10-04-2012 01:43 PM - edited 03-11-2019 05:04 PM
I haver configure an access from a vpn zone to a server on dmz6 but it is not working
access-list vpn-inside-inbound extended permit tcp 10.32.67.0 255.255.255.0 host 10.1.76.40
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
When i run a packet-tracer this is what i got.
PERIMETRAL# packet-tracer input vpn-inside tcp 10.32.67.31 1026 10.1.76.40 205$
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ab427a8, priority=12, domain=capture, deny=false
hits=14225563, user_data=0x7b477a28, cs_id=0x0, l3_type=0x0
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0000.0000.0000
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x75bba118, priority=1, domain=permit, deny=false
hits=80685264, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0000.0000.0000
Phase: 3
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
nat-control
match ip dmz6-tmp host 10.1.74.127 vpn-inside any
static translation to 10.1.76.40
translate_hits = 0, untranslate_hits = 6265
Additional Information:
NAT divert to egress interface dmz6-tmp
Untranslate 10.1.76.40/0 to 10.1.74.127/0 using netmask 255.255.255.255
Phase: 5
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 10.32.67.0 255.255.255.0 vpn-inside
Phase: 6
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group vpn-inside-inbound in interface vpn-inside
access-list vpn-inside-inbound extended permit tcp 10.32.67.0 255.255.255.0 host 10.1.76.40
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7c37d2e0, priority=12, domain=permit, deny=false
hits=51, user_data=0x771701c0, cs_id=0x0, flags=0x0, protocol=6
src ip=10.32.67.0, mask=255.255.255.0, port=0
dst ip=10.1.76.40, mask=255.255.255.255, port=0, dscp=0x0
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x75bbcd90, priority=0, domain=permit-ip-option, deny=true
hits=8704521, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 8
Type: INSPECT
Subtype: inspect-ftp
Result: ALLOW
Config:
class-map class_ftp
match port tcp eq 20573
policy-map global_policy
class class_ftp
inspect ftp
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0x77ddbe48, priority=70, domain=inspect-ftp, deny=false
hits=1464, user_data=0x77ddb7e8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=20573, dscp=0x0
Phase: 9
Type: NAT-EXEMPT
Subtype: rpf-check
Result: DROP
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x762c1a08, priority=6, domain=nat-exempt-reverse, deny=false
hits=626, user_data=0x762c1798, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip=10.0.0.0, mask=255.0.0.0, port=0
dst ip=10.1.74.0, mask=255.255.255.0, port=0, dscp=0x0
Result:
input-interface: vpn-inside
input-status: up
input-line-status: up
output-interface: vpn-inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
Solved! Go to Solution.
10-05-2012 12:05 PM
Hello Edmundo,
Okay based on the configuration here are my recomendations:
1)10.1.76. subnet does not exist on your network, I mean no interface attached to that, you do not have a route to that witch means you will need to proxy arp that IP.
Do the following changes and run the packet tracer.
access-list dmz6-tmp-nat line 1 deny ip host 10.1.74.127 any
access-list vpn-inside-nat extended line1 permit ip any host 10.1.76.40
Regards,
10-04-2012 03:56 PM
Hello Edmundo,
Looks like the packet on the way back is not gettting natted as it should
Please share the following:
sh nameif
Sh run nat
Sh run global
Sh run static
Regards,
10-05-2012 07:18 AM
PERIMETRAL# show nameif
Interface Name Security
GigabitEthernet0/0.10 outside 0
GigabitEthernet0/0.73 vpn-inside 35
GigabitEthernet0/0.75 siscae 10
GigabitEthernet0/0.80 dmz2 80
GigabitEthernet0/0.101 dmz6-tmp 39
GigabitEthernet0/0.103 dmz3 70
GigabitEthernet0/0.105 dmz5 30
GigabitEthernet0/0.110 outside-s 5
GigabitEthernet0/1.118 dmz4 60
GigabitEthernet0/2.100 inside 100
Management0/0 management 100
PERIMETRAL# show run nat
nat (vpn-inside) 0 access-list vpn-inside-nat
nat (siscae) 0 access-list siscae-nat
nat (dmz2) 0 access-list mars
nat (dmz2) 1 10.1.66.33 255.255.255.255
nat (dmz2) 67 10.1.66.66 255.255.255.255
nat (dmz2) 68 10.1.66.67 255.255.255.255
nat (dmz2) 66 10.1.66.253 255.255.255.255
nat (dmz6-tmp) 0 access-list dmz6-tmp-nat
nat (dmz3) 0 access-list dmz3-nat
nat (dmz5) 0 access-list dmz5-nat
nat (outside-s) 0 access-list outside-s-nat
nat (dmz4) 0 access-list dmz4-nat
nat (dmz4) 20 access-list acceso-ministro
nat (dmz4) 21 access-list acceso-prueba
nat (inside) 0 access-list inside-nat
show run global
global (outside) 1 10.255.255.100
global (outside) 1 10.255.255.103
global (outside) 66 10.1.66.253 netmask 255.255.255.255
global (outside) 67 10.1.66.66 netmask 255.255.255.255
global (outside) 68 10.1.66.67 netmask 255.255.255.255
global (dmz5) 20 10.16.152.220
global (dmz5) 21 10.16.152.221
global (dmz5) 66 10.1.66.253 netmask 255.255.255.255
global (dmz4) 66 10.1.66.253 netmask 255.255.255.255
global (dmz4) 67 10.1.66.66 netmask 255.255.255.255
global (dmz4) 68 10.1.66.67 netmask 255.255.255.255
show run nat
static (vpn-inside,dmz6-tmp) SVDGTEC31 10.1.70.30 netmask 255.255.255.255 dns tcp 300 100
static (dmz6-tmp,vpn-inside) tcp 10.1.70.50 www 10.1.74.50 www netmask 255.255.255.255 dns tcp 300 100
static (dmz6-tmp,vpn-inside) 10.1.74.70 10.1.74.70 netmask 255.255.255.255 dns
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
static (dmz6-tmp,vpn-inside) 10.1.70.30 SVDGTEC31 netmask 255.255.255.255 dns tcp 300 100
10-05-2012 08:07 AM
Please provide
show run access-list vpn-inside-nat
show run access-list dmz6-tmp-nat
10-05-2012 08:53 AM
These are the access-list:
vpn-inside-nat
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.74.127
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host SISCAE
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.96.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.30.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.60.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.21.0 255.255.255.0 any
access-list vpn-inside-nat extended permit ip 192.168.10.0 255.255.255.0 host 10.1.70.30
access-list vpn-inside-nat extended permit ip 172.16.100.0 255.255.255.0 10.1.74.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.10.0 255.255.255.0 host 10.1.74.40
access-list vpn-inside-nat extended permit ip 10.1.73.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 10.1.73.0 255.255.255.0 any
access-list vpn-inside-nat extended permit ip host 192.168.108.32 10.0.0.0 255.0.0.0
access-list vpn-inside-nat extended permit ip host 192.168.108.32 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.78.0 255.255.255.0 host 10.1.70.41
access-list vpn-inside-nat extended permit ip 192.168.78.0 255.255.255.0 host SVDGTEC31
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.76.40
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.75.40
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.121.10
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.128.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.55
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.51
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.52
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.53
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.56
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.54
dmz6-tmp-nat
access-list dmz6-tmp-nat extended permit ip host 10.1.74.70 192.168.74.0 255.255.255.0
access-list dmz6-tmp-nat extended permit ip host 10.1.74.70 10.1.115.0 255.255.255.0
access-list dmz6-tmp-nat extended permit ip 10.1.74.0 255.255.255.0 10.1.116.0 255.255.255.0
access-list dmz6-tmp-nat extended deny ip host 10.1.74.70 10.0.0.0 255.0.0.0
access-list dmz6-tmp-nat extended deny ip 10.1.74.0 255.255.255.0 host 10.1.73.32
access-list dmz6-tmp-nat extended deny ip 10.1.74.0 255.255.255.0 host 10.1.73.33
access-list dmz6-tmp-nat extended deny ip 10.1.74.0 255.255.255.0 192.168.0.0 255.255.0.0
access-list dmz6-tmp-nat extended deny ip 10.1.74.0 255.255.255.0 10.255.10.0 255.255.255.0
access-list dmz6-tmp-nat extended permit ip 10.1.74.0 255.255.255.0 10.0.0.0 255.0.0.0
Regards
Edmundo
10-05-2012 09:24 AM
Hello Edmundo,
Please add the following
access-list vpn-inside-nat extended permit ip 10.32.67.0 255.255.255.0 host 10.1.76.40
Then do the packet tracer again
packet-tracer input vpn-inside tcp 10.32.67.20 1025 10.1.76.40 80
Regards,
Any other question..Just remember to rate all the helpful posts..
10-05-2012 09:43 AM
Hello, jcarvaj!
I have already tried it, but the problem still continuos.
PERIMETRAL# show run access-list vpn-inside-nat
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.74.127
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host SISCAE
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.96.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.30.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.60.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.21.0 255.255.255.0 any
access-list vpn-inside-nat extended permit ip 192.168.10.0 255.255.255.0 host 10.1.70.30
access-list vpn-inside-nat extended permit ip 172.16.100.0 255.255.255.0 10.1.74.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.10.0 255.255.255.0 host 10.1.74.40
access-list vpn-inside-nat extended permit ip 10.1.73.0 255.255.255.0 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 10.1.73.0 255.255.255.0 any
access-list vpn-inside-nat extended permit ip host 192.168.108.32 10.0.0.0 255.0.0.0
access-list vpn-inside-nat extended permit ip host 192.168.108.32 10.1.0.0 255.255.0.0
access-list vpn-inside-nat extended permit ip 192.168.78.0 255.255.255.0 host 10.1.70.41
access-list vpn-inside-nat extended permit ip 192.168.78.0 255.255.255.0 host SVDGTEC31
access-list vpn-inside-nat extended permit ip 10.32.67.0 255.255.255.0 host 10.1.76.40
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.76.40
access-list vpn-inside-nat extended permit ip 10.255.10.0 255.255.255.0 host 10.1.75.40
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.121.10
access-list vpn-inside-nat extended permit ip 192.168.99.0 255.255.255.0 10.1.128.0 255.255.255.0
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.55
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.51
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.52
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.53
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.56
access-list vpn-inside-nat extended permit ip 192.168.70.0 255.255.255.0 host 10.1.75.54
PERIMETRAL# packet-tracer input vpn-inside tcp 10.32.67.10 1026 10.1.76.40 20573
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
MAC Access list
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list
Phase: 3
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
nat-control
match ip dmz6-tmp host 10.1.74.127 vpn-inside any
static translation to 10.1.76.40
translate_hits = 0, untranslate_hits = 6290
Additional Information:
NAT divert to egress interface dmz6-tmp
Untranslate 10.1.76.40/0 to 10.1.74.127/0 using netmask 255.255.255.255
Phase: 5
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 10.32.67.0 255.255.255.0 vpn-inside
Phase: 6
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group vpn-inside-inbound in interface vpn-inside
access-list vpn-inside-inbound extended permit tcp 10.32.67.0 255.255.255.0 host 10.1.76.40
Additional Information:
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 8
Type: INSPECT
Subtype: inspect-ftp
Result: ALLOW
Config:
class-map class_ftp
match port tcp eq 20573
policy-map global_policy
class class_ftp
inspect ftp
service-policy global_policy global
Additional Information:
Phase: 9
Type: NAT-EXEMPT
Subtype: rpf-check
Result: DROP
Config:
Additional Information:
Result:
input-interface: vpn-inside
input-status: up
input-line-status: up
output-interface: vpn-inside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
Regards
10-05-2012 10:08 AM
Hello Edmundo,
If possible share the entire configuration!
10-05-2012 10:31 AM
Hello!
It is too big to paste here! is there a way that to send it to you and no one else?
Regards
10-05-2012 10:37 AM
Hello Edmundo,
I understand but we really need to check that,
You could send that to me via email.
Regards,
10-05-2012 10:40 AM
Yes, i could! Give it to me.
Regards
10-05-2012 10:51 AM
10-05-2012 11:03 AM
Hello!
It is done! Tell your considerations
Regards
10-05-2012 12:05 PM
Hello Edmundo,
Okay based on the configuration here are my recomendations:
1)10.1.76. subnet does not exist on your network, I mean no interface attached to that, you do not have a route to that witch means you will need to proxy arp that IP.
Do the following changes and run the packet tracer.
access-list dmz6-tmp-nat line 1 deny ip host 10.1.74.127 any
access-list vpn-inside-nat extended line1 permit ip any host 10.1.76.40
Regards,
10-05-2012 12:55 PM
Hello, jcarvaja!
Excellent, now i see the problem, it worked perfectly!
PERIMETRAL# packet-tracer input vpn-inside tcp 10.32.67.31 1026 10.1.76.40 205$
Phase: 1
Type: CAPTURE
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7ab427a8, priority=12, domain=capture, deny=false
hits=14887767, user_data=0x7b477a28, cs_id=0x0, l3_type=0x0
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0000.0000.0000
Phase: 2
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
Forward Flow based lookup yields rule:
in id=0x75bba118, priority=1, domain=permit, deny=false
hits=80974662, user_data=0x0, cs_id=0x0, l3_type=0x8
src mac=0000.0000.0000, mask=0000.0000.0000
dst mac=0000.0000.0000, mask=0000.0000.0000
Phase: 3
Type: FLOW-LOOKUP
Subtype:
Result: ALLOW
Config:
Additional Information:
Found no matching flow, creating a new flow
Phase: 4
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
nat-control
match ip dmz6-tmp host 10.1.74.127 vpn-inside any
static translation to 10.1.76.40
translate_hits = 0, untranslate_hits = 6298
Additional Information:
NAT divert to egress interface dmz6-tmp
Untranslate 10.1.76.40/0 to 10.1.74.127/0 using netmask 255.255.255.255
Phase: 5
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 10.32.67.0 255.255.255.0 vpn-inside
Phase: 6
Type: ACCESS-LIST
Subtype: log
Result: ALLOW
Config:
access-group vpn-inside-inbound in interface vpn-inside
access-list vpn-inside-inbound extended permit tcp 10.32.67.0 255.255.255.0 host 10.1.76.40
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7c37d2e0, priority=12, domain=permit, deny=false
hits=67, user_data=0x771701c0, cs_id=0x0, flags=0x0, protocol=6
src ip=10.32.67.0, mask=255.255.255.0, port=0
dst ip=10.1.76.40, mask=255.255.255.255, port=0, dscp=0x0
Phase: 7
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x75bbcd90, priority=0, domain=permit-ip-option, deny=true
hits=8741820, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 8
Type: INSPECT
Subtype: inspect-ftp
Result: ALLOW
Config:
class-map class_ftp
match port tcp eq 20573
policy-map global_policy
class class_ftp
inspect ftp
service-policy global_policy global
Additional Information:
Forward Flow based lookup yields rule:
in id=0x77ddbe48, priority=70, domain=inspect-ftp, deny=false
hits=1481, user_data=0x77ddb7e8, cs_id=0x0, use_real_addr, flags=0x0, protocol=6
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=20573, dscp=0x0
Phase: 9
Type: NAT-EXEMPT
Subtype: rpf-check
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7625e4e8, priority=6, domain=nat-exempt-reverse, deny=true
hits=2, user_data=0x7afebdd0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=10.1.74.127, mask=255.255.255.255, port=0, dscp=0x0
Phase: 10
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
nat (vpn-inside) 0 0.0.0.0 0.0.0.0
nat-control
match ip vpn-inside any outside any
no translation group, implicit deny
policy_hits = 1
Additional Information:
Forward Flow based lookup yields rule:
in id=0x7a734a78, priority=0, domain=host, deny=false
hits=897389, user_data=0x7b5d6590, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 11
Type: IDS
Subtype:
Result: ALLOW
Config:
Additional Information:
Forward Flow based lookup yields rule:
out id=0x77de16b0, priority=51, domain=ids, deny=false
hits=371867171, user_data=0x77de1088, cs_id=0x0, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 12
Type: NAT
Subtype: rpf-check
Result: ALLOW
Config:
static (dmz6-tmp,vpn-inside) 10.1.76.40 10.1.74.127 netmask 255.255.255.255 dns tcp 300 100
nat-control
match ip dmz6-tmp host 10.1.74.127 vpn-inside any
static translation to 10.1.76.40
translate_hits = 0, untranslate_hits = 6298
Additional Information:
Forward Flow based lookup yields rule:
out id=0x76cf9e00, priority=5, domain=nat-reverse, deny=false
hits=8099, user_data=0x76cf9968, cs_id=0x0, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=10.1.74.127, mask=255.255.255.255, port=0, dscp=0x0
Phase: 13
Type: NAT
Subtype: host-limits
Result: ALLOW
Config:
static (dmz6-tmp,dmz4) tcp 10.1.76.40 20573 10.1.74.127 20573 netmask 255.255.255.255 dns tcp 300 100
nat-control
match tcp dmz6-tmp host 10.1.74.127 eq 20573 dmz4 any
static translation to 10.1.76.40/20573
translate_hits = 0, untranslate_hits = 23407
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x76a83560, priority=5, domain=host, deny=false
hits=287201, user_data=0x76a82f20, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=10.1.74.127, mask=255.255.255.255, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 14
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Reverse Flow based lookup yields rule:
in id=0x75c84ed0, priority=0, domain=permit-ip-option, deny=true
hits=659454008, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0
src ip=0.0.0.0, mask=0.0.0.0, port=0
dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
Phase: 15
Type: FLOW-CREATION
Subtype:
Result: ALLOW
Config:
Additional Information:
New flow created with id 1505857570, packet dispatched to next module
Module information for forward flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_punt
snp_fp_translate
snp_fp_divert_fragment
snp_ids
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat
Module information for reverse flow ...
snp_fp_tracer_drop
snp_fp_inspect_ip_options
snp_fp_tcp_normalizer
snp_fp_translate
snp_fp_punt
snp_fp_divert_fragment
snp_ids
snp_fp_tcp_normalizer
snp_fp_adjacency
snp_fp_fragment
snp_ifc_stat
Result:
input-interface: vpn-inside
input-status: up
input-line-status: up
output-interface: vpn-inside
output-status: up
output-line-status: up
Action: allow
Regards
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide