<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 2xOutside NAT using both Outside to same Inside Host in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4171657#M1075039</link>
    <description>&lt;P&gt;I think what happens here is that the return traffic hits the first NAT rule so it goes out of the Outside-1 interface. If you try to flip the order of those NAT rules, it might work. However, it would stop working for the incoming traffic through Outside-1. To fix this, I think you would need a twice NAT rule, or as Marius mentioned through PBR.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 10:21:31 GMT</pubDate>
    <dc:creator>Aref Alsouqi</dc:creator>
    <dc:date>2020-10-22T10:21:31Z</dc:date>
    <item>
      <title>ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170804#M1075001</link>
      <description>&lt;P&gt;Here is what I am trying to do.&lt;/P&gt;&lt;P&gt;Outside-1 1.1.1.1/28&lt;/P&gt;&lt;P&gt;Outside-2 2.2.2.2/30&lt;/P&gt;&lt;P&gt;Additional IP's routed to Outside-2 2.2.20.0/29&lt;/P&gt;&lt;P&gt;Inside 172.16.22.0/24&lt;/P&gt;&lt;P&gt;Host-A 172.16.22.50&lt;/P&gt;&lt;P&gt;nat (inside,Outside-1) dynamic Host-A 1.1.1.5&lt;/P&gt;&lt;P&gt;nat (inside,Outside-2) dynamic HOST-A 2.2.20.5&lt;/P&gt;&lt;P&gt;Default route is via Outside-1&lt;/P&gt;&lt;P&gt;If i telnet to 2.2.20.5 I can see traffic arriving on the Outside-2 interface and is natted to Host-A (172.16.22.50)&lt;/P&gt;&lt;P&gt;I can also see this traffic going through the Inside interface.&lt;/P&gt;&lt;P&gt;BUT the returning traffic is destined for Outside-1 Interface&lt;/P&gt;&lt;P&gt;I think I need a twice nat rule but I can't find an example that suits this scenario.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;How can I achieve this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 07:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170804#M1075001</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-21T07:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170841#M1075005</link>
      <description>&lt;P&gt;Depending on the ASA version you are running, you can configure the two outside interfaces to be in the same traffic zone.&amp;nbsp; This will allow traffic from an existing flow to enter or exit any interface that is within the same flow.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;config terminal&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;zone outside&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;interface Gig0/1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;nameif outside-1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;security-level 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;ip address 1.1.1.1 255.255.240&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;FONT color="#FF0000"&gt;zone-member outside&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;interface Gig0/2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;nameif outside-2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;security-level 0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;ip address 2.2.2.2 255.255.255.252&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;FONT color="#FF0000"&gt;zone-member outside&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;
&lt;P&gt;If you are looking to force the traffic back out outside-2 interface then you would need to either use policy based routing (PBR) or twice nat.&amp;nbsp; I would suggest using PBR.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 08:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170841#M1075005</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-21T08:34:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170858#M1075006</link>
      <description>&lt;P&gt;I have PBR defined on Inside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I telent from HOST-A it is working and going out Outside-2 and telnet successfully establishes session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if I telnet into 2.2.20.5 which is a routed address through Outside-2 return traffic is still using the default route via Outside-1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought an Established connection would route back out the int interface it came in on ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts ?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 08:52:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4170858#M1075006</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-21T08:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4171561#M1075032</link>
      <description>&lt;P&gt;it would seem that you are hitting the default route.&amp;nbsp; How have you configured the PBR? Could you post the configuration?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 07:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4171561#M1075032</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-22T07:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4171657#M1075039</link>
      <description>&lt;P&gt;I think what happens here is that the return traffic hits the first NAT rule so it goes out of the Outside-1 interface. If you try to flip the order of those NAT rules, it might work. However, it would stop working for the incoming traffic through Outside-1. To fix this, I think you would need a twice NAT rule, or as Marius mentioned through PBR.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 10:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4171657#M1075039</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-22T10:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173322#M1075156</link>
      <description>&lt;P&gt;.&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 22:28:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173322#M1075156</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-25T22:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173324#M1075157</link>
      <description>&lt;P&gt;We added a second default route to Outside-2 which resolved the problem.&lt;/P&gt;&lt;P&gt;An established connection on ASA does NOT work the same as on IPTables on Linux.&lt;/P&gt;&lt;P&gt;The sh asp drop indicated no route to host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This has solved the problem&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 22:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173324#M1075157</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-25T22:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173331#M1075159</link>
      <description>&lt;P&gt;As far as I know, the ASA won't allow you to add another default route out of multiple interfaces. You mean a specific route to the destinations that would come through the Outside-2 interface?&lt;/P&gt;</description>
      <pubDate>Sun, 25 Oct 2020 23:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173331#M1075159</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-25T23:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173357#M1075166</link>
      <description>&lt;P&gt;I now have the following routes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;route Outside-1 0.0.0.0 0.0.0.0 1.1.1.2 1&lt;BR /&gt;route Outside-2 0.0.0.0 0.0.0.0 2.2.2.1 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After adding the second route traffic initiating from Outside-2 was processed successfully and the response received.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 02:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173357#M1075166</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-26T02:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173383#M1075171</link>
      <description>&lt;P&gt;The second default route was added with a higher AD (2). This means that this additional route will not take effect as long as the one out of Outside-1 is active. You can verify shat by issuing the command &lt;STRONG&gt;show route&lt;/STRONG&gt;. So, I am wondering how that could fix the issue!.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 03:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173383#M1075171</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-26T03:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 2xOutside NAT using both Outside to same Inside Host</title>
      <link>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173392#M1075173</link>
      <description>&lt;P&gt;Without the second route asp drop showed packets dropped due to no route.&lt;/P&gt;&lt;P&gt;Also testing with telnet would fail as previously advised from the captures.&lt;/P&gt;&lt;P&gt;After adding the route telnet was successful, packet capture on the Outside-2 interface shows the return traffic previously missing.&lt;/P&gt;&lt;P&gt;All connection in and out of Outside-1 are still working correctly.&lt;/P&gt;&lt;P&gt;It did solve my problem and has had no issues ... yet ":-)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 04:02:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-2xoutside-nat-using-both-outside-to-same-inside-host/m-p/4173392#M1075173</guid>
      <dc:creator>DON BROWN</dc:creator>
      <dc:date>2020-10-26T04:02:16Z</dc:date>
    </item>
  </channel>
</rss>

