<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic NAT issues ASA 8.2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184894#M1066114</link>
    <description>Here it shows that nat is working. Your traffic is natted on ip 10.8.60.4 that should correspond to your outside interface. &lt;BR /&gt;&lt;BR /&gt;What's behind asa? Because this is a private ip and not a public IP. &lt;BR /&gt;Did you checked on that device what's going on? &lt;BR /&gt;</description>
    <pubDate>Fri, 15 Sep 2017 21:48:55 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2017-09-15T21:48:55Z</dc:date>
    <item>
      <title>Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184400#M1066109</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's been a few days that I'm trying to figure this out and I didn't find why my NAT is not working. ( ICMP Packets dropped by NAT rule, no internet connection even though the firewall is WIDE OPEN).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I try to get a dynamic NAT with the outside Vlan being on eth0/0 assigned by DHCP on an other vlan network&lt;/P&gt;&lt;P&gt;my inside Vlan is&amp;nbsp; 10.200.0.0/16, any eth &amp;gt; eth0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm fairly new in configuring NAT so I might have forgot something obvious.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;ASA Version 8.2(5)&lt;BR /&gt;!&lt;BR /&gt;hostname Firewall1&lt;BR /&gt;enable password n8g4OAMVUv3ysq.k encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;name 10.200.0.0 inside&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.200.2.2 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address dhcp setroute&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt;&amp;nbsp;protocol-object udp&lt;BR /&gt;&amp;nbsp;protocol-object tcp&lt;BR /&gt;access-list insideVlan_access_in extended permit ip any any&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list aclIn extended permit ip any any&lt;BR /&gt;access-list insideVlan_access_out extended permit ip any any&lt;BR /&gt;access-list outside_access_out extended permit ip any any&lt;BR /&gt;access-list inside_nat_outbound extended permit ip inside 255.255.0.0 any&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;ipv6 access-list insideVlan_access_ipv6_in permit ip any any&lt;BR /&gt;ipv6 access-list outside_access_ipv6_in permit ip any any&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 access-list inside_nat_outbound&lt;BR /&gt;nat (inside) 1 inside 255.255.0.0&lt;BR /&gt;access-group insideVlan_access_in in interface inside&lt;BR /&gt;access-group insideVlan_access_out out interface inside&lt;BR /&gt;access-group insideVlan_access_ipv6_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-group outside_access_ipv6_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184400#M1066109</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2020-02-21T14:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184438#M1066110</link>
      <description>Hi&lt;BR /&gt;&lt;BR /&gt;If you want to nat your inside network to outside for getting internet access, you'll need to change your nat config like:&lt;BR /&gt;&lt;BR /&gt;no nat (inside) 1 inside 255.255.0.0&lt;BR /&gt;no nat (inside) 1 access-list inside_nat_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Sep 2017 00:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184438#M1066110</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-15T00:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184644#M1066111</link>
      <description>&lt;P&gt;Hi, thank you for your answer.&lt;/P&gt;&lt;P&gt;Unfortunately these change don't solve the issue, I still have the packets dropped by the nat rule when I try an ICMP packet in the ASDM interface. And I still have no internet connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't really understand why I should use an 'any' source in my NAT rule as I know that any source will be on my subnet 10.200.0.0/16&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 12:28:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184644#M1066111</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2017-09-15T12:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184691#M1066112</link>
      <description>You don't need to use any.&lt;BR /&gt;you can also use: nat (inside) 1 10.200.0.0 255.255.0.0&lt;BR /&gt;&lt;BR /&gt;Can you run the packet-tracer command below and paste the output in a text file:&lt;BR /&gt;packet-tracer input inside icmp 10.200.10.1 8 0 8.8.8.8&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Sep 2017 13:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184691#M1066112</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-15T13:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184872#M1066113</link>
      <description>Here is the output:&lt;BR /&gt;&lt;BR /&gt;Firewall1# packet-tracer input inside icmp 10.200.10.1 8 0 8.8.8.8&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in 0.0.0.0 0.0.0.0 outside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group insideVlan_access_in in interface inside&lt;BR /&gt;access-list insideVlan_access_in extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 inside 255.255.0.0&lt;BR /&gt;match ip inside inside 255.255.0.0 outside any&lt;BR /&gt;dynamic translation to pool 1 (10.8.60.4 [Interface PAT])&lt;BR /&gt;translate_hits = 1, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 10.200.10.1/0 to 10.8.60.4/61870 using netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside) 1 inside 255.255.0.0&lt;BR /&gt;match ip inside inside 255.255.0.0 inside any&lt;BR /&gt;dynamic translation to pool 1 (No matching global)&lt;BR /&gt;translate_hits = 0, untranslate_hits = 0&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_out out interface outside&lt;BR /&gt;access-list outside_access_out extended permit ip any any&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 447, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Sep 2017 20:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184872#M1066113</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2017-09-15T20:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184894#M1066114</link>
      <description>Here it shows that nat is working. Your traffic is natted on ip 10.8.60.4 that should correspond to your outside interface. &lt;BR /&gt;&lt;BR /&gt;What's behind asa? Because this is a private ip and not a public IP. &lt;BR /&gt;Did you checked on that device what's going on? &lt;BR /&gt;</description>
      <pubDate>Fri, 15 Sep 2017 21:48:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184894#M1066114</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-15T21:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184900#M1066115</link>
      <description>&lt;P&gt;Unfortunately I don't know. I'm not in charge of this network. But I have been told that it is all set up and ready for connecting my network through NAT with the asa. I only know that the gateway is 10.8.60.1 , and that I get an ip by dhcp&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2017 22:56:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184900#M1066115</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2017-09-15T22:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184907#M1066116</link>
      <description>Ok try to ping the gateway with an internal host. &lt;BR /&gt;If that works, this is not an asa issue.&lt;BR /&gt;</description>
      <pubDate>Fri, 15 Sep 2017 23:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3184907#M1066116</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-15T23:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3185009#M1066117</link>
      <description>&lt;P&gt;General failure when I tried to ping the gateway.&lt;/P&gt;&lt;P&gt;Pinging a machine inside my network works though&lt;/P&gt;</description>
      <pubDate>Sat, 16 Sep 2017 13:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3185009#M1066117</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2017-09-16T13:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3185058#M1066118</link>
      <description>can you share a show route output from asa?&lt;BR /&gt;&lt;BR /&gt;Can you ping your outside gateway from asa doing ping outside command?&lt;BR /&gt;</description>
      <pubDate>Sat, 16 Sep 2017 19:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3185058#M1066118</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2017-09-16T19:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT issues ASA 8.2</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3186279#M1066119</link>
      <description>&lt;P&gt;&lt;BR /&gt;Firewall1# show route&lt;BR /&gt;&lt;BR /&gt;Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; * - candidate default, U - per-user static route, o - ODR&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; P - periodic downloaded static route&lt;BR /&gt;&lt;BR /&gt;Gateway of last resort is 10.8.60.1 to network 0.0.0.0&lt;BR /&gt;&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.8.60.0 255.255.254.0 is directly connected, outside&lt;BR /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.200.2.0 255.255.255.0 is directly connected, inside&lt;BR /&gt;d*&amp;nbsp;&amp;nbsp; 0.0.0.0 0.0.0.0 [1/0] via 10.8.60.1, outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and the ping&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall1# ping 10.8.60.1&lt;BR /&gt;Type escape sequence to abort.&lt;BR /&gt;Sending 5, 100-byte ICMP Echos to 10.8.60.1, timeout is 2 seconds:&lt;BR /&gt;!!!!!&lt;BR /&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/10 ms&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 19:52:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-issues-asa-8-2/m-p/3186279#M1066119</guid>
      <dc:creator>Iridescence</dc:creator>
      <dc:date>2017-09-19T19:52:12Z</dc:date>
    </item>
  </channel>
</rss>

