<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT and site to site tunnel issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4386044#M1080007</link>
    <description>&lt;P&gt;Rob. I added two new NAT rules above the inside / outsite one that the Tunnel config had added.&lt;/P&gt;&lt;P&gt;Both Tom / Outside, first for the AWS traffic and the second for the Internet traffic.&lt;/P&gt;&lt;P&gt;All is good now, thanks for your input, it helped push me in the right direction&lt;/P&gt;</description>
    <pubDate>Tue, 13 Apr 2021 08:56:22 GMT</pubDate>
    <dc:creator>Richard Tapp</dc:creator>
    <dc:date>2021-04-13T08:56:22Z</dc:date>
    <item>
      <title>NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320890#M1079955</link>
      <description>&lt;P&gt;We currently have a working tunnel from one of our ASA's to AWS. As we can only have single subnets set in the tunnel due to AWS limitations, our NAT statements have quite wide ranging subnets to catch all the possible combinations.&lt;/P&gt;&lt;P&gt;We have one serer that is required to use the tunnel and now needs internet access.&lt;/P&gt;&lt;P&gt;This is where the issue comes, as soon as we add a specific static NAT for internet access, the AWS flow stops working.&lt;/P&gt;&lt;P&gt;So I am looking for a solution that allows for the tunnel to work and for the server to have just TCP/443 to the internet as well.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 08:56:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320890#M1079955</guid>
      <dc:creator>Richard Tapp</dc:creator>
      <dc:date>2021-04-09T08:56:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320895#M1079956</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/293247"&gt;@Richard Tapp&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume that the rule you add is placed above the NAT exemption rule, so all traffic from that source is natted behind the ASAs interface IP address?&lt;/P&gt;
&lt;P&gt;What NAT exemption rule do you have in place for AWS and what rule have you added that breaks the access to AWS.&lt;/P&gt;
&lt;P&gt;Provide the output of "show nat detail".&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 09:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320895#M1079956</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-09T09:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320955#M1079962</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I have the Tom-DMZ NAT either before or after the 114 line, then the flow AWS to Tom-DMZ fails.&lt;/P&gt;&lt;P&gt;But if I have the Tom-DMZ NAT in the server on Tom-DMZ can get to the internet.&lt;/P&gt;&lt;P&gt;But only 1 ever works at a time&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sh nat det | inc 10.0.0.0&lt;/P&gt;&lt;P&gt;114 (Inside) to (outside) source static NETWORK_OBJ_10.0.0.0_9 NETWORK_OBJ_10.0.0.0_9&amp;nbsp; destination static NETWORK_OBJ_10.x.x.0_21 NETWORK_OBJ_10.x.x.0_21 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 10.0.0.0/9, Translated: 10.0.0.0/9&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# sh nat det | inc Tom-DMZ&lt;/P&gt;&lt;P&gt;121 (Tom-DMZ) to (outside) source dynamic Tom interface&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 12:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320955#M1079962</guid>
      <dc:creator>Richard Tapp</dc:creator>
      <dc:date>2021-04-09T12:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320966#M1079963</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/293247"&gt;@Richard Tapp&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You've got a different source interface in those 2 nat rules.&lt;/P&gt;
&lt;P&gt;What is the source IP address of the server and which interface is it actually connected to&lt;/P&gt;
&lt;P&gt;Run packet-tracer from CLI, when each of the NAT rules are configured, upload the output for review.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 12:19:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320966#M1079963</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-09T12:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320997#M1079964</link>
      <description>&lt;P&gt;you've got a different source interface in those 2 nat rules. The tunnel put the inside to outside one in. All interfaces start with 10.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is the source IP address of the server and which interface is it actually connected to. This is on the Tom-DMZ 10.75.120.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom to AWS Tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;packet-tracer in Tom-DMZ tcp 10.75.120.xx https 10.150.xx.xx h$&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: Resolve Egress Interface&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop x.x.x.x using egress ifc&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group M-ENI-DMZ_access_in in interface Tom-DMZ&lt;/P&gt;&lt;P&gt;access-list M-ENI-DMZ_access_in extended permit object-group xxx-Standard-Internet-Outbound object xxxxxxx any&lt;/P&gt;&lt;P&gt;object-group service xxx-Standard-Internet-Outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp;description: xxx Standard Internet Outbound Ports&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ftp-data&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object udp destination eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Tom-DMZ,outside) source dynamic Tom interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 10.75.120.xx/443 to xx.xx.xx.xx/48&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: FLOW-EXPORT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (Tom-DMZ,outside) source dynamic Tom interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 247200484, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Tom-DMZ&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom to Internet&lt;/P&gt;&lt;P&gt;packet-tracer in Tom-DMZ tcp 10.75.120.xx https 8.8.8.8 https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: Resolve Egress Interface&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;found next-hop xx.xx.xx.xx using egress ifc&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group M-ENI-DMZ_access_in in interface Tom-DMZ&lt;/P&gt;&lt;P&gt;access-list M-ENI-DMZ_access_in extended permit object-group xxx-Standard-Internet-Outbound object xxxxxxx any&lt;/P&gt;&lt;P&gt;object-group service xxx-Standard-Internet-Outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp;description: ISS Standard Internet Outbound Ports&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ftp-data&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq www&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq https&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object udp destination eq domain&lt;/P&gt;&lt;P&gt;&amp;nbsp;service-object tcp destination eq ssh&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-EXPORT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 247169104, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Tom-DMZ&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Apr 2021 13:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4320997#M1079964</guid>
      <dc:creator>Richard Tapp</dc:creator>
      <dc:date>2021-04-09T13:26:38Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and site to site tunnel issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4386044#M1080007</link>
      <description>&lt;P&gt;Rob. I added two new NAT rules above the inside / outsite one that the Tunnel config had added.&lt;/P&gt;&lt;P&gt;Both Tom / Outside, first for the AWS traffic and the second for the Internet traffic.&lt;/P&gt;&lt;P&gt;All is good now, thanks for your input, it helped push me in the right direction&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 08:56:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-and-site-to-site-tunnel-issue/m-p/4386044#M1080007</guid>
      <dc:creator>Richard Tapp</dc:creator>
      <dc:date>2021-04-13T08:56:22Z</dc:date>
    </item>
  </channel>
</rss>

