<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT-Control on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689382#M1035422</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I honestly opene a case with Cisco to get this clarified. I couldn't wait for so long to get a feedback through the forum. However, since you have tackled the problem I will do a simple rate for otherwise I would have rated it as 5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Dec 2006 20:32:35 GMT</pubDate>
    <dc:creator>m-haddad</dc:creator>
    <dc:date>2006-12-08T20:32:35Z</dc:date>
    <item>
      <title>NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689372#M1035412</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I have an ASA with three interfaces Inside, outside and DMZ. &lt;/P&gt;&lt;P&gt;Outside security Level 0 IP: 62.x.x.x&lt;/P&gt;&lt;P&gt;Inside Security Level 100 IP: 10.200.0.1&lt;/P&gt;&lt;P&gt;DMZ security Level 90 IP: 192.168.2.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I have three ACLS one on each interface. I want the inside hosts to communicate with the DMZ hosts without Static NAT or Global NAT. I disabled NAT-Control on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  The problem is that the Inside was not able to communicate with the DMZ until I added the below static:&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.200.0.0 10.200.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that the Inside was able to COmmunicate to the DMZ and vice versa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The weird problem is that ICMP was always dropped from inside to DMZ or DMZ to inside with the error: no translation group found for icmp srcinside:x.x.x.x and dstDMZ:x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I added a nother static NAT from DMZ to Inside&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.2.0 192.168.2.0 netmaks 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it worked!!!! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anybody can explain the above behavior and let me understand what did improvement disabling the nat control gave me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:58:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689372#M1035412</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2019-03-11T08:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689373#M1035413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The nat-control command on the PIX specifies that all traffic through the firewall must have a specific translation entry (nat statement with a matching global, or a static statement) for that traffic to pass through the firewall. The nat-control command ensures that the translation behavior is the same as PIX Firewall versions earlier than 7.0. The default configuration of PIX 7.0 is the specification of the no nat-control command. With PIX Firewall version 7.0, you can change this behavior when you issue the nat-control  command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With nat-control disabled, the PIX forwards packets from a higher-security interface to a lower one without a specific translation entry in the configuration. In order to pass traffic from a lower security interface to a higher one, use access-lists to permit the traffic. The PIX then forwards the traffic. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2006 20:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689373#M1035413</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2006-11-20T20:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689374#M1035414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But that's exactlly what has been done. He disabled nat control (it is the default but maybe it was enabled). then the inside hosts could not get to the dmz hosts UNTIL he used the static indentity nat command while it should work without nat (as nat control was disabled).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone else actually ever tried configuring PIX without NAT (7.0 and higer of course)? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 20 Nov 2006 21:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689374#M1035414</guid>
      <dc:creator>rkazmierczak</dc:creator>
      <dc:date>2006-11-20T21:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689375#M1035415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you said I disabled the nat-control. However, the nat-control did nothing for me. I had to do the Identity NAT entries from higher to lower security level and vice versa. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wish to know if anybody has tried this scenario before,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Nov 2006 05:46:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689375#M1035415</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-11-21T05:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689376#M1035416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have this working between 3 interfaces with only access-lists configured using no nat-control.&lt;/P&gt;&lt;P&gt;Code is 7.1(2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also have the same scenario with 7.2.(1)19 code.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure there are no nat statements configured at all?&lt;/P&gt;&lt;P&gt;With no nat-control - although nat is not required, if you have a statement which a particular host matches eg when going from inside to outside, then nat has to be configured also when that host goes to the dmz.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Dec 2006 05:47:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689376#M1035416</guid>
      <dc:creator>m.reay</dc:creator>
      <dc:date>2006-12-06T05:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689377#M1035417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;refering to the URL below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080450b7c.html" target="_blank"&gt;http://cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a0080450b7c.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it says with no nat-control, NAT statements are not required.... I have actually heard this DOES WORK withouth the nat statements.. only the ACLs are required.. but it is always good to have identity nat configured, since u will have more control over the traffic flowing between interfaces.. otherwise, the pix firewall will just be like a router, forwarding traffic between two segments, without any restriction.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2006 02:29:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689377#M1035417</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2006-12-07T02:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689378#M1035418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would do 2 things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you have disabled nat control properly with a 'no nat-control', take out the statics, and do a 'clear xlate' to make sure that the translations are gone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do a 'show run nat-control' and make sure that 'no nat-control' shows up.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other possibility is that you have a nat/global pair between those 2 interfaces that is making you require the use of statics.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2006 02:43:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689378#M1035418</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-12-07T02:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689379#M1035419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  I totally agree with Raj  ..  if you want the inside host to  comunicate with the DMZ and at the same time take advantage of the security provided by the ASA then you have 2 options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.-  either use a static identity NAT&lt;/P&gt;&lt;P&gt;2.-  Use nat (interface-name) 0 access-list &lt;ACCESS-LIST&gt; .. defining the interesting traffic that is NOT to be NATed with an access-list &lt;/ACCESS-LIST&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2006 10:54:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689379#M1035419</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-12-07T10:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689380#M1035420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I appreciate all your feedbacks. However, I opened a case with Cisco about this issue because even with Identity NAT I was having other problems. Jason had the right answer. &lt;/P&gt;&lt;P&gt;1- If you disable nat-control and you any nat/global pair you will need the identity NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- If you have identity NAT with ALIAS commands this can also cause a problem because traffic from DMZ back to inside won't work because of the alias command. The solution to this problem is DNS Doctoring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Dec 2006 17:26:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689380#M1035420</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-12-07T17:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689381#M1035421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to help.   Pix nat is not a simple concept - I wish they would change it.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't forget to rate my previous message if it actually helped.  &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 01:53:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689381#M1035421</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-12-08T01:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT-Control on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689382#M1035422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  I honestly opene a case with Cisco to get this clarified. I couldn't wait for so long to get a feedback through the forum. However, since you have tackled the problem I will do a simple rate for otherwise I would have rated it as 5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Dec 2006 20:32:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-on-asa/m-p/689382#M1035422</guid>
      <dc:creator>m-haddad</dc:creator>
      <dc:date>2006-12-08T20:32:35Z</dc:date>
    </item>
  </channel>
</rss>

