<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cannot connect using NATTED IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059558#M895180</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do u have permit statment on the FWSM interfaces &lt;/P&gt;&lt;P&gt;because fwsm has deny all on all interfaces not like &lt;/P&gt;&lt;P&gt;ASA make sure u have the right ACLs that permit the traffic &lt;/P&gt;&lt;P&gt;and as long as u can ping end to end ur routing looks ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but if u can post the FWSM and MSFC config will be easier &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Oct 2008 06:28:03 GMT</pubDate>
    <dc:creator>Marwan ALshawi</dc:creator>
    <dc:date>2008-10-13T06:28:03Z</dc:date>
    <item>
      <title>Cannot connect using NATTED IP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059557#M895179</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am again having another problem with my NATTED ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have connected a server on one of the Firewall interface. I can Ping the server 10.26.34.20 from the Firewall context at the same time, I can ping the 10.10.10.10 server from the firewall. I have configured, NAT for 10.10.10.10 to be represented as 10.26.34.10. I however cannot PING 10.26.34.10 from 10.10.10.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching logs from our firewall and please let me know where I might have gone wrong. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%FWSM-6-302021: Teardown ICMP connection for faddr 10.26.34.20/4388 gaddr 10.34.26.14/4388 laddr 10.34.26.14/8 &lt;/P&gt;&lt;P&gt;%FWSM-6-305009: Built static translation from VLAN300 :10.10.10.10 to VLAN1300 :10.26.34.10 &lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145842752990351296 for VLAN300 :10.10.10.10/47014 (10.26.34.10/47014) to VLAN1300 :10.26.34.20/22 (10.26.34.20/22) &lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145842752990351296 for VLAN300 :10.10.10.10/47014 to VLAN1300 :10.26.34.20/2 &lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145842752990351297 for VLAN300 :10.10.10.10/47014 (10.26.34.10/47014) to VLAN1300 :10.26.34.20/22 (10.26.34.20/22) &lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145842752990351297 for VLAN300 :10.10.10.10/47014 to VLAN1300 :10.26.34.20/2 &lt;/P&gt;&lt;P&gt;%FWSM-6-302020: Built outbound ICMP connection for faddr 10.26.34.20/45343 gaddr 10.26.34.10/45343 laddr 10.10.10.10/8 &lt;/P&gt;&lt;P&gt;%FWSM-6-302021: Teardown ICMP connection for faddr 10.26.34.20/45343 gaddr 10.26.34.10/45343 laddr 10.10.10.10/8 &lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145842752990351299 for VLAN300 :10.10.10.10/47015 (10.26.34.10/47015) to VLAN1300 :10.26.34.20/6034 (10.26.34.20/6034) &lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145842752990351299 for VLAN300 :10.10.10.10/47015 to VLAN1300 :10.26.34.20/6 &lt;/P&gt;&lt;P&gt;%FWSM-6-106015: Deny TCP (no connection) from 10.26.34.20/6034 to 10.26.34.10/47015 flags SYN ACK on interface VLAN1300 &lt;/P&gt;&lt;P&gt;%FWSM-6-106015: Deny TCP (no connection) from 10.26.34.20/6034 to 10.26.34.10/47015 flags RST on interface VLAN1300 &lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145842752990351300 for VLAN300 :10.10.10.10/47015 (10.26.34.10/47015) to VLAN1300 :10.26.34.20/6034 (10.26.34.20/6034) &lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145842752990351300 for VLAN300 :10.10.10.10/47015 to VLAN1300 :10.26.34.20/6 &lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145842752990351301 for VLAN300 :10.10.10.10/47015 (10.26.34.10/47015) to VLAN1300 :10.26.34.20/6034 (10.26.34.20/6034) &lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145842752990351301 for VLAN300 :10.10.10.10/47015 to VLAN1300 :10.26.34.20/6 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:56:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059557#M895179</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2019-03-11T13:56:36Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot connect using NATTED IP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059558#M895180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do u have permit statment on the FWSM interfaces &lt;/P&gt;&lt;P&gt;because fwsm has deny all on all interfaces not like &lt;/P&gt;&lt;P&gt;ASA make sure u have the right ACLs that permit the traffic &lt;/P&gt;&lt;P&gt;and as long as u can ping end to end ur routing looks ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but if u can post the FWSM and MSFC config will be easier &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Oct 2008 06:28:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059558#M895180</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-13T06:28:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot connect using NATTED IP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059559#M895181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi. I cannot ping from end to end, but if im from the firewall context, I can ping both servers. 10.10.10.10 and 10.26.34.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am attaching config of fw context and a protion of the router config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Oct 2008 07:20:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059559#M895181</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-13T07:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot connect using NATTED IP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059560#M895182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok on the edge u mean MSFC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do u have and SVI interface&lt;/P&gt;&lt;P&gt;for example lets say the interface connected to core router is in vlan 1331&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;give it and ip address make L3 interface and put the interface connected to core router in this vlan for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 1311&lt;/P&gt;&lt;P&gt;ip address 13.13.13.13 255.255.255.0&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now u need and SVI for vlan 300 and this will used to route traffic to 10.10.10.10 server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example in MSFC&lt;/P&gt;&lt;P&gt;interface vlan 300&lt;/P&gt;&lt;P&gt;ip address 10.133.2.41 255.255.255.252&lt;/P&gt;&lt;P&gt;no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now lets say the core router directly connected interface as we said in vlan 1311&lt;/P&gt;&lt;P&gt;lets say 13.13.13.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now make static route to 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 10.10.10.10 255.255.255.255 13.13.13.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now on the FWSM&lt;/P&gt;&lt;P&gt;route vlan300 10.10.10.10 255.255.255.255 10.133.2.41&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.133.2.41 represent the vlan300 SVI we just created&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the above carefully then let me know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;some times for nating u need to do&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clear conn&lt;/P&gt;&lt;P&gt;clear xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Oct 2008 08:03:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059560#M895182</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-13T08:03:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cannot connect using NATTED IP</title>
      <link>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059561#M895183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already carried it out and I am able to see hits on the Firewall logs, however, I am still unable to PING the server. I have a good route since I am already able to translate 10.10.10.10 to 10.26.34.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the two server IF i am on the Firewall COntext.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am getting these on the FIREWALL LOGs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%FWSM-6-305009: Built static translation from VLAN300:10.10.10.10 to VLAN1300:10.26.34.10&lt;/P&gt;&lt;P&gt;%FWSM-6-302020: Built outbound ICMP connection for faddr 10.26.34.20/33539 gaddr 10.26.34.10/33539 laddr 10.10.10.10/8&lt;/P&gt;&lt;P&gt;%FWSM-6-302020: Built outbound ICMP connection for faddr 10.26.34.20/17533 gaddr 10.26.34.10/17533 laddr 10.10.10.10/8&lt;/P&gt;&lt;P&gt;%FWSM-6-302021: Teardown ICMP connection for faddr 10.26.34.20/33539 gaddr 10.26.34.10/33539 laddr 10.10.10.10/8&lt;/P&gt;&lt;P&gt;%FWSM-6-302021: Teardown ICMP connection for faddr 10.26.34.20/17533 gaddr 10.26.34.10/17533 laddr 10.10.10.10/8&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015439 for VLAN300:10.10.10.10/47026 (10.26.34.10/47026) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015439 for VLAN300:10.10.10.10/47026 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 324 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015440 for VLAN300:10.10.10.10/47026 (10.26.34.10/47026) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015440 for VLAN300:10.10.10.10/47026 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 230 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015441 for VLAN300:10.10.10.10/47026 (10.26.34.10/47026) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015441 for VLAN300:10.10.10.10/47026 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 230 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015442 for VLAN300:10.10.10.10/47026 (10.26.34.10/47026) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015442 for VLAN300:10.10.10.10/47026 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 230 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015443 for VLAN300:10.10.10.10/47027 (10.26.34.10/47027) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-106015: Deny TCP (no connection) from 10.26.34.20/6034 to 10.26.34.10/47026 flags SYN ACK  on interface VLAN1300&lt;/P&gt;&lt;P&gt;%FWSM-6-106015: Deny TCP (no connection) from 10.26.34.20/6034 to 10.26.34.10/47026 flags RST  on interface VLAN1300&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015443 for VLAN300:10.10.10.10/47027 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 324 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015444 for VLAN300:10.10.10.10/47027 (10.26.34.10/47027) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;%FWSM-6-302014: Teardown TCP connection 145843191077015444 for VLAN300:10.10.10.10/47027 to VLAN1300:10.26.34.20/6034 duration 0:00:20 bytes 230 Conn-timeout&lt;/P&gt;&lt;P&gt;%FWSM-6-302013: Built outbound TCP connection 145843191077015445 for VLAN300:10.10.10.10/47027 (10.26.34.10/47027) to VLAN1300:10.26.34.20/6034 (10.26.34.20/6034)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SHE-FW01# ping 10.26.34.20&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.26.34.20, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms&lt;/P&gt;&lt;P&gt;SHE-FW01# ping 10.10.10.10&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.10.10.10, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Oct 2008 09:22:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-connect-using-natted-ip/m-p/1059561#M895183</guid>
      <dc:creator>griever060684</dc:creator>
      <dc:date>2008-10-13T09:22:04Z</dc:date>
    </item>
  </channel>
</rss>

