<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT issue with IPSEC Failover in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303114#M1004762</link>
    <description>&lt;P&gt;While NAT is, in general, processed before routing there is a partial routing step to lookup the destination interface when checking the NAT rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is should be the same on ASAv as on a physical appliance.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Dec 2017 06:38:06 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-12-28T06:38:06Z</dc:date>
    <item>
      <title>NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302841#M1004756</link>
      <description>&lt;P&gt;Hello, how can I get the static nat statements to dynamically shift when an IPsec tunnel is down and let the ASA not use it?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:02:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302841#M1004756</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2020-02-21T15:02:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302864#M1004758</link>
      <description>&lt;P&gt;They won't dynamically shift.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Generally speaking static NAT statements would implement NAT exemption for VPN tunnels. If the tunnel is down (either its primary peer address or a backup) then you should not be able to reach the remote networks. So the fact that the original NAT statement is still applied is moot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you're using it differently, please explain and perhaps we can offer a more precise explanation.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2017 16:27:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302864#M1004758</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-27T16:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302867#M1004759</link>
      <description>&lt;P&gt;so here's the nat statements. The ASA is directly connected to the mpls and internet circuit. When the mpls circuit goes down(tracked by IP SLA and Tracking), the ASA uses its default route to create an ipsec tunnel over the internet circuit but the first nat statement keep getting hit and so the tunnel won't get established.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nat (Inside,Mpls) source static&amp;nbsp;LOCAL LOCAL&amp;nbsp;destination static REMOTE REMOTE&lt;BR /&gt;nat (Inside,Outside) source static &lt;SPAN&gt;LOCAL LOCAL&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;destination static REMOTE REMOTE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Dec 2017 16:37:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3302867#M1004759</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2017-12-27T16:37:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303081#M1004760</link>
      <description>&lt;P&gt;The way you have it should work if your routing and the tracking is all correctly in place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you confirmed that the path to the remote subnets is using the default route? If it is, and when that default flips to the alternate path, routing in the ASA should tell it to use the alternate egress interface and thus the alternate NAT statement would be in effect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I’ve setup several using that logic and they work just fine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 05:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303081#M1004760</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-28T05:10:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303106#M1004761</link>
      <description>&lt;P&gt;Yes routing is getting updated once the tracking is down but for some reason not the NAT. Isn’t NAT processed first before routing on a ASA? On a side note, I am doing thing on ASAv before applying the config to my client’s ASA. Would it behave differently on a virtual appliance? &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 06:27:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303106#M1004761</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2017-12-28T06:27:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303114#M1004762</link>
      <description>&lt;P&gt;While NAT is, in general, processed before routing there is a partial routing step to lookup the destination interface when checking the NAT rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is should be the same on ASAv as on a physical appliance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 06:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303114#M1004762</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-28T06:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303136#M1004765</link>
      <description>&lt;P&gt;try adding the route-lookup keyword to the end of your NAT statements.&amp;nbsp; This will force the NAT statements to follow the routing table and not override the routing table.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 07:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303136#M1004765</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-12-28T07:28:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303195#M1004768</link>
      <description>&lt;P&gt;That's a good suggestion Marius. I agree.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2017 08:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303195#M1004768</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-12-28T08:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue with IPSEC Failover</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303403#M1004770</link>
      <description>Worked like magic!! Thanks Marius.</description>
      <pubDate>Thu, 28 Dec 2017 14:35:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-with-ipsec-failover/m-p/3303403#M1004770</guid>
      <dc:creator>NETAD</dc:creator>
      <dc:date>2017-12-28T14:35:11Z</dc:date>
    </item>
  </channel>
</rss>

