<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 9.6 PBR and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379378#M959386</link>
    <description>&lt;P&gt;I just tested packet tracer for HTTPS and ICMP:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;packet-tracer input inside tcp 10.26.30.28 3333 16.9.18.115 https detailed&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result:&lt;/SPAN&gt;&lt;/EM&gt;&lt;I&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;BR /&gt; &lt;EM&gt;input-interface: inside&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;input-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-interface:&amp;nbsp;mpls_link&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;Action: &lt;STRONG&gt;allow&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But I can't say the same about ICMP; I tested it last week and here's full output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp; packet-tracer input inside icmp 10.26.30.28 11 0 16.9.18.115 detailed&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Phase: 14&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Type: USER-STATISTICS&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Subtype: user-statistics&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Config: &lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;out id=0x2aaad83e6f00, priority=0, domain=user-statistics, deny=false&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;hits=126440, user_data=0x2aaad838d9c0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input_ifc=any, output_ifc=link_assurant_wan&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-interface: inside&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-interface:&amp;nbsp;mpls_link&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Action: &lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's see the FW config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-group INSIDE_IN in interface inside&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;show access-list&amp;nbsp;INSIDE_IN | i 1&lt;SPAN style="font-size: 10.0pt;"&gt;0.26.30.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;access-list INSIDE_IN line 48 extended permit icmp 10.26.30.0 255.255.254.0 host&amp;nbsp;16.9.18.115&amp;nbsp;log disable (hitcnt=4) 0xf60dbf01 &lt;/SPAN&gt;&lt;/EM&gt;&lt;I&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;BR /&gt; &lt;EM&gt;access-list INSIDE_IN line 48 extended permit icmp 10.26.30.0 255.255.254.0 host 22.9.22.3 log disable (hitcnt=18) 0x79a62db8&lt;/EM&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;What do you think?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 May 2018 15:26:38 GMT</pubDate>
    <dc:creator>Florin Barhala</dc:creator>
    <dc:date>2018-05-07T15:26:38Z</dc:date>
    <item>
      <title>ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379144#M959380</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an Active-Active cluster running 9.6 (5525X).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I currently have 3 interfaces:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- inside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- mpls_link&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- outside&lt;/P&gt;
&lt;P&gt;and a network for which I do SNAT from inside to outside. This would be the current scenarion.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now for one host behind inside I have applied PBR and sent it over the mpls_link.&lt;/P&gt;
&lt;P&gt;All traffic over MPLS link also requires NAT so I have added above (&lt;SPAN&gt;etwork for which I do SNAT from inside to outside) a SNAT statement: inside to mpls_link.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tested for that host and it doesn't work.&lt;/P&gt;
&lt;P&gt;Also packet tracer from CLI says packet is being dropped at step 14.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have read&amp;nbsp;9.6 guide&amp;nbsp;that states:&lt;/P&gt;
&lt;P&gt;" &lt;FONT size="2"&gt;&lt;EM&gt;PBR Policies Not Applied for Output Route Look-up&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;Policy Based Routing is an ingress-only feature; that is, it is applied only to the first packet of a new incoming connection, at which time the egress interface for the forward leg of the connection is selected. Note that PBR will not be triggered if the incoming packet belongs to an existing connection, or if NAT is applied.&lt;/EM&gt;&lt;/FONT&gt;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What do I make of this? NAT &amp;amp; PBR doesn't work along?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379144#M959380</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2020-02-21T15:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379184#M959381</link>
      <description>&lt;P&gt;Both features are more or less independent. But they are working together.&amp;nbsp;Your scenario is not that uncommon. I just assume that you just configured something wrong or just missed something. But without seeing what&amp;nbsp;your NAT/PBR configuration is and what exactly goes wrong, it's impossible to say what that is.&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 09:40:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379184#M959381</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-05-07T09:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379222#M959382</link>
      <description>That is good news! At least from your sayings both features are compatible together.&lt;BR /&gt;What output you think it's useful: show run nat, show route-map, show run int (inside) &lt;BR /&gt;or maybe packet-tracer output?&lt;BR /&gt;&lt;BR /&gt;Last but not least, what would be the packet flow in this case:&lt;BR /&gt; - inside_interface IN direction ACL&lt;BR /&gt; - PBR&lt;BR /&gt; - source_NAT &lt;BR /&gt;or &lt;BR /&gt;&lt;BR /&gt; - inside_interface IN direction ACL&lt;BR /&gt; - source_NAT&lt;BR /&gt; - PBR ; if the latter then I have to update my PBR statements&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Mon, 07 May 2018 11:23:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379222#M959382</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-07T11:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379239#M959383</link>
      <description>&lt;P&gt;The PBR and NAT-config is needed. The result of packet-tracer is always a good idea to show.&lt;/P&gt;
&lt;P&gt;For the order of operation, the PBR-decision is done first, the outgoing interface is selected and then the NAT is done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 11:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379239#M959383</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-05-07T11:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379322#M959384</link>
      <description>&lt;P&gt;PBR config:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;access-list PBR_ACL line 1 extended permit ip object 10.26.30.28 object-group DM_INLINE_NETWORK_30 (hitcnt=0) 0xa2653c88 &lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; access-list PBR_ACL line 1 extended permit ip host 10.26.30.28 host 16.9.18.115 (hitcnt=0) 0x4039a6f7 &lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; access-list PBR_ACL&amp;nbsp;line 1 extended permit ip host 10.26.30.28 host 22.9.22.3 (hitcnt=0) 0x362d8556&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;route-map PBR_RM, permit, sequence 10&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; Match clauses:&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; ip address (access-lists): PBR_ACL&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;Set clauses:&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; ip next-hop 91.24.4.13&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;show arp | i mpls_link&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;mpls_link 91.24.4.13 002c.e8a9.7880 1379&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;show run int Port-channel22.112&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;!&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;interface Port-channel22.112&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; nameif inside&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; security-level 100&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; ip address 10.22.0.16 255.255.255.240 standby 10.22.0.17&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; policy-route route-map PBR_RM&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;show run nat | i 10.226.130&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;nat (inside,mpls_link) source dynamic 10.26.30.28 ext-mpls-network_NAT destination static DM_INLINE_NETWORK_29 DM_INLINE_NETWORK_29 description&amp;nbsp;PBR policy&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;object-group network DM_INLINE_NETWORK_29&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; network-object object 16.9.18.115&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt; network-object object 22.9.22.3&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 14:09:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379322#M959384</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-07T14:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379328#M959385</link>
      <description>&lt;P&gt;Your PBR looks good, same for the NAT statement. But is that NAT-statement really used? Or do you have an also matching NAT before this line? Packet-Tracer should tell you that.&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 14:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379328#M959385</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-05-07T14:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379378#M959386</link>
      <description>&lt;P&gt;I just tested packet tracer for HTTPS and ICMP:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;packet-tracer input inside tcp 10.26.30.28 3333 16.9.18.115 https detailed&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result:&lt;/SPAN&gt;&lt;/EM&gt;&lt;I&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;BR /&gt; &lt;EM&gt;input-interface: inside&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;input-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;input-line-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-interface:&amp;nbsp;mpls_link&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;output-line-status: up&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;Action: &lt;STRONG&gt;allow&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But I can't say the same about ICMP; I tested it last week and here's full output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&amp;nbsp; packet-tracer input inside icmp 10.26.30.28 11 0 16.9.18.115 detailed&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Phase: 14&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Type: USER-STATISTICS&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Subtype: user-statistics&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Config: &lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Additional Information:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Forward Flow based lookup yields rule:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;out id=0x2aaad83e6f00, priority=0, domain=user-statistics, deny=false&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;hits=126440, user_data=0x2aaad838d9c0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input_ifc=any, output_ifc=link_assurant_wan&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Result:&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-interface: inside&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;input-line-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-interface:&amp;nbsp;mpls_link&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;output-line-status: up&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Action: &lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/EM&gt;&lt;BR /&gt; &lt;STRONG&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let's see the FW config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-group INSIDE_IN in interface inside&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;show access-list&amp;nbsp;INSIDE_IN | i 1&lt;SPAN style="font-size: 10.0pt;"&gt;0.26.30.0&lt;/SPAN&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;access-list INSIDE_IN line 48 extended permit icmp 10.26.30.0 255.255.254.0 host&amp;nbsp;16.9.18.115&amp;nbsp;log disable (hitcnt=4) 0xf60dbf01 &lt;/SPAN&gt;&lt;/EM&gt;&lt;I&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;&lt;BR /&gt; &lt;EM&gt;access-list INSIDE_IN line 48 extended permit icmp 10.26.30.0 255.255.254.0 host 22.9.22.3 log disable (hitcnt=18) 0x79a62db8&lt;/EM&gt;&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10.0pt;"&gt;What do you think?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 15:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379378#M959386</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-07T15:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379555#M959387</link>
      <description>&lt;P&gt;You are using ICMP code type 11 which is time-exceeded.&amp;nbsp; Have you tried with code 8 and code 0 (echo and echo-reply respectively)?&amp;nbsp; Theoretically your setup should work even with time-exceeded.&amp;nbsp; Perhaps try a test rule&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;access-list INSIDE_IN extended permit ip&amp;nbsp;10.26.30.0 255.255.254.0 host&amp;nbsp;16.9.18.115&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Just to see if it is actually the access rule that is dropping the traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I just set this up in my virtual lab (but I used dynamic NAT for both interfaces) and got it working fine, With ICMP and other traffic.&amp;nbsp; However I used a permit IP any any on my inside interface.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 19:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379555#M959387</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-07T19:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379961#M959388</link>
      <description>&lt;P&gt;This is getting worse!&lt;/P&gt;
&lt;P&gt;I had the time today to further test and capture and got only bad news. Here's the summary:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-&amp;nbsp;packet tracer on tcp/443 says that packet is allowed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- both telnet 443 and captures on the two involved interfaces (inside and mpls_link) tells me that it doesn't work.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What can I take from this? That packet tracer is buggy on&amp;nbsp;9.6(3)1?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Tech details&lt;/STRONG&gt;:&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;packet-tracer input inside tcp 10.26.30.28 52696 16.9.18.115 443 detailed&amp;nbsp;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;capture cap1 type raw-data access-list capture_inside interface inside [Capturing - 2480 bytes] &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;capture cap2 type raw-data access-list capture_mpls interface&amp;nbsp;mpls_link [Capturing - 0 bytes]&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;sa capture_inside&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_inside; 2 elements; name hash: 0xb0dbe7a9&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_inside line 1 extended permit ip host 10.26.30.28 any4 (hitcnt=24) 0x3cf6b232 &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_inside line 2 extended permit ip any4 host 10.26.30.28 (hitcnt=0) 0x2bf3d83c &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;sa capture_mpls&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_mpls; 4 elements; name hash: 0x71ebc2b3&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_mpls line 1 extended permit ip host 16.9.18.115 any4 (hitcnt=0) 0x7d29173c &lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;EM&gt;access-list capture_mpls line 2 extended permit ip any4 host 16.9.18.115 (hitcnt=0) 0x7d764a9a &lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 11:43:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3379961#M959388</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-08T11:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3381718#M959389</link>
      <description>&lt;P&gt;Any other idea guys?&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 10:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3381718#M959389</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-11T10:35:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3382364#M959390</link>
      <description>&lt;P&gt;Do you have any dynamic routing policies that might be overriding the PBR?&lt;/P&gt;</description>
      <pubDate>Sun, 13 May 2018 07:41:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3382364#M959390</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-13T07:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3382431#M959391</link>
      <description>I receive default route through BGP - but other than that I don't know what "dynamic routing policy" means.&lt;BR /&gt;&lt;BR /&gt;Thanks!</description>
      <pubDate>Sun, 13 May 2018 14:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3382431#M959391</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-13T14:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.6 PBR and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3396356#M959392</link>
      <description>An update for anyone interested: PBR was not working because of me using also NAT.&lt;BR /&gt;More specific I was using Twice NAT statements as I was intending to source nat only for a specific destination.&lt;BR /&gt;&lt;BR /&gt;I quit NAT and PBR worked fine. Then a colleague suggested to also try with Object NAT and guess what: it worked! Pity the documentation: 9.6 to 9.9 adds no real detail about the inter operability between NAT and PBR (yet)</description>
      <pubDate>Fri, 08 Jun 2018 11:57:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-6-pbr-and-nat/m-p/3396356#M959392</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-06-08T11:57:53Z</dc:date>
    </item>
  </channel>
</rss>

