<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat/m-p/4449500#M1082885</link>
    <description>&lt;P&gt;Technically speaking a static NAT for&amp;nbsp;&lt;SPAN&gt;192.168.1.10&amp;nbsp; to 2.2.2.10 is possible on ASA itself and it can translate to non-directly-connected IP addresses. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The u&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;"&gt;pstream device, in this case, the load balancer (LB) should have the correct routing to 2.2.2.10.&amp;nbsp; On LB, the next-hop for 2.2.2.10&amp;nbsp; should point to the ASA. In general, routing should also be correctly configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 14 Aug 2021 16:13:49 GMT</pubDate>
    <dc:creator>Ilkin</dc:creator>
    <dc:date>2021-08-14T16:13:49Z</dc:date>
    <item>
      <title>NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4448072#M1082843</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa-pep.png" style="width: 777px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/127745i489DCA5125750F6E/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa-pep.png" alt="asa-pep.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I want to do a static nat for 192.168.1.10&amp;nbsp; to 2.2.2.10 so that the traffic comes through the second ISP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;What need to be done on ASA side to achieve the above&amp;nbsp;&lt;/P&gt;&lt;P&gt;load balancer is a third party appliance&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 21:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4448072#M1082843</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2021-08-11T21:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4448105#M1082844</link>
      <description>&lt;P&gt;Personally as per the diagram&amp;nbsp; - I do not believe you can do that. ( do ASA&amp;nbsp; have same IP address configured or are aware 2.2.2.10 ?)&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 23:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4448105#M1082844</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-11T23:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4448787#M1082858</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there is reachability&amp;nbsp; from ASA to the network 2.2.2.2&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 04:23:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4448787#M1082858</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2021-08-13T04:23:04Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4449500#M1082885</link>
      <description>&lt;P&gt;Technically speaking a static NAT for&amp;nbsp;&lt;SPAN&gt;192.168.1.10&amp;nbsp; to 2.2.2.10 is possible on ASA itself and it can translate to non-directly-connected IP addresses. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The u&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;"&gt;pstream device, in this case, the load balancer (LB) should have the correct routing to 2.2.2.10.&amp;nbsp; On LB, the next-hop for 2.2.2.10&amp;nbsp; should point to the ASA. In general, routing should also be correctly configured.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Aug 2021 16:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4449500#M1082885</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2021-08-14T16:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4449528#M1082890</link>
      <description>&lt;P&gt;Ok in that case you have routing in place, is the routed IP to ASA, then you can do static NAT since your diagram is not clear.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Aug 2021 19:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4449528#M1082890</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-08-14T19:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4450144#M1082915</link>
      <description>&lt;P&gt;All this really depends what subnet the 2.2.2.x network has on the loadbalancer.&amp;nbsp; If the 2.2.2.10 falls within the existing 2.2.2.x subnet on the loadbalancer then you would need to do NAT on the loadbalancer.&amp;nbsp; But if the 2.2.2.10 IP can be routed to the ASA, i.e. not directly connected to the loadbalancer, then this can be done on the ASA.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 20:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4450144#M1082915</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-08-16T20:54:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4450882#M1082951</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/368590"&gt;@Ilkin&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/319690"&gt;@Marius Gunnerud&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply. If I do the proper routing can I do&amp;nbsp; &amp;nbsp;site to site VPN with a non-directly -connected ip address&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 03:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4450882#M1082951</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2021-08-18T03:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4451363#M1082970</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;,&lt;SPAN&gt;&amp;nbsp;If the 2.2.2.10 falls within the existing 2.2.2.x subnet on the loadbalancer then you would need to do NAT on the loadbalancer.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What if 2.2.2.10&amp;nbsp; is in the same subnet.&lt;/P&gt;&lt;P&gt;Can you explain the above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) If i2.2.2.10 is not directly connected to&amp;nbsp; how can I peer wirh a remote site for site to site vpn&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 17:06:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4451363#M1082970</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2021-08-18T17:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4451499#M1082977</link>
      <description>&lt;P&gt;1) If the 2.2.2.x subnet (which includes 2.2.2.10) is located on the outside interface of the loadbalancer then this would be seen as being directly connected and the loadbalancer would not forward the traffic to any other destination.&amp;nbsp; Therefore you would need to NAT 2.2.2.10 to the IP of the ASA for there to be connectivity.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) If 2.2.2.10 is not directly connected to the ASA you would need to NAT 2.2.2.10 to the IP of the ASA.&amp;nbsp; Make sure that NAT-traversal is enabled on the ASA (it should be enabled by default).&lt;/P&gt;</description>
      <pubDate>Wed, 18 Aug 2021 22:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4451499#M1082977</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-08-18T22:00:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4451553#M1082979</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Regarding&amp;nbsp; the site to site VPN,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp; I want to peer with ASA(2.2.2.11) and it is not directly connected, and there is no destination NAt for the device&amp;nbsp; (I mean 2.2.2.11 is not NATed with any LAN Device) , is there a way to establish S2S VPN&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2)2.2.2.11 Is NATed on Load Balancer&amp;nbsp; To 1.1.1.1 (Which is the&amp;nbsp; outside interface&amp;nbsp; of the ASA),&amp;nbsp; A remote site can peer with 2.2.2.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a million&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 01:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4451553#M1082979</guid>
      <dc:creator>bluesea2010</dc:creator>
      <dc:date>2021-08-19T01:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat/m-p/4451582#M1082980</link>
      <description>&lt;P&gt;1) you need to provide more information with regards to where the 2.2.2.11 subnet is located.&amp;nbsp; Is this subnet a part of the loadbalancer outside interface? If yes, then you must do NAT on the loadbalancer.&amp;nbsp; If it is not part of the loadbalancer outside interface, then you need to configure routing on the loadbalancer so that it sends traffic for 2.2.2.11 to the ASA.&amp;nbsp; Regardless, you will be able to setup a S2S VPN.&amp;nbsp; You just need to be sure that connectivity is there between the vpn devices.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) yes, if there is NAT on the loadbalancer&amp;nbsp; to 1.1.1.1 then you will be able to setup a S2S VPN between the ASA and a remote site.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 03:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat/m-p/4451582#M1082980</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2021-08-19T03:53:36Z</dc:date>
    </item>
  </channel>
</rss>

