Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

PIXOS 8.0.2 and NAT.

Hi all,

I need to help with interesting issue we have.

We have created NAT from one interface of PIX to other with access-list permiting something interesting for NAT and everything works but UDP traffic from specific pool and from Cisco VPN client no. We dont see traffic on the other side of firewall. But when we ping to the same destination (from the same pool) like for VPN traffic, traffic flows perfectly and we see xlate in PIX. Only for UDP traffic and from specific pool ( Cisco VPN, PIX doesnt create NAT xlate.

nat (_inside_) 12 access-list NAT_to_VPN

global (outside) 12 x.x.x.x netmask

access-list NAT_to_VPN extended permit ip is included in pool

Any idea



Re: PIXOS 8.0.2 and NAT.

All sessions that connect through the security appliance must undergo some form of network address translation, or NAT. Each NAT or NAT Overload (PAT) session is assigned a translation slot known as an xlate. These xlates can persist even after you make changes to the NAT rules that affect them. This can lead to a depletion of translation slots or unexpected behavior or both by traffic that undergoes translation.

Always clear xlates after you add, change, or remove the aaa-server, access-list, alias, global, nat, route, or static commands in your configuration.

New Member

Re: PIXOS 8.0.2 and NAT.

Problem is only with pool of addresses from namely and UDP. I cleared xlates every time I did changes in PIX related to NAT, routes and so on but without results.

Any idea?