<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You are doing the packet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868732#M920270</link>
    <description>&lt;P&gt;You are doing the packet-tracer with an IP ending by 193 while on your config is ending bh 196, is it a typo error or I missed something?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was talking about capture and/or logging capabilities to see if you try a ssh from outside, if the packet arrives to ASA or not. And how it's handling that connection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 20 Jun 2016 15:44:26 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2016-06-20T15:44:26Z</dc:date>
    <item>
      <title>Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868727#M920265</link>
      <description>&lt;P&gt;I have a cisco ASA 5512 my scenario is the following:&lt;/P&gt;
&lt;P&gt;I have a Cisco ASA on a datacenter. My provider gives me a public /29 routed through &amp;nbsp;a private ip. I want to be able to access my cisco asa using ssh or asdm using the public ip assigned. I know i can't use a secondary ip, so a nat is the way to go. I have http and ssh enabled. At the moment i'm not able to do it. Currently i have the following configuration:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;channel-group 1 mode on&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no nameif&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no security-level&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no ip address&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;channel-group 1 mode on&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no nameif&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no security-level&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no ip address&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;interface Port-channel1&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no nameif&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no security-level&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;no ip address&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;interface Port-channel1.1124&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;vlan 1124&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;nameif Untrust&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;security-level 0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;ip address 172.20.0.196 255.255.255.248 &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;!&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;object network PUBLIC-IP&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;host&amp;nbsp;x.x.x.x&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;object network PUBLIC-IP&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;nat (Untrust,Untrust) static interface&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;object-group service DM_INLINE_SERVICE&lt;BR /&gt; &lt;/SPAN&gt;&lt;/EM&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;service-object ip &lt;BR /&gt; service-object icmp &lt;BR /&gt; service-object tcp-udp destination eq domain &lt;BR /&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;access-list public-access extended permit object-group DM_INLINE_SERVICE any object PUBLIC-IP &lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;route Untrust 0.0.0.0 0.0.0.0 172.20.0.193 1&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 8.0pt;"&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:51:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868727#M920265</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2020-02-21T13:51:05Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868728#M920266</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I'm sorry I've not understood your requirement.&lt;/P&gt;
&lt;P&gt;You want to access your ASA from the internet to its outside interface?&lt;/P&gt;
&lt;P&gt;If Yes, let's assume you don't have any specific host to filter from internet and everyone can access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume that aaa commands have been setup.&lt;/P&gt;
&lt;P&gt;Below the configuration for ssh and http:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;http 0.0.0.0 0.0.0.0 outside&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jun 2016 00:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868728#M920266</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-18T00:32:20Z</dc:date>
    </item>
    <item>
      <title>That part is already in my</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868729#M920267</link>
      <description>&lt;P&gt;That part is already in my config. I forgot to add it. But still dont work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To answer you question, thats correct i want to access the device using the Outside interface (Untrust). Like i mentioned, the interface has a private ip assigned, but my provider is routing a public ip trought that private address. I want to be able to assigned one of those public address &amp;nbsp;to access the device. I already tried with a nat, as shown in my config, but without luck.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jun 2016 02:21:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868729#M920267</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-18T02:21:53Z</dc:date>
    </item>
    <item>
      <title>Just before troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868730#M920268</link>
      <description>&lt;P&gt;Just before troubleshooting your config, could you share asa logging and/or packet capture output when you are trying to ssh from outside?&lt;/P&gt;
&lt;P&gt;I would like to see if packets are coming into asa or not.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jun 2016 02:34:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868730#M920268</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-18T02:34:38Z</dc:date>
    </item>
    <item>
      <title>I don't see any log.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868731#M920269</link>
      <description>&lt;P&gt;I don't see any log. I ran a packet trace with the following result&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input Untrust tcp x.x.x.x&amp;nbsp;443 172.20.0.193 443&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 172.20.0.192 255.255.255.248 Untrust&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network PUBLIC-IP&lt;BR /&gt; nat (Untrust,Untrust) static interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate x.x.x.x/443 to 172.20.0.196/443&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; &lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,Untrust) dynamic&amp;nbsp;x.x.x.x&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: Untrust&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Untrust&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 14:03:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868731#M920269</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-20T14:03:36Z</dc:date>
    </item>
    <item>
      <title>You are doing the packet</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868732#M920270</link>
      <description>&lt;P&gt;You are doing the packet-tracer with an IP ending by 193 while on your config is ending bh 196, is it a typo error or I missed something?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was talking about capture and/or logging capabilities to see if you try a ssh from outside, if the packet arrives to ASA or not. And how it's handling that connection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 15:44:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868732#M920270</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-20T15:44:26Z</dc:date>
    </item>
    <item>
      <title>you were right about the ip,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868733#M920271</link>
      <description>&lt;P&gt;you were right about the ip, i didn't notice. But even more weird now, the packet tracer finish without problem. About the logs, i dont see any log. I have an extended ping from my pc, but i don't see anything on the ASDM log.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 15:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868733#M920271</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-20T15:59:33Z</dc:date>
    </item>
    <item>
      <title>Are you sure your isp is</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868734#M920272</link>
      <description>&lt;P&gt;Are you sure your isp is forwarding traffic to your asa?&lt;/P&gt;
&lt;P&gt;You're trying a ping. Do you have a reply back of your ping?&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 16:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868734#M920272</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-20T16:44:43Z</dc:date>
    </item>
    <item>
      <title>If i point to another IP on</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868735#M920273</link>
      <description>&lt;P&gt;If i point to another IP on the same public network i see the denied packets, but if i point to the correct public ip i don't see anything on the logs.&lt;/P&gt;
&lt;P&gt;If has to be access-list. Look what happened if i do it the other way around. From inside to the outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# packet-tracer input UNtrust tcp 10.213.29.129 443 98.139.183.24 443&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 Untrust&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,Untrust) dynamic 186.x.x.x&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.213.29.129/443 to 186.x.x.x/443&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (any,Untrust) dynamic 186.x.x.x&lt;BR /&gt;Additional Information:&lt;BR /&gt; &lt;BR /&gt;Result:&lt;BR /&gt;input-interface: Untrust&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Untrust&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 18:33:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868735#M920273</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-20T18:33:31Z</dc:date>
    </item>
    <item>
      <title>If you are using the right IP</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868736#M920274</link>
      <description>&lt;P&gt;If you are using the right IP and nothing come on ASA that means that nothing is forwarded by your ISP (You must see something even if it's deny or permit on ASA logging on CLI and/or ASDM). You have activated the debugging mode on ASA ASDM monitor logging?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you check that before ?&lt;/P&gt;
&lt;P&gt;Why not using another public IP that your ISP is forwarding to your ASA (The ones you see as denied on ASA).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 20:07:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868736#M920274</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-20T20:07:18Z</dc:date>
    </item>
    <item>
      <title>Same, if i change the ip to</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868737#M920275</link>
      <description>&lt;P&gt;Same, if i change the ip to the one &amp;nbsp;i was seeing denies, i stop seeing anything.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 20:14:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868737#M920275</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-20T20:14:21Z</dc:date>
    </item>
    <item>
      <title>Ok I maybe missed a part. </title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868738#M920276</link>
      <description>&lt;P&gt;Ok I maybe missed a part.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From outside, if you try a ssh connection, icmp or whatever, does you icmp get echo-reply or timeout?&lt;/P&gt;
&lt;P&gt;And do you &amp;nbsp;see traffic (denied or permitted) on asa. Put your monitor as debugging on asdm to see everything.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If not, you may ask your isp to verify if he's forwarding all traffic back to your outside asa interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this solved your issue&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 20:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868738#M920276</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-20T20:35:37Z</dc:date>
    </item>
    <item>
      <title>C:\Users\emckenzie&gt;ping 186.x</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868739#M920277</link>
      <description>&lt;P&gt;C:\Users\emckenzie&amp;gt;ping 186.x.x.x -t&lt;/P&gt;
&lt;P&gt;Pinging 186.x.x.x&amp;nbsp;with 32 bytes of data:&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;BR /&gt;Request timed out.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That's what i get when i try to access the interface from the outside.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;What I try to meant is that, let suppose the ip on the nat is 186.x.x.1. If i try to ping that ip i don't see anything on the asa logs, but if i try to ping 186.x.x.2 i see deny packets. If i then change the nat to 186.x.x.2, i stop seeing the deny packets, but still cannot access the device. I get either way in my computer "Request timed out"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I don't know if that answer your question.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jun 2016 21:01:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868739#M920277</guid>
      <dc:creator>emckenzie1</dc:creator>
      <dc:date>2016-06-20T21:01:29Z</dc:date>
    </item>
    <item>
      <title>Sorry for my late answer.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868740#M920278</link>
      <description>&lt;P&gt;Sorry for my late answer.&lt;/P&gt;
&lt;P&gt;First of all, with the nat you've done (1st post), you will have asymmetric NAT issue.&lt;/P&gt;
&lt;P&gt;You're not seeing any traffic coming from internet to Public IP you have.&lt;/P&gt;
&lt;P&gt;I'm not sure that what you want to achieve will work, I mean ssh the ASA interface by doing a NAT. I've never tried in that way. I can't lab it right now, I'm sorry&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When your IP are forwarded to your ASA, to reach ASA (icmp) from internet, I would do the following NAT:&lt;/P&gt;
&lt;P&gt;nat (untrust,any) source static any any destination static PUBLIC-IP ASA-OUTSIDE-INTERFACE&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The best way to achieve what you want to do and the simplest way as well, would be to ask your ISP to do port-forwarding on their router.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you manipulate a bit all NAT to try what you want, you can face spoofing issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jun 2016 04:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/2868740#M920278</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-06-21T04:05:09Z</dc:date>
    </item>
  </channel>
</rss>

