<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5515 internet NAT problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3417840#M974253</link>
    <description>&lt;P&gt;Been a while since I configured an ASA.&amp;nbsp; it's a&lt;/P&gt;
&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5515, 8192 MB RAM, CPU Clarkdale 3059 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2) &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I got the outside configured ok.&amp;nbsp; I can ping out. I can ping switches internal.&amp;nbsp; I have anyconnect working and can get to internal switches.&amp;nbsp; but I can not get to the internet from inside, it doesn't even ping outside from the internal interface.&amp;nbsp; I'm sure I must have something wrong in the NAT rules, but I guess I'm missing it. below is what I think is relevant.&amp;nbsp; attached is the full config.&amp;nbsp; Any help would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list split-acl remark split tunnel for anyconnect&lt;BR /&gt;access-list split-acl standard permit 10.69.138.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.69.10.0_25 NETWORK_OBJ_10.69.10.0_25 no-proxy-arp route-lookup&lt;BR /&gt;nat (any,any) source static any any inactive description default nat&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj_dmz&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;router ospf 1&lt;BR /&gt;&amp;nbsp;network 10.69.138.0 255.255.255.0 area 0&lt;BR /&gt;&amp;nbsp;area 0&lt;BR /&gt;&amp;nbsp;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:00:03 GMT</pubDate>
    <dc:creator>Wayne Sitton</dc:creator>
    <dc:date>2020-02-21T16:00:03Z</dc:date>
    <item>
      <title>ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3417840#M974253</link>
      <description>&lt;P&gt;Been a while since I configured an ASA.&amp;nbsp; it's a&lt;/P&gt;
&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5515, 8192 MB RAM, CPU Clarkdale 3059 MHz, 1 CPU (4 cores)&lt;BR /&gt;:&lt;BR /&gt;ASA Version 9.9(2) &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I got the outside configured ok.&amp;nbsp; I can ping out. I can ping switches internal.&amp;nbsp; I have anyconnect working and can get to internal switches.&amp;nbsp; but I can not get to the internet from inside, it doesn't even ping outside from the internal interface.&amp;nbsp; I'm sure I must have something wrong in the NAT rules, but I guess I'm missing it. below is what I think is relevant.&amp;nbsp; attached is the full config.&amp;nbsp; Any help would be appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;access-list split-acl remark split tunnel for anyconnect&lt;BR /&gt;access-list split-acl standard permit 10.69.138.0 255.255.255.0 &lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list dmz_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;nat (inside,outside) source static any any destination static NETWORK_OBJ_10.69.10.0_25 NETWORK_OBJ_10.69.10.0_25 no-proxy-arp route-lookup&lt;BR /&gt;nat (any,any) source static any any inactive description default nat&lt;BR /&gt;!&lt;BR /&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;BR /&gt;object network obj_dmz&lt;BR /&gt;&amp;nbsp;nat (dmz,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;router ospf 1&lt;BR /&gt;&amp;nbsp;network 10.69.138.0 255.255.255.0 area 0&lt;BR /&gt;&amp;nbsp;area 0&lt;BR /&gt;&amp;nbsp;log-adj-changes&lt;BR /&gt;!&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx 1&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:00:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3417840#M974253</guid>
      <dc:creator>Wayne Sitton</dc:creator>
      <dc:date>2020-02-21T16:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3672931#M974260</link>
      <description>&lt;P&gt;Config looks ok as far as I can tell.&lt;BR /&gt;Can you post the output from the following command ?&lt;BR /&gt;packet-tracer input inside icmp 10.69.138.10 8 0 8.8.8.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 10:30:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3672931#M974260</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-07-24T10:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673209#M974261</link>
      <description>&lt;P&gt;packet-tracer input inside icmp 10.69.138.10 8 0 8.8.8.8&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 205.251.151.225 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.69.138.10/0 to 205.251.151.226/33560&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 17291, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network obj_any&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.69.138.10/0 to 205.251.151.226/33560&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 205.251.151.225 using egress ifc outside&lt;/P&gt;
&lt;P&gt;Phase: 14&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 8875.563c.e8c0 hits 2 reference 2&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 13:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673209#M974261</guid>
      <dc:creator>Wayne Sitton</dc:creator>
      <dc:date>2018-07-24T13:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673330#M974263</link>
      <description>&lt;P&gt;Can you turn on your buffered logging and then show log after attempting an outbound ping from an inside server?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;show asp drop&lt;/PRE&gt;
&lt;P&gt;might also reveal some answers for you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 14:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673330#M974263</guid>
      <dc:creator>aaron.hackney</dc:creator>
      <dc:date>2018-07-24T14:55:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673367#M974266</link>
      <description>&lt;P&gt;Based on the packet-tracer output ping it should work.&lt;BR /&gt;Are you testing from a host connected to inside ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To confirm that the asa is actually sending out the packets you could also do a capture:&lt;BR /&gt;capture CAP interface outside match icmp host 205.251.151.226 host 8.8.8.8&lt;BR /&gt;ping 8.8.8.8 from inside host&lt;BR /&gt;sh capture CAP ! to view the packets&lt;BR /&gt;no capture CAP ! to disable the capture&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jul 2018 15:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3673367#M974266</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-07-24T15:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3674472#M974268</link>
      <description>&lt;P&gt;tcts-FW-01# sho asp drop&lt;/P&gt;
&lt;P&gt;Frame drop:&lt;BR /&gt; NAT-T keepalive message (natt-keepalive) 50&lt;BR /&gt; Invalid TCP Length (invalid-tcp-hdr-length) 1&lt;BR /&gt; No route to host (no-route) 13483&lt;BR /&gt; Flow is denied by configured rule (acl-drop) 16427&lt;BR /&gt; No same-security-traffic configured (no-same-security-traffic) 108&lt;BR /&gt; First TCP packet not SYN (tcp-not-syn) 25269&lt;BR /&gt; TCP failed 3 way handshake (tcp-3whs-failed) 69&lt;BR /&gt; TCP RST/FIN out of order (tcp-rstfin-ooo) 122&lt;BR /&gt; TCP RST/SYN in window (tcp-rst-syn-in-win) 85&lt;BR /&gt; CTM returned error (ctm-error) 4&lt;BR /&gt; FP L2 rule drop (l2_acl) 5&lt;BR /&gt; Interface is down (interface-down) 3&lt;BR /&gt; Dropped pending packets in a closed socket (np-socket-closed) 8&lt;/P&gt;
&lt;P&gt;Last clearing: Never&lt;/P&gt;
&lt;P&gt;Flow drop:&lt;BR /&gt; NAT reverse path failed (nat-rpf-failed) 50&lt;BR /&gt; Inspection failure (inspect-fail) 98&lt;BR /&gt; SSL bad record detected (ssl-bad-record-detect) 53&lt;BR /&gt; SSL handshake failed (ssl-handshake-failed) 37&lt;/P&gt;
&lt;P&gt;Last clearing: Never&lt;BR /&gt;tcts-FW-01#&lt;/P&gt;</description>
      <pubDate>Wed, 25 Jul 2018 15:45:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3674472#M974268</guid>
      <dc:creator>Wayne Sitton</dc:creator>
      <dc:date>2018-07-25T15:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3677934#M974271</link>
      <description>&lt;P&gt;Okay, I was able to get to a host on the inside for testing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am able to get to the internet from the host, so I guess Nat is working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, I'm guessing my ping from the ASA inside is being blocked, although the rule to allow is there.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Jul 2018 00:26:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3677934#M974271</guid>
      <dc:creator>Wayne Sitton</dc:creator>
      <dc:date>2018-07-31T00:26:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5515 internet NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3679080#M974274</link>
      <description>&lt;P&gt;Glad to hear it Wayne,&lt;/P&gt;
&lt;P&gt;I see the rules you posted are:&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;access-list outside_access_in extended permit icmp any any 
access-list dmz_access_in extended permit icmp any any&lt;/PRE&gt;
&lt;P&gt;These rules affect ICMP packets going &lt;EM&gt;through&lt;/EM&gt; the device but not &lt;EM&gt;to&lt;/EM&gt; the device.&lt;/P&gt;
&lt;P&gt;If you want to allow ICMP pings that terminate at the ASA interface, you would need to use the global command ICMP.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/i1.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/i1.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope that helps!&lt;/P&gt;
&lt;P&gt;-A&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:32:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5515-internet-nat-problem/m-p/3679080#M974274</guid>
      <dc:creator>aaron.hackney</dc:creator>
      <dc:date>2018-08-01T12:32:55Z</dc:date>
    </item>
  </channel>
</rss>

