<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting  warning IP nat pool too small in Routing and SD-WAN</title>
    <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837798#M383594</link>
    <description>&lt;P&gt;sorry&amp;nbsp; dont get what you want here,&amp;nbsp;&lt;BR /&gt;there are three VLAN and you need static NAT for these VLAN subnet ?&lt;BR /&gt;can you more elaborate ?&lt;/P&gt;</description>
    <pubDate>Wed, 17 May 2023 17:02:39 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-05-17T17:02:39Z</dc:date>
    <item>
      <title>Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4835859#M383496</link>
      <description>&lt;P&gt;I want to NAT single inside IP to multiple outbound IP's based up on the destination subnet. For example :&lt;/P&gt;
&lt;PRE&gt;My appserver should be natted to 10.10.1.10 for packets tx/rx toward customer1&lt;BR /&gt;My appserver should be natted to 10.10.2.10 for packets tx/rx toward customer2&lt;BR /&gt;My appserver should be natted to 10.10.3.10 for packets tx/rx toward customer3.&lt;/PRE&gt;
&lt;P&gt;I have a router Cisco1921 with Gi0/1 configured with&lt;/P&gt;
&lt;PRE&gt; ip 192.168.1.1&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;I have an app server with IP address 192.168.1.10 and gateway 192.168.1.1&lt;BR /&gt;I have three customers connected to us using three private point to point circuits.&lt;BR /&gt;All the three circuits are connected to my layer 2 Ethernet switch C2960.&lt;BR /&gt;On Ethernet switch customer1 is in VLAN 10, customer 2 is in VLAN 20 and customer3 is on VLAN 30.&lt;BR /&gt;Cisco router 1921 Gi0/0 has three sub interfaces, one for each customer.I was thinking that I wll create three&lt;/P&gt;
&lt;PRE&gt;ACL&lt;/PRE&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;PRE&gt;NAT POOL&lt;/PRE&gt;
&lt;P&gt;for each customer and use the&lt;/P&gt;
&lt;PRE&gt;ACL&lt;/PRE&gt;
&lt;P&gt;to assign the&lt;BR /&gt;seperate pool for each customer. I hit a road block,&lt;/P&gt;
&lt;PRE&gt;ip NAT pool&lt;/PRE&gt;
&lt;P&gt;gives me a warning when I try to create a pool with single ip it is asking for atleast netmask .252 and giving the following warning&lt;/P&gt;
&lt;PRE&gt;Pool NAT-POOL-CUST3 mask 255.255.255.255 too small; should be at least 255.255.255.252&lt;/PRE&gt;
&lt;P&gt;How can I NAT my single inside IP to multiple outbound IP's based upon the destination subnet?&lt;/P&gt;
&lt;PRE&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;description LOCAL INTERFACE&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;ip nat inside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;description CUSTOMER1&lt;BR /&gt;encapsulation dot1Q 10&lt;BR /&gt;ip address 172.16.10.1 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.20&lt;BR /&gt;description CUSTOMER2&lt;BR /&gt;encapsulation dot1Q 20&lt;BR /&gt;ip address 172.16.20.1 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.30&lt;BR /&gt;description CUSTOMER3&lt;BR /&gt;encapsulation dot1Q 30&lt;BR /&gt;ip address 172.16.30.1 255.255.255.252&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;ip route 172.16.101.0 255.255.255.0 172.16.10.2&lt;BR /&gt;ip route 172.16.102.0 255.255.255.0 172.16.20.2&lt;BR /&gt;ip route 172.16.103.0 255.255.255.0 172.16.30.2&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;ip access-list extended ACL-NAT-CUST1&lt;BR /&gt;permit ip host 192.168.1.10 172.16.101.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-NAT-CUST2&lt;BR /&gt;permit ip host 192.168.1.10 172.16.102.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-NAT-CUST3&lt;BR /&gt;permit ip host 192.168.1.10 172.16.103.0 0.0.0.255&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;ip nat pool NAT-POOL-CUST1 10.10.1.10 10.10.1.10 netmask 255.255.255.255&lt;BR /&gt;ip nat pool NAT-POOL-CUST2 10.10.2.10 10.10.2.10 netmask 255.255.255.255&lt;BR /&gt;ip nat pool NAT-POOL-CUST3 10.10.3.10 10.10.3.10 netmask 255.255.255.255&lt;BR /&gt;##I get the warning got the above three commands##&lt;/PRE&gt;
&lt;PRE&gt;If I get past the warning then I was planning to use the following:&lt;BR /&gt;!&lt;BR /&gt;ip nat outside source list ACL-CUST1 pool NAT-POOL-CUST1 add-route&lt;BR /&gt;ip nat outside source list ACL-CUST2 pool NAT-POOL-CUST2 add-route&lt;BR /&gt;ip nat outside source list ACL-CUST3 pool NAT-POOL-CUST3 add-route&lt;BR /&gt;!&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 05:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4835859#M383496</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T05:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4836134#M383516</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The warning you are receiving is because the subnet mask you specified for the&lt;/P&gt;
&lt;PRE&gt;NAT pool&lt;/PRE&gt;
&lt;P&gt;is too small. In order to&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;your single inside IP to multiple outbound IPs based on the destination subnet, you need to make a few adjustments to your configuration. First, you need to modify the subnet masks of your subinterfaces on the router to accommodate larger subnets. Change the subnet masks from /30 to /29 or larger. For example:&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;description CUSTOMER1&lt;BR /&gt;encapsulation dot1Q 10&lt;BR /&gt;ip address 172.16.10.1 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.20&lt;BR /&gt;description CUSTOMER2&lt;BR /&gt;encapsulation dot1Q 20&lt;BR /&gt;ip address 172.16.20.1 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.30&lt;BR /&gt;description CUSTOMER3&lt;BR /&gt;encapsulation dot1Q 30&lt;BR /&gt;ip address 172.16.30.1 255.255.255.248&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;U&gt;&amp;nbsp;&lt;/U&gt;&lt;/PRE&gt;
&lt;P&gt;Next, modify your ACLs to match the correct destination subnets for each customer:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL-NAT-CUST1&lt;BR /&gt;permit ip host 192.168.1.10 172.16.10.0 0.0.0.7&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-NAT-CUST2&lt;BR /&gt;permit ip host 192.168.1.10 172.16.20.0 0.0.0.7&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended ACL-NAT-CUST3&lt;BR /&gt;permit ip host 192.168.1.10 172.16.30.0 0.0.0.7&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;U&gt; Finally, update your NAT pool configuration to use the correct subnet masks:&lt;/U&gt;&lt;/P&gt;
&lt;PRE&gt;ip nat pool NAT-POOL-CUST1 10.10.1.10 10.10.1.10 netmask 255.255.255.248&lt;BR /&gt;ip nat pool NAT-POOL-CUST2 10.10.2.10 10.10.2.10 netmask 255.255.255.248&lt;BR /&gt;ip nat pool NAT-POOL-CUST3 10.10.3.10 10.10.3.10 netmask 255.255.255.248&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;With these modifications, you should be able to&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;your single inside IP to multiple outbound IPs based on the destination subnets for each customer.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;M.&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4836134#M383516</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-06-08T06:03:00Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4836175#M383519</link>
      <description>&lt;P&gt;The warning you're encountering is due to the fact that you're specifying a single IP address as the&lt;/P&gt;
&lt;PRE&gt;NAT pool&lt;/PRE&gt;
&lt;P&gt;, which requires a&lt;/P&gt;
&lt;PRE&gt;netmask of at least /30 (255.255.255.252)&lt;/PRE&gt;
&lt;P&gt;. However, since you want to map a single inside IP to multiple outbound IPs based on the destination subnet, you need to use a different approach.&lt;/P&gt;
&lt;P&gt;Instead of using traditional&lt;/P&gt;
&lt;PRE&gt;NAT pools&lt;/PRE&gt;
&lt;P&gt;, you can achieve your desired&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;behavior using Policy-Based NAT (PBR) and route-maps. Here's an example configuration that should work for your scenario:&lt;/P&gt;
&lt;PRE&gt;ip access-list extended ACL-NAT-CUST1&lt;BR /&gt;permit ip host 192.168.1.10 172.16.101.0 0.0.0.255&lt;BR /&gt;&lt;BR /&gt;ip access-list extended ACL-NAT-CUST2&lt;BR /&gt;permit ip host 192.168.1.10 172.16.102.0 0.0.0.255&lt;BR /&gt;&lt;BR /&gt;ip access-list extended ACL-NAT-CUST3&lt;BR /&gt;permit ip host 192.168.1.10 172.16.103.0 0.0.0.255&lt;BR /&gt;&lt;BR /&gt;route-map RM-NAT-CUST1 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST1&lt;BR /&gt;set ip next-hop 10.10.1.10&lt;BR /&gt;&lt;BR /&gt;route-map RM-NAT-CUST2 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST2&lt;BR /&gt;set ip next-hop 10.10.2.10&lt;BR /&gt;&lt;BR /&gt;route-map RM-NAT-CUST3 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST3&lt;BR /&gt;set ip next-hop 10.10.3.10&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0.10&lt;BR /&gt;ip policy route-map RM-NAT-CUST1&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0.20&lt;BR /&gt;ip policy route-map RM-NAT-CUST2&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/0.30&lt;BR /&gt;ip policy route-map RM-NAT-CUST3&lt;/PRE&gt;
&lt;P&gt;In this configuration, we're using PBR to match the source traffic based on the corresponding access list for each customer. Then, we set the next-hop IP address to the appropriate outbound IP for&lt;/P&gt;
&lt;PRE&gt;NAT.&lt;/PRE&gt;
&lt;P&gt;Make sure to remove the previous&lt;/P&gt;
&lt;PRE&gt;NAT pool&lt;/PRE&gt;
&lt;P&gt;configurations and the&lt;/P&gt;
&lt;PRE&gt;ip nat outside source&lt;/PRE&gt;
&lt;P&gt;commands you mentioned earlier.&lt;/P&gt;
&lt;P&gt;Note that this configuration assumes that the outbound IP addresses (10.10.1.10, 10.10.2.10, 10.10.3.10) are already configured on the router and reachable. Also, ensure that the necessary routing is in place for the next-hop addresses.&lt;/P&gt;
&lt;P&gt;Remember to test the configuration thoroughly to ensure it meets your requirements and functions as expected in your specific network environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4836175#M383519</guid>
      <dc:creator>KhanAkhtar</dc:creator>
      <dc:date>2023-06-08T06:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837060#M383540</link>
      <description>&lt;P&gt;Hi Mr. Khan,&lt;/P&gt;&lt;P&gt;Appreciare your response. Your answer does not fit my requirements but it is good to know about this possibility in case If I need this in future.&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2023 20:31:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837060#M383540</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-05-16T20:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837069#M383542</link>
      <description>&lt;P&gt;Hi Mark, thanks fir your time and assistance.&lt;BR /&gt;&lt;BR /&gt;I can not change the&lt;/P&gt;
&lt;PRE&gt;netmask&lt;/PRE&gt;
&lt;P&gt;for the WAN interfaces because it also requires the change to be made at far end.&lt;BR /&gt;I only need one IP address in the pool per customer. What is the significance&lt;/P&gt;
&lt;PRE&gt;netmask&lt;/PRE&gt;
&lt;P&gt;in the pool?&lt;/P&gt;
&lt;P&gt;What will be the impact if I change the&lt;/P&gt;
&lt;PRE&gt;netmask&lt;/PRE&gt;
&lt;P&gt;to .252 ? This way the warning goes away and I still have one IP address per pool.&lt;/P&gt;
&lt;PRE&gt;ip nat pool NAT-POOL-CUST1 10.10.1.10 10.10.1.10 netmask 255.255.255.252&lt;BR /&gt;ip nat pool NAT-POOL-CUST2 10.10.2.10 10.10.2.10 netmask 255.255.255.252&lt;BR /&gt;ip nat pool NAT-POOL-CUST3 10.10.3.10 10.10.3.10 netmask 255.255.255.252&lt;/PRE&gt;
&lt;P&gt;Using this solution,&amp;nbsp; can the traffic originate from outside to inside?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837069#M383542</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837737#M383585</link>
      <description>&lt;P&gt;Agreed - that will route the packets but not NAT them.&lt;BR /&gt;To NAT them you use NAT with route-maps.&amp;nbsp; Use static NAT with route-map - each static NAT will then only match the desired traffic and do 1to1 translation on the IP.&lt;BR /&gt;Take a look at this example:&amp;nbsp;&lt;A href="https://www.ciscozine.com/using-route-maps-for-conditional-nat/" target="_blank"&gt;https://www.ciscozine.com/using-route-maps-for-conditional-nat/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;FYI: in your config the ACL names don't match the names of ACLs used with NAT.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 14:59:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837737#M383585</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-05-17T14:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837798#M383594</link>
      <description>&lt;P&gt;sorry&amp;nbsp; dont get what you want here,&amp;nbsp;&lt;BR /&gt;there are three VLAN and you need static NAT for these VLAN subnet ?&lt;BR /&gt;can you more elaborate ?&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 17:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837798#M383594</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-17T17:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837909#M383604</link>
      <description>&lt;P&gt;Rich,&lt;/P&gt;
&lt;P&gt;Appreciate your help, this is exactly what I was looking for. I had done a slightly different implementation. I had used route-maps with loop back interfaces&amp;nbsp; instead of&lt;/P&gt;
&lt;PRE&gt;nat pools:&lt;/PRE&gt;
&lt;PRE&gt;!&lt;BR /&gt;interface Loopback1&lt;BR /&gt;description USED-FOR-NAT-INTERFACE-CUST1&lt;BR /&gt;ip address 10.10.1.10 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;interface Loopback2&lt;BR /&gt;description USED-FOR-NAT-INTERFACE-CUST2&lt;BR /&gt;ip address 10.10.2.10 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;interface Loopback3&lt;BR /&gt;description USED-FOR-NAT-INTERFACE-CUST3&lt;BR /&gt;ip address 10.10.3.10 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;route-map RM-CUST1 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST1&lt;BR /&gt;!&lt;BR /&gt;route-map RM-CUST2 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST2&lt;BR /&gt;!&lt;BR /&gt;route-map RM-CUST3 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST3&lt;BR /&gt;!&lt;BR /&gt;ip nat inside source route-map RM-CUST1 interface Loopback1 overload reversible&lt;BR /&gt;ip nat inside source route-map RM-CUST2 interface Loopback2 overload reversible&lt;BR /&gt;ip nat inside source route-map RM-CUST3 interface Loopback3 overload reversible&lt;BR /&gt;!&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:18:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837909#M383604</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:18:24Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837912#M383605</link>
      <description>&lt;P&gt;MHM,&lt;/P&gt;&lt;P&gt;My requirement was as explained in this article.&lt;A href="https://www.ciscozine.com/using-route-maps-for-conditional-nat/" target="_blank"&gt;https://www.ciscozine.com/using-route-maps-for-conditional-nat/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Appreciate your time.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 20:56:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837912#M383605</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-05-17T20:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837913#M383606</link>
      <description>&lt;P&gt;I Dont get it' if you direct traffic to lo1 then you dont need any route-map'&lt;/P&gt;
&lt;P&gt;This conditional&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;for&lt;/P&gt;
&lt;PRE&gt;multi ISP.&lt;/PRE&gt;
&lt;P&gt;Here I dont see any reason you use it.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:19:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837913#M383606</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-08T06:19:31Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837919#M383607</link>
      <description>&lt;P&gt;friend I know exactly what it conditional&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;NATing&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;&lt;BR /&gt;&lt;SPAN&gt;interface Loopback1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;description USED-FOR-NAT-INTERFACE-CUST1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 10.10.1.10 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;route-map RM-CUST1 permit 10&lt;BR /&gt;match ip address ACL-NAT-CUST1&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;PRE&gt;ip nat&lt;/PRE&gt;
&lt;P&gt;inside source route-map RM-CUST1 interface Loopback1 overload reversible&lt;BR /&gt;&lt;BR /&gt;from OUTside ping to INside using the LO1, here what is idea of using the route-map&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;route-map using to match egress interface for&lt;/P&gt;
&lt;PRE&gt;multi ISP&lt;/PRE&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837919#M383607</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-08T06:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837927#M383609</link>
      <description>&lt;P&gt;MHM,&lt;/P&gt;
&lt;P&gt;I have no doubt on your expertise. In fact, I have a great respect for you because I have benefited from your responses to various posts.&lt;BR /&gt;This article explains the different between access-list vs route-map and decided to use route-map based on this article. Even though it was written for ISO 12.x and we are on 15.x and I assume it still applies.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13739-nat-routemap.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/13739-nat-routemap.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Three customer sites privately connected to us and wants to use the services hosted on the same server. Because of various reasons (security, overlapping subnets etc...) each customer want us to use customer provided IP address on our server. Instead of configuring multiple IP's on our server, we decided to do the policy&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;as you referred as&lt;/P&gt;
&lt;PRE&gt;conditional NAT&lt;/PRE&gt;
&lt;P&gt;.&lt;BR /&gt;&lt;BR /&gt;While I have your attention, I would appreciate your help with following:&lt;BR /&gt;What would you recommend, using the loopback interface as I explained above or using the static&lt;/P&gt;
&lt;PRE&gt;natting&lt;/PRE&gt;
&lt;P&gt;as explained in ciscozone above article.&lt;BR /&gt;Natting should be work in both directions, server can also initiate a request going towards customers and customer can also initiate request coming in into server.&lt;BR /&gt;How many&lt;/P&gt;
&lt;PRE&gt;natting&lt;/PRE&gt;
&lt;P&gt;translations can be supported by this method?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:31:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837927#M383609</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:31:32Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837985#M383616</link>
      <description>&lt;P&gt;Whichever way works best for you - if they both work then it's a matter of preference.&amp;nbsp; Some of the&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;features (like DNS ALG) can behave differently depending on how it's configured but if you're not relying on any of those then probably doesn't matter.&lt;/P&gt;
&lt;P&gt;How many translations?&amp;nbsp; That will depend on platform, IOS version and memory.&amp;nbsp; If it's a hardware based switching platform (like ASR1K for example) then it will depend on TCAM in the FP.&amp;nbsp; Basically check the specs for what you're using and test.&amp;nbsp; Realistically, unless you're planning to have millions of translations you'll probably be ok.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:35:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837985#M383616</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-06-08T06:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837987#M383617</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="network_diagram.PNG" style="width: 983px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184844i8BA3126D26793EBE/image-size/large?v=v2&amp;amp;px=999" role="button" title="network_diagram.PNG" alt="network_diagram.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 00:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4837987#M383617</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-18T00:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839156#M383714</link>
      <description>&lt;P&gt;Guys,&lt;/P&gt;
&lt;P&gt;Appreciate all the help. One more question. I also have to apply the crypto map to the outside interface lets say gi0/0.10.&amp;nbsp; The crypto map ACL should include the pre-&lt;/P&gt;
&lt;PRE&gt;NATsource IP or post-NAT source IP?&lt;/PRE&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:36:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839156#M383714</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839161#M383715</link>
      <description>&lt;P&gt;VPN traffic must not&lt;/P&gt;
&lt;PRE&gt;NATing&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VPN must override&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839161#M383715</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-06-08T06:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839185#M383721</link>
      <description>&lt;P&gt;Could you please elaborate? What are my options if I have to use&lt;/P&gt;
&lt;PRE&gt;NAT&lt;/PRE&gt;
&lt;P&gt;with IPSEC?&lt;BR /&gt;I have done&lt;/P&gt;
&lt;PRE&gt;natting&lt;/PRE&gt;
&lt;P&gt;on vpn traffic various times, my experience is more on&lt;/P&gt;
&lt;PRE&gt;ASA&lt;/PRE&gt;
&lt;P&gt;. This is the first time, I have to deal with this stuff on a router.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839185#M383721</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839187#M383723</link>
      <description>&lt;P&gt;good luck&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 17:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839187#M383723</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-19T17:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839189#M383724</link>
      <description>&lt;P&gt;I think it should work.&amp;nbsp; Depends on inside/outside direction but assuming it's inside -&amp;gt; outside then the crypto map ACL should match the IP after NAT I believe.&amp;nbsp; But as always - test to confirm.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/6209-5.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-nat/6209-5.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;ps. also never had trouble with sending NATed packets up VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 May 2023 17:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839189#M383724</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-05-19T17:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: Getting  warning IP nat pool too small</title>
      <link>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839196#M383727</link>
      <description>&lt;P&gt;Rich,&lt;/P&gt;
&lt;P&gt;Appreciate your response, I had already gone through the article you posted but I could not comprehend it. I changed the access list to post-&lt;/P&gt;
&lt;PRE&gt;NAT IP&lt;/PRE&gt;
&lt;P&gt;in my lab setup and it worked.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jun 2023 06:43:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/routing-and-sd-wan/getting-warning-ip-nat-pool-too-small/m-p/4839196#M383727</guid>
      <dc:creator>S Kumar</dc:creator>
      <dc:date>2023-06-08T06:43:55Z</dc:date>
    </item>
  </channel>
</rss>

