<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 9.8(1) issue with NAT Rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3330544#M1041737</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users complaining are in which subnet?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share please the output of the following command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer in extranet tcp 10.205.64.10 8 0&amp;nbsp;8.8.8.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Feb 2018 02:48:34 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2018-02-14T02:48:34Z</dc:date>
    <item>
      <title>ASA 9.8(1) issue with NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3330155#M1041717</link>
      <description>&lt;P style="font-weight: 400;"&gt;object network GUEST-INTERNET&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;subnet 10.205.64.0 255.255.252.0&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;object network GUEST-INTERNET&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;nat (extranet,outside) dynamic xxx.xx.199.135&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;Auto NAT Policies (Section 2)&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;2 (extranet) to (outside) source dynamic GUEST-INTERNET xxx.xx.199.135&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 3536082, untranslate_hits = 32663&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://10.205.64.0/22" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://10.205.64.0/22&amp;amp;source=gmail&amp;amp;ust=1518620777148000&amp;amp;usg=AFQjCNHjuVOn5emdc6H9BdR2owDSd2vNkg" target="_blank"&gt;10.205.64.0/22&lt;/A&gt;, Translated:&lt;SPAN&gt;&amp;nbsp;xxx&lt;/SPAN&gt;&lt;A href="http://138.69.199.135/32" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://138.69.199.135/32&amp;amp;source=gmail&amp;amp;ust=1518620777148000&amp;amp;usg=AFQjCNGeLxRGP292AR23BQu9WizHGHxk4g" target="_blank"&gt;.xx.199.135/32&lt;/A&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;3 (extranet) to (inside) source dynamic VPN_USER_POOL interface&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 3369448, untranslate_hits = 283060&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://10.254.32.0/22" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://10.254.32.0/22&amp;amp;source=gmail&amp;amp;ust=1518620777148000&amp;amp;usg=AFQjCNGDF5M4ZublUMnfIHWArqEZykf2LQ" target="_blank"&gt;10.254.32.0/22&lt;/A&gt;, Translated:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://10.254.28.113/28" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://10.254.28.113/28&amp;amp;source=gmail&amp;amp;ust=1518620777149000&amp;amp;usg=AFQjCNFS0yUzJBJInsQTSuf0Pe9Fk1v0AQ" target="_blank"&gt;10.254.28.113/28&lt;/A&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;4 (extranet) to (outside) source dynamic EXTRANET_ANY interface&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 33130812, untranslate_hits = 62286&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="http://0.0.0.0/0" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://0.0.0.0/0&amp;amp;source=gmail&amp;amp;ust=1518620777149000&amp;amp;usg=AFQjCNHr50fjhmTAPxUyBZnFmF6agae7UQ" target="_blank"&gt;0.0.0.0/0&lt;/A&gt;, Translated:&lt;SPAN&gt;&amp;nbsp;xxx&lt;/SPAN&gt;&lt;A href="http://138.69.199.140/28" data-saferedirecturl="https://www.google.com/url?hl=en&amp;amp;q=http://138.69.199.140/28&amp;amp;source=gmail&amp;amp;ust=1518620777149000&amp;amp;usg=AFQjCNHtspkG6ES1olE7bCY_leJPjP2Egw" target="_blank"&gt;.xx.199.140/28&lt;/A&gt;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;But users are still reporting to be using the xxx.xx.199.140 address when validating via whatismyip ?&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;There must be a way to Exclude and Include ?&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P style="font-weight: 400;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3330155#M1041717</guid>
      <dc:creator>tlebouef</dc:creator>
      <dc:date>2020-02-21T15:20:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.8(1) issue with NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3330544#M1041737</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users complaining are in which subnet?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share please the output of the following command:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer in extranet tcp 10.205.64.10 8 0&amp;nbsp;8.8.8.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Feb 2018 02:48:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3330544#M1041737</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2018-02-14T02:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.8(1) issue with NAT Rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3334669#M1041749</link>
      <description>&lt;P&gt;The users on the&amp;nbsp;&lt;SPAN&gt;10.205.64.0/24 subnet.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We migrated to another firewall and it worked after we did.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So something was stuck on the firewall from making it work and I didn't have a compelling reason at the time to pull out all the nats and put them all back in.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did do a clear xlate several times while testing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packets were getting to the firewall just not out to the outside world.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2018 22:36:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-8-1-issue-with-nat-rules/m-p/3334669#M1041749</guid>
      <dc:creator>tlebouef</dc:creator>
      <dc:date>2018-02-20T22:36:30Z</dc:date>
    </item>
  </channel>
</rss>

