.435 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=3 ttl=255 time=0.455 ms&lt;BR /&gt;64 bytes from 192.168.168.233: icmp_seq=4 ttl=255 time=0.420 ms&lt;BR /&gt;&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;^C&lt;BR /&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;telnet: Unable to connect to remote host: Connection timed out&lt;BR /&gt;&lt;BR /&gt;-------------------no hits in Section 2--------------------&lt;BR /&gt;ciscoasa(config-network-object)# sh nat&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source dynamic any interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 19602, untranslate_hits = 8&lt;BR /&gt;&lt;BR /&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp;&amp;nbsp; service tcp www 8080&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;ciscoasa(config-network-object)#&lt;BR /&gt;&lt;BR /&gt;----------------from within the inside network-----------------&lt;BR /&gt;$ ip addr | grep 192&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; inet 192.168.171.9/24 brd 192.168.171.255 scope global dynamic noprefixroute enp0s31f6&lt;BR /&gt;$ telnet 192.168.171.66 80&lt;BR /&gt;Trying 192.168.171.66...&lt;BR /&gt;Connected to 192.168.171.66.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;Connection closed by foreign host.&lt;BR /&gt;$&lt;BR /&gt;--------------- if this packet tracer is right????--------------------&lt;/P&gt;
&lt;DIV class="yiv7174287631ydp7649832ayahoo-style-wrap" style="font-family: courier new, courier, monaco, monospace, sans-serif; font-size: 16px;"&gt;
&lt;DIV&gt;ciscoasa# &lt;SPAN&gt;&lt;SPAN style="color: #000000; font-family: courier new, courier, monaco, monospace, sans-serif; font-size: 16px;"&gt;packet-tracer input outside tcp 192.168.171.66 8080 192.168.168.233 80 detailed&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Phase: 1&lt;/DIV&gt;
&lt;DIV&gt;Type: ROUTE-LOOKUP&lt;/DIV&gt;
&lt;DIV&gt;Subtype: input&lt;/DIV&gt;
&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;
&lt;DIV&gt;Config:&lt;/DIV&gt;
&lt;DIV&gt;Additional Information:&lt;/DIV&gt;
&lt;DIV&gt;in&amp;nbsp; &amp;nbsp;192.168.168.233 255.255.255.255 identity&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Phase: 2&lt;/DIV&gt;
&lt;DIV&gt;Type: NAT&lt;/DIV&gt;
&lt;DIV&gt;Subtype: per-session&lt;/DIV&gt;
&lt;DIV&gt;Result: ALLOW&lt;/DIV&gt;
&lt;DIV&gt;Config:&lt;/DIV&gt;
&lt;DIV&gt;Additional Information:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;in&amp;nbsp; id=0x741e62b8, priority=0, domain=nat-per-session, deny=false&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=16414, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=any, output_ifc=any&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Phase: 3&lt;/DIV&gt;
&lt;DIV&gt;Type: ACCESS-LIST&lt;/DIV&gt;
&lt;DIV&gt;Subtype:&lt;/DIV&gt;
&lt;DIV&gt;Result: DROP&lt;/DIV&gt;
&lt;DIV&gt;Config:&lt;/DIV&gt;
&lt;DIV&gt;Implicit Rule&lt;/DIV&gt;
&lt;DIV&gt;Additional Information:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;in&amp;nbsp; id=0x74830f08, priority=0, domain=permit, deny=true&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=2039, user_data=0x9, cs_id=0x0, use_real_addr, flags=0x1000, protocol=0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Result:&lt;/DIV&gt;
&lt;DIV&gt;input-interface: outside&lt;/DIV&gt;
&lt;DIV&gt;input-status: up&lt;/DIV&gt;
&lt;DIV&gt;input-line-status: up&lt;/DIV&gt;
&lt;DIV&gt;output-interface: NP Identity Ifc&lt;/DIV&gt;
&lt;DIV&gt;output-status: up&lt;/DIV&gt;
&lt;DIV&gt;output-line-status: up&lt;/DIV&gt;
&lt;DIV&gt;Action: drop&lt;/DIV&gt;
&lt;DIV&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa#&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="yiv7174287631ydp7649832ayahoo-style-wrap" style="font-family: courier new, courier, monaco, monospace, sans-serif; font-size: 16px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Nov 2018 15:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748161#M8918</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T15:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748165#M8921</link>
      <description>I imagine the "Manual Policies NAT (Section 1)" is causing the issue here.&lt;BR /&gt;&lt;BR /&gt;Try this:- "nat (INSIDE,OUTSIDE) after-auto source dynamic any interface" - after-auto is the keyword here, it will move this rule to "Section 3" and be processed after the "Section 2" nat rule.</description>
      <pubDate>Fri, 16 Nov 2018 15:50:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748165#M8921</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-16T15:50:15Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748172#M8925</link>
      <description>&lt;P&gt;Like this?&lt;/P&gt;
&lt;DIV class="msg-body P_wpofO iy_A" data-test-id="message-view-body-content"&gt;
&lt;DIV class="jb_0 X_6MGW N_6Fd5"&gt;
&lt;DIV&gt;
&lt;DIV id="yiv6159303227"&gt;
&lt;DIV&gt;
&lt;DIV class="yiv6159303227ydp1f5926d2yahoo-style-wrap" style="font-family: courier new, courier, monaco, monospace, sans-serif; font-size: 16px;"&gt;
&lt;DIV&gt;no object network HTTP_ALLAN_OBJ &lt;/DIV&gt;
&lt;DIV&gt;object network HTTP_ALLAN_OBJ&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;host 192.168.171.66&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;nat (inside,outside) static interface service tcp www 8080&lt;/DIV&gt;
&lt;DIV&gt;exit&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;nat (inside,outside) after-auto source dynamic any interface&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Nov 2018 15:58:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748172#M8925</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T15:58:25Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748184#M8928</link>
      <description>You shouldn't need to remove the object, just modify the dynamic nat rule by adding after-auto. If you then run "show nat" you will now see "Section 3" with the dynamic nat rule.&lt;BR /&gt;&lt;BR /&gt;Any new object nat's you create will always be added to "Section 2", you dynamic nat rule will now (once added after-auto) be applied if no more specific nat rule is in section 1 or 2.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 16 Nov 2018 16:03:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748184#M8928</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-16T16:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748203#M8930</link>
      <description>&lt;P&gt;You did it RJI, you're the best &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&amp;nbsp; Thank you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="msg-body P_wpofO iy_A" data-test-id="message-view-body-content"&gt;
&lt;DIV class="jb_0 X_6MGW N_6Fd5"&gt;
&lt;DIV&gt;
&lt;DIV id="yiv7888695722"&gt;
&lt;DIV&gt;
&lt;DIV class="yiv7888695722ydp8a315803yahoo-style-wrap" style="font-family: courier new, courier, monaco, monospace, sans-serif; font-size: 16px;"&gt;
&lt;DIV&gt;ciscoasa(config)# sh nat&lt;/DIV&gt;
&lt;DIV&gt;Manual NAT Policies (Section 1)&lt;/DIV&gt;
&lt;DIV&gt;1 (inside) to (outside) source dynamic any interface&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 20690, untranslate_hits = 8&lt;/DIV&gt;
&lt;DIV&gt;Auto NAT Policies (Section 2)&lt;/DIV&gt;
&lt;DIV&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp; &amp;nbsp;service tcp www 8080&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)#&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)# sh run | i nat&lt;/DIV&gt;
&lt;DIV&gt;nat (inside,outside) source dynamic any interface&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;nat (inside,outside) static interface service tcp www 8080&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)# no nat (inside,outside) source dynamic any interface&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)# nat (inside,outside) after-auto source dynamic any interface&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)# sh nat&lt;/DIV&gt;
&lt;DIV&gt;Auto NAT Policies (Section 2)&lt;/DIV&gt;
&lt;DIV&gt;1 (inside) to (outside) source static HTTP_ALLAN_OBJ interface&amp;nbsp; &amp;nbsp;service tcp www 8080&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;
&lt;DIV&gt;Manual NAT Policies (Section 3)&lt;/DIV&gt;
&lt;DIV&gt;1 (inside) to (outside) source dynamic any interface&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/DIV&gt;
&lt;DIV&gt;ciscoasa(config)#&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;---------------from the outside network--------------&lt;/DIV&gt;
&lt;DIV&gt;allan@allandesk ~ $ telnet 192.168.168.233 8080&lt;BR /&gt;Trying 192.168.168.233...&lt;BR /&gt;Connected to 192.168.168.233.&lt;BR /&gt;Escape character is '^]'.&lt;BR /&gt;^]&lt;BR /&gt;HTTP/1.1 400 Bad Request&lt;BR /&gt;Date: Fri, 16 Nov 2018 16:15:56 GMT&lt;BR /&gt;Server: Apache/2.4.6 (CentOS)&lt;BR /&gt;Content-Length: 226&lt;BR /&gt;Connection: close&lt;BR /&gt;Content-Type: text/html; charset=iso-8859-1&lt;BR /&gt;&lt;BR /&gt;&amp;lt;!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"&amp;gt;&lt;BR /&gt;&amp;lt;html&amp;gt;&amp;lt;head&amp;gt;&lt;BR /&gt;&amp;lt;title&amp;gt;400 Bad Request&amp;lt;/title&amp;gt;&lt;BR /&gt;&amp;lt;/head&amp;gt;&amp;lt;body&amp;gt;&lt;BR /&gt;&amp;lt;h1&amp;gt;Bad Request&amp;lt;/h1&amp;gt;&lt;BR /&gt;&amp;lt;p&amp;gt;Your browser sent a request that this server could not understand.&amp;lt;br /&amp;gt;&lt;BR /&gt;&amp;lt;/p&amp;gt;&lt;BR /&gt;&amp;lt;/body&amp;gt;&amp;lt;/html&amp;gt;&lt;BR /&gt;Connection closed by foreign host.&lt;BR /&gt;allan@allandesk ~ $&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 16 Nov 2018 16:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748203#M8930</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T16:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748284#M8933</link>
      <description>Thanks RJI, I don't know if my comment got to you but thanks again for taking to time to look a my problem.  Your the best &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Fri, 16 Nov 2018 17:59:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748284#M8933</guid>
      <dc:creator>clyde.a.huffman.ctr@mail.mil</dc:creator>
      <dc:date>2018-11-16T17:59:45Z</dc:date>
    </item>
    <item>
      <title>Re: outside,inside NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748292#M8936</link>
      <description>Glad to hear it's working for you</description>
      <pubDate>Fri, 16 Nov 2018 18:07:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-inside-nat-not-working/m-p/3748292#M8936</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-11-16T18:07:35Z</dc:date>
    </item>
  </channel>
</rss>

