<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688623#M1024290</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So why is it when I pull the static for the entire subnet they come out nat'd to something else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Mar 2007 17:30:54 GMT</pubDate>
    <dc:creator>brandon.hodge</dc:creator>
    <dc:date>2007-03-02T17:30:54Z</dc:date>
    <item>
      <title>NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688621#M1024288</link>
      <description>&lt;P&gt;I'm having an issue working with a PIX 7.0 that has lots of history. There is a ton of entries like below:&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to make one ip address on that subnet come out as the firewall external IP. I have the global (outside) 1 interface set up with the nat (inside) 1 192.168.1.5. This doesn't work unless I pull out the static entry for the entire subnet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The main problem I'm having is for some reasos when I pull out the static that has the subnet. Without the static entry the subnet comes out with an address other than itself. What does the PIX do for an address that doesn't have a static or global entry set up?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688621#M1024288</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2019-03-11T09:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688622#M1024289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your problem is with nat order of operations. The static for the 192 subnet takes precedence over your regular nat for 192.168.1.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. nat exemption&lt;/P&gt;&lt;P&gt;2. static nat&lt;/P&gt;&lt;P&gt;3. static pat&lt;/P&gt;&lt;P&gt;4. policy nat&lt;/P&gt;&lt;P&gt;5. regular nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:28:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688622#M1024289</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T17:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688623#M1024290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So why is it when I pull the static for the entire subnet they come out nat'd to something else?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688623#M1024290</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2007-03-02T17:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688624#M1024291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the address? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is NATing somewhere, if it's not in the static, it could be 3-5 mentioned above. Find the address in your config and you will know where.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688624#M1024291</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T17:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688625#M1024292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess a better question would be: why would you put in a static entry for an address to NAT the address it already has? Shouldn't it already do this without that entry?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688625#M1024292</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2007-03-02T17:40:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688626#M1024293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not sure I follow anymore&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:46:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688626#M1024293</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T17:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688627#M1024294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of an entry like that? Shouldn't anything on the 192.168.1.0 come out with it's real address even without that entry?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688627#M1024294</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2007-03-02T17:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688628#M1024295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;not if you have nat-control enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat-control command on the PIX specifies that all traffic through the firewall must have a specific translation entry (nat statement with a matching global, or a static statement) for that traffic to pass through the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688628#M1024295</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T17:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688629#M1024296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;none in the running config&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 17:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688629#M1024296</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2007-03-02T17:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688630#M1024297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would also need to be there if you had something like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.x.x&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and you did not want 192.168.1.0 to be PAT'ed to x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense, I don't know enough about your environment to know whether it is needed or not.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 18:06:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688630#M1024297</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T18:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688631#M1024298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's actually what the problem was I just found it 10 minutes ago. You've been a great help acomiskey thanks a ton &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 18:16:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688631#M1024298</guid>
      <dc:creator>brandon.hodge</dc:creator>
      <dc:date>2007-03-02T18:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688632#M1024299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no prob, please rate if it helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2007 18:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688632#M1024299</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-03-02T18:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688633#M1024300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hi guys,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I reopen this thread as it's close to my scenario.&lt;/P&gt;&lt;P&gt;I got a 7.2 IOS version ASA that has nat-control &lt;STRONG&gt;enabled &lt;/STRONG&gt;and I have this config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (intranet,outside) 192.168.0.5 192.168.0.5 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the rest of the config, that might be important:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interface Ethernet0/2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; nameif intranet&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; security-level 100&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; ip address 192.168.0.1 255.255.254.0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (intranet) 0 access-list no_nat_intranet&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (intranet) 1 access-list nat_users&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;global (dmz) 1 80.B.C.D&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list nat_users line 1 extended permit ip 192.168.0.0 255.255.255.128 any&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here I got the pin:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list no_nat_intranet line 1 extended permit ip 192.168.0.0 255.255.254.0 192.168.10.0 255.255.255.0&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list no_nat_intranet line 2 extended permit ip host 192.168.0.183 any&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list no_nat_intranet line 3 extended permit ip host 192.168.0.5 any&amp;nbsp; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does this statement "states"? Can anyone kindly detail it?&lt;/P&gt;&lt;P&gt;And why is it necessary to exempt it again in NAT_Exempt statement?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 14:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688633#M1024300</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2013-03-20T14:52:22Z</dc:date>
    </item>
    <item>
      <title>NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688634#M1024301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well it seems you have 2 configurations for the host 192.168.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "static" configuration line is a Identity NAT that basically states that the address isnt translated when its accessing networks behind "outside" interface which doesnt make much sense since its private IP address. (Unless you have some other device doing NAT infront of the firewall)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "nat (intranet) 0" and one of its ACLs line basically states that when the host 192.168.0.5 tries to connect to "any" host on any interface, it shouldnt be NATed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "static" line only applies between "intranet" and "outside" WHILE the "nat (intranet) 0" applies between "intranet" and "any"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I would have to guess that the NAT0 rules reason for being there is to prevent NAT from being done to this host 192.168.0.5 no matter where it connects through this firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 15:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688634#M1024301</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-20T15:06:01Z</dc:date>
    </item>
    <item>
      <title>NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688635#M1024302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks mate!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically this means, I can remove the static NAT statement, as it is covered by the nat 0 ACL.&lt;/P&gt;&lt;P&gt;Next, if I disable &lt;EM&gt;nat-control&lt;/EM&gt; on the running config, firewall being used in production do you think it can cause any traffic disruption?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I read, it wouldn't make sense. Trouble might arise when enabling it (nat-control) if config lacks of some inside-to-outside nat statements. Am I right on this judgement?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 15:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688635#M1024302</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2013-03-20T15:35:06Z</dc:date>
    </item>
    <item>
      <title>NAT help</title>
      <link>https://community.cisco.com/t5/network-security/nat-help/m-p/688636#M1024303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would seem correct to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though personally I have never really had the need to change the &lt;STRONG&gt;"nat-control"&lt;/STRONG&gt; setting. Though usually when I am doing some change that I have uncertainty I lab it or do the change during hours where any possible problem wouldnt cause much issues for users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to a Cisco document about &lt;STRONG&gt;"nat-control"&lt;/STRONG&gt; setting&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html#wp1082396"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html#wp1082396&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Mar 2013 16:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help/m-p/688636#M1024303</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-20T16:59:31Z</dc:date>
    </item>
  </channel>
</rss>

