<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 9.2 - NAT Reflection / Loopback in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312217#M997939</link>
    <description>&lt;P&gt;Yes that would just forward&amp;nbsp;&lt;SPAN&gt;port 8001 to 8001.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I did not understand what you are trying&amp;nbsp;to do.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I guess you could have a nat something like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;nat (inside,inside) source static obj-inside-ips obj-fake-inside-ips destination static obj-public-ip obj-server1-ip service obj-8000 obj-8001&lt;/PRE&gt;
&lt;P&gt;, judging by&amp;nbsp; the config you posted the clients and the server are on the same network, so the return traffic will not be sent through the asa, unless the source ips are nated as well.&lt;/P&gt;
&lt;P&gt;You could also use dns to resolve the name with different ips. Probably a better and cleaner solution, than the nat one.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jan 2018 16:07:46 GMT</pubDate>
    <dc:creator>Bogdan Nita</dc:creator>
    <dc:date>2018-01-16T16:07:46Z</dc:date>
    <item>
      <title>ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312059#M997936</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;How to access an internal IP via the public/WAN IP with port forward enabled?&lt;/P&gt;
&lt;P&gt;Port 8001 is forwarded to 8000 for 192.168.1.100&lt;/P&gt;
&lt;P&gt;I like to access 8001 via the public IP.&lt;/P&gt;
&lt;P&gt;So users can access the server the same way regardless of where they are.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network Server1
 nat (inside,outside) static interface service tcp 8000 8001&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Kim&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:09:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312059#M997936</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2020-02-21T15:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312172#M997937</link>
      <description>&lt;P&gt;Not sure I understood the problem. Wouldn't the following work:&lt;/P&gt;
&lt;PRE&gt;object network Server1
 nat (inside,outside) static interface service tcp &lt;STRONG&gt;8001 8001&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2018 15:12:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312172#M997937</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-16T15:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312179#M997938</link>
      <description>&lt;P&gt;Wouldn't that just forward port 8001 to 8001 ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need the outside/wan IP to be accessed from the inside, and also forward port 8001 to 8000.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2018 15:17:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312179#M997938</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-16T15:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312217#M997939</link>
      <description>&lt;P&gt;Yes that would just forward&amp;nbsp;&lt;SPAN&gt;port 8001 to 8001.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I did not understand what you are trying&amp;nbsp;to do.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I guess you could have a nat something like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;nat (inside,inside) source static obj-inside-ips obj-fake-inside-ips destination static obj-public-ip obj-server1-ip service obj-8000 obj-8001&lt;/PRE&gt;
&lt;P&gt;, judging by&amp;nbsp; the config you posted the clients and the server are on the same network, so the return traffic will not be sent through the asa, unless the source ips are nated as well.&lt;/P&gt;
&lt;P&gt;You could also use dns to resolve the name with different ips. Probably a better and cleaner solution, than the nat one.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2018 16:07:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312217#M997939</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-16T16:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312297#M997940</link>
      <description>&lt;P&gt;Thanks Bogdan!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to clarify, what should &lt;EM&gt;obj-fake-inside-ips&lt;/EM&gt; be?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DNS is not an option when using different port in- and outside.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jan 2018 18:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312297#M997940</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-16T18:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312633#M997941</link>
      <description>&lt;P&gt;Hi&amp;nbsp;kimilisecco,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As I said in the previous post it seems that your clients and server are actually on the same network, if this is the case the return traffic from the server will be sent directly to the client and because of that the second packet sent by the client&amp;nbsp;will be dropped by the ASA. To get around this the source IPs could be nated as well in order to make the return traffic to go through the ASA.&lt;/P&gt;
&lt;P&gt;So the&amp;nbsp;&lt;EM&gt;obj-fake-inside-ips&amp;nbsp;&lt;/EM&gt;are just used for that and it could be any unused ip range in your network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also in order to make this work you would need&amp;nbsp; the same-security-traffic permit intra-interface command.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 08:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312633#M997941</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-17T08:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312884#M997942</link>
      <description>&lt;P&gt;Hi Bogdan&lt;/P&gt;
&lt;P&gt;Yes clients are on same network.&lt;/P&gt;
&lt;P&gt;I can't get it to work..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object network obj-192.168.5.0
 subnet 192.168.5.0 255.255.255.0

object network obj-fake-inside-ips
 range 192.168.5.220 192.168.5.240

 object network obj-public-ip
 host 5.x.x.8
 
 object network obj-nvr1-ip
 host 192.168.5.242

 object-group service obj-8001 tcp-udp
 port-object eq 8001
 
object-group service obj-8000 tcp-udp
 port-object eq 8000

 nat (inside,inside) source static obj-192.168.5.0 obj-fake-inside-ips destination static obj-public-ip obj-nvr1-ip service obj-8000 obj-8001&lt;/PRE&gt;
&lt;P&gt;Is that correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;/Kim&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 14:23:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3312884#M997942</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-17T14:23:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313024#M997943</link>
      <description>&lt;P&gt;Hi Kim,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;obj-fake-inside-ips can not be in the same range as your internal IPs.&lt;/P&gt;
&lt;P&gt;You could use for instance&amp;nbsp;192.168.6.0/24, if you are not using it for something else.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I tested the config in my lab. Bellow relevant config and show commands.&lt;/P&gt;
&lt;P&gt;I used port 80 instead of 8000 and 81 instead of 8001.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;! NAT for external access&lt;BR /&gt;!&lt;BR /&gt;object network Server1&lt;BR /&gt; host 192.168.5.242&lt;BR /&gt; nat (inside,outside) static interface service tcp www 81&lt;BR /&gt;!&lt;BR /&gt;! NAT for internal access&lt;BR /&gt;!&lt;BR /&gt;object network obj-192.168.5.0&lt;BR /&gt; subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.6.0&lt;BR /&gt; subnet 192.168.6.0 255.255.255.0&lt;BR /&gt;object network obj-public-ip&lt;BR /&gt; host 5.5.5.8&lt;BR /&gt;object network obj-nvr1-ip&lt;BR /&gt; host 192.168.5.242&lt;BR /&gt;object service obj-80&lt;BR /&gt; service tcp destination eq 80&lt;BR /&gt;object service obj-81&lt;BR /&gt; service tcp destination eq 81&lt;BR /&gt;!&lt;BR /&gt;nat (inside,inside) source static obj-192.168.5.0 obj-192.168.6.0 destination static obj-public-ip obj-nvr1-ip service obj-81 obj-80&lt;BR /&gt;!&lt;BR /&gt;!permit traffic comming and exiting the same interface&lt;BR /&gt;!&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ciscoasa# packet-tracer input inside tcp 192.168.5.10 1025 5.5.5.8 81&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,inside) source static obj-192.168.5.0 obj-192.168.6.0 destination static obj-public-ip obj-nvr1-ip service obj-81 obj-80&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 5.5.5.8/81 to 192.168.5.242/80&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,inside) source static obj-192.168.5.0 obj-192.168.6.0 destination static obj-public-ip obj-nvr1-ip service obj-81 obj-80&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 192.168.5.10/1025 to 192.168.6.10/1025&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,inside) source static obj-192.168.5.0 obj-192.168.6.0 destination static obj-public-ip obj-nvr1-ip service obj-81 obj-80&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 10&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 13&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 12, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;&lt;BR /&gt;ciscoasa# sh capture&lt;BR /&gt;capture CAP type raw-data interface inside [Capturing - 2372 bytes]&lt;BR /&gt;&lt;BR /&gt;ciscoasa# sh capture CAP&lt;BR /&gt;&lt;BR /&gt;30 packets captured&lt;BR /&gt;&lt;BR /&gt; 1: 15:45:39.514698 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: S 3807755150:3807755150(0) win 4128 &amp;lt;mss 536&amp;gt;&lt;BR /&gt; 2: 15:45:39.515125 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: S 864605413:864605413(0) win 4128 &amp;lt;mss 536&amp;gt;&lt;BR /&gt; 3: 15:45:39.524463 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: S 3129893081:3129893081(0) ack 864605414 win 4128 &amp;lt;mss 536&amp;gt;&lt;BR /&gt; 4: 15:45:39.524509 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: S 187882781:187882781(0) ack 3807755151 win 4128 &amp;lt;mss 536&amp;gt;&lt;BR /&gt; 5: 15:45:39.534548 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: . ack 187882782 win 4128&lt;BR /&gt; 6: 15:45:39.534609 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: . ack 3129893082 win 4128&lt;BR /&gt; 7: 15:45:39.534762 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: . ack 187882782 win 4128&lt;BR /&gt; 8: 15:45:39.534792 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: . ack 3129893082 win 4128&lt;BR /&gt; 9: 15:45:41.520984 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: P 3807755151:3807755153(2) ack 187882782 win 4128&lt;BR /&gt; 10: 15:45:41.521014 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: P 864605414:864605416(2) ack 3129893082 win 4128&lt;BR /&gt; 11: 15:45:41.530947 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: P 3807755153:3807755154(1) ack 187882782 win 4128&lt;BR /&gt; 12: 15:45:41.530963 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: P 864605416:864605417(1) ack 3129893082 win 4128&lt;BR /&gt; 13: 15:45:41.732628 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: . ack 864605417 win 4125&lt;BR /&gt; 14: 15:45:41.732643 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: . ack 3807755154 win 4125&lt;BR /&gt; 15: 15:45:44.228580 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: P 3807755154:3807755155(1) ack 187882782 win 4128&lt;BR /&gt; 16: 15:45:44.228595 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: P 864605417:864605418(1) ack 3129893082 win 4128&lt;BR /&gt; 17: 15:45:44.429741 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: . ack 864605418 win 4124&lt;BR /&gt; 18: 15:45:44.429772 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: . ack 3807755155 win 4124&lt;BR /&gt; 19: 15:45:44.751044 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: P 3807755155:3807755157(2) ack 187882782 win 4128&lt;BR /&gt; 20: 15:45:44.751059 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: P 864605418:864605420(2) ack 3129893082 win 4128&lt;BR /&gt; 21: 15:45:44.761831 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: . 3129893082:3129893204(122) ack 864605420 win 4122&lt;BR /&gt; 22: 15:45:44.761847 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: . 187882782:187882904(122) ack 3807755157 win 4122&lt;BR /&gt; 23: 15:45:44.762045 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: FP 3129893204:3129893204(0) ack 864605420 win 4122&lt;BR /&gt; 24: 15:45:44.762076 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: FP 187882904:187882904(0) ack 3807755157 win 4122&lt;BR /&gt; 25: 15:45:44.771780 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: . ack 187882905 win 4006&lt;BR /&gt; 26: 15:45:44.771871 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: . ack 3129893205 win 4006&lt;BR /&gt; 27: 15:45:44.772070 192.168.5.10.14566 &amp;gt; 5.5.5.8.81: FP 3807755157:3807755157(0) ack 187882905 win 4006&lt;BR /&gt; 28: 15:45:44.772115 192.168.6.10.14566 &amp;gt; 192.168.5.242.80: FP 864605420:864605420(0) ack 3129893205 win 4006&lt;BR /&gt; 29: 15:45:44.782384 192.168.5.242.80 &amp;gt; 192.168.6.10.14566: . ack 864605421 win 4122&lt;BR /&gt; 30: 15:45:44.782414 5.5.5.8.81 &amp;gt; 192.168.5.10.14566: . ack 3807755158 win 4122&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Bogdan&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 16:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313024#M997943</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-17T16:24:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313431#M997944</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;Does not work for me:&lt;/P&gt;
&lt;PRE&gt;packet-tracer input inside tcp 192.168.5.10 1025 5.x.x.8 8001
 
 Phase: 2
Type: ROUTE-LOOKUP
Subtype: Resolve Egress Interface
Result: ALLOW
Config:
Additional Information:
in   5.x.x.8    255.255.255.255 identity

Phase: 3
Type: NAT
Subtype: per-session
Result: ALLOW
Config:
Additional Information:

Phase: 4
Type: ACCESS-LIST
Subtype: 
Result: DROP
Config:
Implicit Rule
Additional Information:&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;object service obj-8000
 service tcp destination eq 8000 
object service obj-8001
 service tcp destination eq 8001&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;PRE&gt;object network obj-fake-inside-ips
 subnet 172.16.80.0 255.255.255.0
&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Jan 2018 07:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313431#M997944</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-18T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313496#M997945</link>
      <description>&lt;P&gt;Did you configure same-security intra-interface ?&lt;/P&gt;
&lt;PRE&gt;same-security-traffic permit intra-interface&lt;/PRE&gt;</description>
      <pubDate>Thu, 18 Jan 2018 09:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313496#M997945</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-18T09:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313601#M997946</link>
      <description>&lt;P&gt;Yes&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 11:45:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313601#M997946</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-18T11:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313748#M997947</link>
      <description>&lt;P&gt;did you permit traffic on the inside access-list ?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 14:00:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313748#M997947</guid>
      <dc:creator>Bogdan Nita</dc:creator>
      <dc:date>2018-01-18T14:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 9.2 - NAT Reflection / Loopback</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313767#M997948</link>
      <description>&lt;P&gt;Yes, that's also permitted by default.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2018 14:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-9-2-nat-reflection-loopback/m-p/3313767#M997948</guid>
      <dc:creator>kimilisecco</dc:creator>
      <dc:date>2018-01-18T14:17:19Z</dc:date>
    </item>
  </channel>
</rss>

