# packet-tracer input outside tcp 86.75.30.9 64151 55.5.12.34 4433 detailed
Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Elapsed time: 18176 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=13, domain=capture, deny=false hits=9000, user_data=0x7f7b, cs_id=0x0, l3_type=0x0 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0000.0000.0000 input_ifc=outside, output_ifc=any
Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Elapsed time: 18176 ns Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=1, domain=permit, deny=false hits=9000, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=outside, output_ifc=any
Phase: 3 Type: UN-NAT Subtype: static Result: ALLOW Elapsed time: 14848 ns Config: nat (inside,outside) source static server-althttps interface service TCP4433 TCP4433 Additional Information: NAT divert to egress interface inside Untranslate 86.75.30.9/4433 to 192.168.1.2/4433
Phase: 4 Type: ACCESS-LIST Subtype: log Result: ALLOW Elapsed time: 6912 ns Config: access-group outside-access in interface outside access-list outside-access extended permit tcp object-group ext host 192.168.1.2 eq 4433 object-group network ext network object host 55.5.12.34 Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=13, domain=permit, deny=false hits=2, user_data=0x7f7b, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=55.5.12.34, mask=255.255.255.255, port=0, tag=any dst ip/id=192.168.1.2, mask=255.255.255.255, port=4433, tag=any, dscp=0x0, nsg_id=none input_ifc=outside, output_ifc=any
Phase: 5 Type: NAT Subtype: Result: ALLOW Elapsed time: 6912 ns Config: nat (inside,outside) source static server-althttps interface service TCP4433 TCP4433 Additional Information: Static translate 55.5.12.34/64151 to 55.5.12.34/64151 Forward Flow based lookup yields rule: in id=0x7f7b, priority=6, domain=nat, deny=false hits=53, user_data=0x7f7b, cs_id=0x0, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=86.75.30.9, mask=255.255.255.255, port=4433, tag=any, dscp=0x0, nsg_id=none input_ifc=outside, output_ifc=inside
Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Elapsed time: 6912 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=nat-per-session, deny=false hits=9000, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any
Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Elapsed time: 6912 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=inspect-ip-options, deny=true hits=9000, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=outside, output_ifc=any
Phase: 8 Type: NAT Subtype: rpf-check Result: ALLOW Elapsed time: 27136 ns Config: nat (inside,outside) source static server-althttps interface service TCP4433 TCP4433 Additional Information: Forward Flow based lookup yields rule: out id=0x7f7b, priority=6, domain=nat-reverse, deny=false hits=55, user_data=0x7f7b, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=192.168.1.2, mask=255.255.255.255, port=4433, tag=any, dscp=0x0, nsg_id=none input_ifc=outside, output_ifc=inside
Phase: 9 Type: NAT Subtype: per-session Result: ALLOW Elapsed time: 22016 ns Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=nat-per-session, deny=false hits=9000, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any
Phase: 10 Type: IP-OPTIONS Subtype: Result: ALLOW Elapsed time: 1024 ns Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=inspect-ip-options, deny=true hits=9000, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=inside, output_ifc=any
Phase: 11 Type: FLOW-CREATION Subtype: Result: ALLOW Elapsed time: 52736 ns Config: Additional Information: New flow created with id 200001, packet dispatched to next module Module information for forward flow ... snp_fp_inspect_ip_options snp_fp_tcp_normalizer snp_fp_translate snp_fp_adjacency snp_fp_fragment snp_fp_tracer_drop snp_ifc_stat
Module information for reverse flow ... snp_fp_inspect_ip_options snp_fp_translate snp_fp_tcp_normalizer snp_fp_adjacency snp_fp_fragment snp_fp_tracer_drop snp_ifc_stat
Phase: 12 Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP Subtype: Resolve Preferred Egress interface Result: ALLOW Elapsed time: 13824 ns Config: Additional Information: Found next-hop 192.168.1.2 using egress ifc inside
Phase: 13 Type: ADJACENCY-LOOKUP Subtype: Resolve Nexthop IP address to MAC Result: ALLOW Elapsed time: 2560 ns Config: Additional Information: Found adjacency entry for Next-hop 192.168.1.2 on interface inside Adjacency :Active MAC address 0040.dead.beef hits 8 reference 3
Result: input-interface: outside input-status: up input-line-status: up output-interface: inside output-status: up output-line-status: up Action: allow Time Taken: 198144 ns | # packet-tracer input inside tcp 192.168.1.2 4433 55.5.12.34 65141 detailed
Phase: 1 Type: CAPTURE Subtype: Result: ALLOW Elapsed time: 16384 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=13, domain=capture, deny=false hits=9000, user_data=0x7f7b, cs_id=0x0, l3_type=0x0 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0000.0000.0000 input_ifc=inside, output_ifc=any
Phase: 2 Type: ACCESS-LIST Subtype: Result: ALLOW Elapsed time: 16384 ns Config: Implicit Rule Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=1, domain=permit, deny=false hits=9000, user_data=0x0, cs_id=0x0, l3_type=0x8 src mac=0000.0000.0000, mask=0000.0000.0000 dst mac=0000.0000.0000, mask=0100.0000.0000 input_ifc=inside, output_ifc=any
Phase: 3 Type: INPUT-ROUTE-LOOKUP Subtype: Resolve Egress Interface Result: ALLOW Elapsed time: 23552 ns Config: Additional Information: Found next-hop 86.7.5.30.10 using egress ifc outside
Phase: 4 Type: ACCESS-LIST Subtype: log Result: ALLOW Elapsed time: 6784 ns Config: access-group lan_inside in interface inside access-list lan_inside extended permit ip object lan-inside any Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=13, domain=permit, deny=false hits=9000, user_data=0x7f7b, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=192.168.1.0, mask=255.255.255.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=inside, output_ifc=any
Phase: 5 Type: NAT Subtype: Result: ALLOW Elapsed time: 6784 ns Config: nat (inside,outside) source static server-althttps interface service TCP4433 TCP4433 Additional Information: Static translate 192.168.1.2/4433 to 86.75.30.9/4433 Forward Flow based lookup yields rule: in id=0x7f7b, priority=6, domain=nat, deny=false hits=0, user_data=0x7f7b, cs_id=0x0, flags=0x0, protocol=6 src ip/id=192.168.1.2, mask=255.255.255.255, port=4433, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=inside, output_ifc=outside
Phase: 6 Type: NAT Subtype: per-session Result: ALLOW Elapsed time: 6784 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=nat-per-session, deny=false hits=9000, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any
Phase: 7 Type: IP-OPTIONS Subtype: Result: ALLOW Elapsed time: 6784 ns Config: Additional Information: Forward Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=inspect-ip-options, deny=true hits=9000, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=inside, output_ifc=any
Phase: 8 Type: NAT Subtype: rpf-check Result: ALLOW Elapsed time: 30720 ns Config: nat (inside,outside) source static server-althttps interface service TCP4433 TCP4433 Additional Information: Forward Flow based lookup yields rule: out id=0x7f7bfc767c60, priority=6, domain=nat-reverse, deny=false hits=1, user_data=0x7f7b, cs_id=0x0, use_real_addr, flags=0x0, protocol=6 src ip/id=192.168.1.2, mask=255.255.255.255, port=4433, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=inside, output_ifc=outside
Phase: 9 Type: NAT Subtype: per-session Result: ALLOW Elapsed time: 43008 ns Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=nat-per-session, deny=false hits=9000, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=any, output_ifc=any
Phase: 10 Type: IP-OPTIONS Subtype: Result: ALLOW Elapsed time: 1024 ns Config: Additional Information: Reverse Flow based lookup yields rule: in id=0x7f7b, priority=0, domain=inspect-ip-options, deny=true hits=9000, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0, nsg_id=none input_ifc=outside, output_ifc=any
Phase: 11 Type: FLOW-CREATION Subtype: Result: ALLOW Elapsed time: 46592 ns Config: Additional Information: New flow created with id 200002, packet dispatched to next module Module information for forward flow ... snp_fp_inspect_ip_options snp_fp_tcp_normalizer snp_fp_translate snp_fp_adjacency snp_fp_fragment snp_fp_tracer_drop snp_ifc_stat
Module information for reverse flow ... snp_fp_inspect_ip_options snp_fp_translate snp_fp_tcp_normalizer snp_fp_adjacency snp_fp_fragment snp_fp_tracer_drop snp_ifc_stat
Phase: 12 Type: INPUT-ROUTE-LOOKUP-FROM-OUTPUT-ROUTE-LOOKUP Subtype: Resolve Preferred Egress interface Result: ALLOW Elapsed time: 13824 ns Config: Additional Information: Found next-hop 86.75.30.10 using egress ifc outside
Phase: 13 Type: ADJACENCY-LOOKUP Subtype: Resolve Nexthop IP address to MAC Result: ALLOW Elapsed time: 2560 ns Config: Additional Information: Found adjacency entry for Next-hop 86.75.30.10 on interface outside Adjacency :Active MAC address 0020.dead.beef hits 9000 reference 46
Result: input-interface: inside input-status: up input-line-status: up output-interface: outside output-status: up output-line-status: up Action: allow Time Taken: 221184 ns |