<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat Issue?? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300342#M1064738</link>
    <description>&lt;P&gt;In old versions you have to create an exempt nat rule (also called nat 0) to allow communication between interfaces.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Dec 2017 19:05:46 GMT</pubDate>
    <dc:creator>andre.ortega</dc:creator>
    <dc:date>2017-12-21T19:05:46Z</dc:date>
    <item>
      <title>Nat Issue??</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300084#M1064736</link>
      <description>&lt;P&gt;IN-ASA5510-01-03001# packet-tracer input DMZ tcp 10.100.22.100 4562 192.168.106.110 443 detail&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab888a18, priority=1, domain=permit, deny=false&lt;BR /&gt; hits=2127, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt; dst mac=0000.0000.0000, mask=0000.0000.0000&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 192.168.106.0 255.255.255.0 DMZ&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_access_in in interface DMZ&lt;BR /&gt;access-list DMZ_access_in extended permit tcp any host 192.168.106.110 eq https &lt;BR /&gt;access-list DMZ_access_in remark Rules for DMZ Server to access Internal and External resources&lt;BR /&gt;access-list DMZ_access_in remark 192.168.106.51 - Test&lt;BR /&gt;access-list DMZ_access_in remark 192.168.106.19 - TMG&lt;BR /&gt;access-list DMZ_access_in remark 192.168.106.110 - Kemp&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xb2bb7228, priority=12, domain=permit, deny=false&lt;BR /&gt; hits=3, user_data=0xa89d5f40, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=192.168.106.110, mask=255.255.255.255, port=443, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab88b690, priority=0, domain=permit-ip-option, deny=true&lt;BR /&gt; hits=21390, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: &lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xae062e08, priority=17, domain=flow-export, deny=false&lt;BR /&gt; hits=918, user_data=0xade42538, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT-EXEMPT&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat-control&lt;BR /&gt; match ip DMZ 10.0.0.0 255.0.0.0 DMZ any&lt;BR /&gt; NAT exempt&lt;BR /&gt; translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xabc03ed0, priority=6, domain=nat-exempt, deny=false&lt;BR /&gt; hits=0, user_data=0xabc03e10, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt; src ip=10.0.0.0, mask=255.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;nat-control&lt;BR /&gt; match ip DMZ any OUTSIDE any&lt;BR /&gt; no translation group, implicit deny&lt;BR /&gt; policy_hits = 1&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in id=0xab9cbe70, priority=0, domain=host, deny=false&lt;BR /&gt; hits=42128, user_data=0xab9cba58, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt; dst ip=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Phase: 9&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Subtype: rpf-check&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.106.0 255.255.255.0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat-control&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; match ip DMZ 192.168.106.0 255.255.255.0 DMZ any&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; dynamic translation to pool 1 (No matching global)&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; translate_hits = 0, untranslate_hits = 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; Forward Flow based lookup yields rule:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; out id=0xabc068a0, priority=1, domain=nat-reverse, deny=false&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; hits=5, user_data=0xabc06630, cs_id=0x0, flags=0x0, protocol=0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; src ip=0.0.0.0, mask=0.0.0.0, port=0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; dst ip=192.168.106.0, mask=255.255.255.0, port=0, dscp=0x0&lt;/STRONG&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;STRONG&gt;Result:&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-interface: DMZ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;input-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-interface: DMZ&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;output-line-status: up&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;IN-ASA5510-01-03001#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a server (192.168.106.110)&amp;nbsp; in the DMZ marked with security level 50. I am trying to get to it from a host on the 10.100.22.0/24 network which will come in via the inside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a NAT for 192.168.106.110 to a public. I can access the public IP from the internal network but cannot access the private IP internal.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Packet tracer shows me the output above, but I dont get where its getting hung up on..&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300084#M1064736</guid>
      <dc:creator>Steven Williams</dc:creator>
      <dc:date>2020-02-21T15:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Nat Issue??</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300338#M1064737</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The message is about reverse path. Looks like the packet in getting in through DMZ interface any leaving through another interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (DMZ) 0 0.0.0.0 0.0.0.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nat-control&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;match ip DMZ any OUTSIDE any&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;no translation group, implicit deny&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;policy_hits = 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Probably this is causing it.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-If I helped you somehow, please, rate it as useful.-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 19:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300338#M1064737</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2017-12-21T19:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Nat Issue??</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300342#M1064738</link>
      <description>&lt;P&gt;In old versions you have to create an exempt nat rule (also called nat 0) to allow communication between interfaces.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 19:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue/m-p/3300342#M1064738</guid>
      <dc:creator>andre.ortega</dc:creator>
      <dc:date>2017-12-21T19:05:46Z</dc:date>
    </item>
  </channel>
</rss>

