<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA-5506 NAT issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398246#M1080545</link>
    <description>&lt;P&gt;I'm very curious as to what you are saying, so I want to clarify if you are saying something other than what is configured. There are inside_1 through inside_6, which is shown in the bottom of the post. Are you referring to something else?&lt;/P&gt;</description>
    <pubDate>Wed, 05 May 2021 15:12:40 GMT</pubDate>
    <dc:creator>ABaker94985</dc:creator>
    <dc:date>2021-05-05T15:12:40Z</dc:date>
    <item>
      <title>ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398171#M1080543</link>
      <description>&lt;P&gt;We have multiple ASA-5506s that are being used for compliance reasons. The first two went in just fine with no NAT statements, but the 3rd one drops around 25-30% packets both to and through the firewall. All firewalls are running 9.8(4) and were configured as an HA pair. The standby firewall had 100% ping rate to the firewall, but upon failover this would drop to around 75% success, which included packets to and through the firewall. For testing, failover config was removed, but this didn't change anything. This is not a perimeter firewall, and the IPs on the inside of the firewall need to appear on the outside of the firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The inside interfaces are bridged as shown below, and we have hosts plugged into all but one of the inside interfaces. As soon as I created a nat entry using "nat (any,outside) source static Center-Network Center-Network no-proxy-arp", we started seeing 100% success rate on the traffic. I tried other iterations than "any,outside" such as creating several nat statements similar to "nat (inside_1,outside) source static..." "nat (inside_2,outside) source static..." but much of the traffic would be blocked. Given it's not possible to do a "nat (inside,outside)..." statement because the ASA won't take "inside" but wants "inside_#", what is the proper way to NAT? I realize NAT shouldn't be required, but the firewall isn't working without NAT configuration, and unfortunately we don't currently have Smartnet on the firewall.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.22.24.1 255.255.255.240 standby 10.22.24.2&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 13:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398171#M1080543</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T13:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398196#M1080544</link>
      <description>&lt;P&gt;Do you need&amp;nbsp; BVI inside_1 - 6 interfaces, or look below : may be bug ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.petenetlive.com/KB/Article/0001422" target="_blank"&gt;https://www.petenetlive.com/KB/Article/0001422&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 14:12:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398196#M1080544</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-05T14:12:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398246#M1080545</link>
      <description>&lt;P&gt;I'm very curious as to what you are saying, so I want to clarify if you are saying something other than what is configured. There are inside_1 through inside_6, which is shown in the bottom of the post. Are you referring to something else?&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 15:12:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398246#M1080545</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T15:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398255#M1080546</link>
      <description>&lt;P&gt;yes i am referreing the ASA&amp;nbsp; has some config issue, if the intention of your config not what you have done.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So you looking BVI ? with so many brindge interface ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 15:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398255#M1080546</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-05T15:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398258#M1080547</link>
      <description>&lt;P&gt;Here is the desire interface config:&lt;/P&gt;&lt;P&gt;Gi1/1: outside&lt;/P&gt;&lt;P&gt;Gi1/2-1/7: inside, which requires a BVI interface&lt;/P&gt;&lt;P&gt;Gi1/8: stateful/failover (will be reapplied after the problem is resolved)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We don't have a switch on the inside of the firewall and are trying to use Gi1/2-1/7 for L2 connectivity.&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 15:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398258#M1080547</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T15:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398275#M1080548</link>
      <description>&lt;P&gt;Thank you for the confirmation, then your setup is correct. (just to clarify things)&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 15:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398275#M1080548</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-05T15:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398278#M1080549</link>
      <description>&lt;P&gt;Hmmm. I still left with wondering why the firewall is dropping so much traffic. I just updated the firmware from 9.8(4) to 9.12(4) to see if this might resolve the issue, but as soon as I remove the nat configuration, the traffic starts dropping. I shouldn't need the nat statement.&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 15:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398278#M1080549</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T15:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398308#M1080550</link>
      <description>&lt;P&gt;is this traffifc NAT Drop inside to outside or outside to inside - Either case yes you need NAT configuration, since how RFC 1918 address reach over internet ?&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 16:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398308#M1080550</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-05T16:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398315#M1080551</link>
      <description>&lt;P&gt;There is NO Internet access with this firewall - NAT to the outside world is done through the perimeter firewall. The inside of this firewall is RFC-1918 and the outside I'm concerned with are also RFC-1918 addresses. The outside interface of this firewall is plugged into our organizations internal network, and we need to segment the traffic on the inside of the firewall from the rest of our network.&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 16:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398315#M1080551</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T16:42:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398460#M1080560</link>
      <description>&lt;P&gt;Here are some more details. Pinging an internal address (10.22.24.3) from an external source (10.52.20.29) showed that the ASA was trying to reroute the traffic to the outside interface and NOT the inside interface:&lt;/P&gt;&lt;P&gt;%ASA-3-106014: Deny inbound icmp src outside:10.52.20.29 dst outside:10.22.24.3 (type 8, code 0)&lt;/P&gt;&lt;P&gt;After hours of debugging, the problem appeared to be bug-related:&amp;nbsp;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg78080" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg78080&lt;/A&gt;.&amp;nbsp; The bug shows random ICMP packets being dropped for ACLs applied to BVI interfaces. We had packet drops with data packets as well, which was causing the larger problem. Although this doesn't show it's only related to the ASA-5506, we've not had any problems with the ASA-5508. All ACLs have been moved to the outside interface. We'll run a full test tomorrow, but right now everything seems to be working.&lt;/P&gt;</description>
      <pubDate>Wed, 05 May 2021 21:34:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398460#M1080560</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-05T21:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398655#M1080572</link>
      <description>&lt;P&gt;If this device is just act as Router (FW) some other device doing nat, then you need just routing you do not need NAT here.&lt;/P&gt;
&lt;P&gt;if you can give us small diagram how your devices connected.&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 09:18:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398655#M1080572</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-05-06T09:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA-5506 NAT issues</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398782#M1080578</link>
      <description>&lt;P&gt;I completely agree and even stated in my first paragraph that we had a couple other implementations that didn't use NAT, but by adding the NAT statement on this firewall, the problem significantly lessened. When looking at the logs, I had initially overlooked the problem that the ASA incorrect attempted to send the packets to the outside interface and not the inside interface. This is a bug, and I had to remove ACLs from the BVI interface to correct the problem.&lt;/P&gt;</description>
      <pubDate>Thu, 06 May 2021 13:59:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-nat-issues/m-p/4398782#M1080578</guid>
      <dc:creator>ABaker94985</dc:creator>
      <dc:date>2021-05-06T13:59:08Z</dc:date>
    </item>
  </channel>
</rss>

