<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 9.3 Nat U-Turn / NAT Reflection in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551111#M1087345</link>
    <description>&lt;P&gt;unfortunately did not work - with the "any" this overlaps with the ip address of the outside interface.&lt;/P&gt;</description>
    <pubDate>Sat, 12 Feb 2022 17:54:15 GMT</pubDate>
    <dc:creator>GR5516</dc:creator>
    <dc:date>2022-02-12T17:54:15Z</dc:date>
    <item>
      <title>ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546135#M1087092</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have an internal server on inside interface of ASA with IP 192.168.1.5 (Public IP 1.2.3.4)&lt;/P&gt;&lt;P&gt;Access from the internet is facilitated via NAT, being translated from the Dynamic interface of the ASA PPPoE outside interface.&lt;/P&gt;&lt;P&gt;My issue relates to accessing the server via its public IP address from the inside interface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Due to constraints with a mobile application, the server must be accessed using the same public FQDN from both internal and via the internet. To further complicate matters, ideally the external port must be mapped to a different tcp port for inbound connections (the server only listens on port 8000)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WAN-IP (1.2.3.4:443)-------ASA--------Server (192.168.1.5:8000)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the first instance, I got the basic NAT rules running which gave access from the net to the server via the port translation&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network IntServer-8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) static interface service tcp https 8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I could not connect internally to the server using the public FQDN. Fixed this by adding a u-turn nat, and allowing intra-interface traffic&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP IntServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I could now connect to the server externally using &lt;A href="https://FQDN" target="_blank" rel="noopener"&gt;https://FQDN&lt;/A&gt;&amp;nbsp;but only internally using &lt;A href="https://FQDN:8000" target="_blank" rel="noopener"&gt;https://FQDN:8000&lt;/A&gt;&amp;nbsp;- the port translation would not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My problem is I cannot seem to get u-turn NAT &lt;U&gt;AND&lt;/U&gt; Port translation working the same together, internally and externally - I can do one or the other, despite adding service objects for TCP 443 and TCP 8000 and trying to add them to the nat (inside,inside) statement. So as a workaround we are currently accessing the server using&amp;nbsp; &lt;A href="https://FQDN:8000" target="_blank" rel="noopener"&gt;https://FQDN:8000&lt;/A&gt;, but ideally we would just use &lt;A href="https://FQDN" target="_blank" rel="noopener"&gt;https://FQDN&lt;/A&gt;&amp;nbsp;and let the ASA translate 443 to 8000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So essentially I want the u-turn nat (inside, inside) to also translate tcp 443 to tcp 8000, as it does on the nat (inside,outside), for connections initiated on the inside with the public FQDN, and would be delighted for any pointers on this.&lt;/P&gt;&lt;P&gt;I have tried various combinations of&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP IntServer&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;with service ports appended for 8000 and 443 to no avail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do hope my explaination is clear enough to understand from the above.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas welcomed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Feb 2022 17:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546135#M1087092</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-05T17:52:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546179#M1087093</link>
      <description>&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/71704-dns-doctoring-2zones.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/71704-dns-doctoring-2zones.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;please see this doc. about the DNS doctor.&amp;nbsp;&lt;BR /&gt;Inside Host must be get Private IP of Server from DNS Server Outside, this make the Inside host connect directly to Server.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Feb 2022 00:21:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546179#M1087093</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-06T00:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546315#M1087108</link>
      <description>&lt;P&gt;I would suggest changing your hairpinning NAT statement to be static and to use the the local LAN subnet (or RFC 1918) as source networks.&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;network object LAN&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;&amp;nbsp; subnet 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;nat (inside,inside) source static LAN LAN destination static WAN-IP IntServer&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;DNS doctoring will not solve the issue as there is a restriction that requires users to access the server using the public IP.&amp;nbsp; DNS doctoring will rewrite the DNS reply with the private IP of the server, not to mention that the DNS request will need to pass through the ASA for it to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Feb 2022 14:17:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546315#M1087108</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2022-02-06T14:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546316#M1087109</link>
      <description>&lt;P&gt;Thansk for your reply - yes, unfortunately DNS doctoring wont work as the initial DNS query will be gotten from an internal DNS server thus never traversing the ASA.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ger&lt;/P&gt;</description>
      <pubDate>Sun, 06 Feb 2022 14:23:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546316#M1087109</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-06T14:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546504#M1087121</link>
      <description>&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;nat (inside,inside) &lt;U&gt;1&lt;/U&gt; source dynamic any interface destination static PublicServer-IP PrivateServer-IP&lt;BR /&gt;Note:- &lt;U&gt;1&lt;/U&gt; is&amp;nbsp;mandator to put the NAT in top list.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 10:33:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546504#M1087121</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-07T10:33:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546917#M1087132</link>
      <description>&lt;P&gt;Thanks all for your input - both source static and source dynamic worked for the main nat loopback. Unfortunately no luck on the PAT portion, when trying to translate TCP443 to TCP8000.&lt;/P&gt;&lt;P&gt;Possibly complicated by the fact that I already have a nat (inside,outside) for internet access to the server via 443 outside to 8000 inside.&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 21:22:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546917#M1087132</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-07T21:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546956#M1087139</link>
      <description>&lt;P&gt;destination port can be change with service tcp, this make the source nat and destination with it port NAT.&lt;BR /&gt;what issue you face with this config, I am interest to know?&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 22:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4546956#M1087139</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-07T22:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547002#M1087142</link>
      <description>&lt;P&gt;Simply, the loopback NAT works as long as I don't try to do PAT, but once I add the PATs with the service command I lose internal access to the WAN address.&lt;/P&gt;&lt;P&gt;Rather than explaining any further I have attached the relevant config parts below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network Int_VLAN100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;subnet 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Int_VLAN110&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;subnet 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network OpServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.6&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network AServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.5&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network WAN-IP&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 1.2.3.4&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP80&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq www &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq https &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service UDP1394&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service udp source eq 1394 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq 8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Test&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.2&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object-group network Int_Nets&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;network-object object Int_VLAN110&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;network-object object Int_VLAN100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit udp any object OpServer eq 1394 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq www &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq 8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq https&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP AServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static AServer interface service TCP8000 TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static AServer interface service TCP80 TCP80&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static OpServer interface service UDP1394 UDP1394&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static AServer interface service TCP8000 TCP8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) after-auto source dynamic Int_Nets interface&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-group inbound in interface Outside&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the above config, on the inside I can ICMP to WAN 1.2.3.4, and connect to the object AServer on 8000 using &lt;A href="https://1.2.3.4:8000" target="_blank"&gt;https://1.2.3.4:8000&lt;/A&gt;&lt;/P&gt;&lt;P&gt;From the WAN I'm also able to connect to &lt;A href="https://1.2.3.4" target="_blank"&gt;https://1.2.3.4&lt;/A&gt;&amp;nbsp;and I don't need the port as the mapping from the second nat statement is correctly mapping outside 443 to inside 8000.&lt;/P&gt;&lt;P&gt;However, when I try to do the same for the internal mapping in the (inside,inside) nat using this line&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP AServer service TCP8000 TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the loopback NAT just fails to work. I recall getting an error at one point something line TCP443 is not a wildchar. Additionally I got errors about not being able to reserve NAT port. I believed this was due to the already existing (inside,outside) mapping for 443 to 8000. This is the case whether I use dynamic or static NAT for the loopback statement.&lt;/P&gt;&lt;P&gt;Hopefully I have explained the position sufficiently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 00:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547002#M1087142</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-08T00:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547062#M1087148</link>
      <description>&lt;P&gt;Simply, the PAT part, if I append it.&lt;/P&gt;&lt;P&gt;I attach here the relevant parts from my config.&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Int_VLAN100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;subnet 192.168.1.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Int_VLAN110&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;subnet 192.168.10.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network OpServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.6&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network HRServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.5&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network WAN-IP&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 1.2.3.4&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP80&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq www &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq https &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service UDP1393&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service udp source eq 1393 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object service TCP8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;service tcp source eq 8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object network Test&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;host 192.168.1.2&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;object-group network Int_Nets&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;network-object object Int_VLAN110&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;network-object object Int_VLAN100&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit udp any object OpServer eq 1393&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object HRServer eq www &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object HRServer eq 8000 &lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object HRServer eq https&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP HRServer&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static HRServer interface service TCP8000 TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static HRServer interface service TCP80 TCP80&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static OpServer interface service UDP13943 UDP1393&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) source static HRServer interface service TCP8000 TCP8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;!&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Outside) after-auto source dynamic Int_Nets interface&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the above config, I can connect to HRServer from outside with &lt;A href="https://1.2.3.4," target="_blank"&gt;https://1.2.3.4,&lt;/A&gt;&amp;nbsp;and I get redirected from 443 to 8000 fine and all works, due to nat rule 2. From the inside I can connect to HRServer using &lt;A href="https://1.2.3.4:8000" target="_blank"&gt;https://1.2.3.4:8000&lt;/A&gt;&amp;nbsp;(no port translation), as there is no PAT service appended to the nat (inside,inside) statement, from nat rule 1.&lt;/P&gt;&lt;P&gt;If I now replace the above nat (inside, inside) with the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static WAN-IP HRServer service TCP8000 TCP443&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in an effort to replicate the port translation from 443 to 8000, and now try connecting to &lt;A href="https://1.2.3.4" target="_blank"&gt;https://1.2.3.4&lt;/A&gt;&amp;nbsp;from the inside, without adding :8000, no joy and I cannot connect. So essentially the loopback NAT works for translating 1.2.3.4 from the inside, but refuses to redirect port 443 to 8000 (on the inside).&lt;/P&gt;&lt;P&gt;I hope I've explained sufficiently, and hope the config snippet makes it clear what I'm trying to do.&lt;/P&gt;&lt;P&gt;PS - I already wrote this reply but for some reason the browser did not publish it, so here it is again. Hopefully wont result in a double post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Ger&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 01:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547062#M1087148</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-08T01:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547293#M1087161</link>
      <description>&lt;P&gt;&lt;FONT color="#000000"&gt;In this scenario you need to switch&amp;nbsp; HRServer and WAN-IP as well as the service, as follows:&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color="#000000"&gt;&lt;EM&gt;nat (Inside,Inside) source dynamic any interface destination static HRServer WAN-IP service TCP443 TCP8000&lt;/EM&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 10:23:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547293#M1087161</guid>
      <dc:creator>BoomShakaLak</dc:creator>
      <dc:date>2022-02-08T10:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547440#M1087164</link>
      <description>&lt;P&gt;Ok, when we check traffic flow for asa we see that’s NAT come before acl,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see acl in asa permit only 8000 so this make asa drop the connect, beucase as I mention before it NAT 8000 to 443, so the new connection is now from outside but with port 443 not 8000. This is why the connect drop in asa.&lt;/P&gt;&lt;P&gt;please check this point add acl check connect And if it pass, check with admin to allow this port in outside.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 13:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547440#M1087164</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-08T13:12:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547487#M1087166</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Do you mean replace the current nat with your statement switching the HRServer as above, or add yours as an additional nat (inside, inside)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your time.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 14:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547487#M1087166</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-08T14:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547488#M1087167</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I already have 443 referenced in the ACL as per&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object HRServer eq https&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Is this what you are referring to as being missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 14:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547488#M1087167</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-08T14:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547684#M1087176</link>
      <description>&lt;P&gt;I know I am late into this but found a link might it help you. Apologies did not understand competeley your scenario but might you find this help you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1150-cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html" target="_blank"&gt;https://www.firewall.cx/cisco-technical-knowledgebase/cisco-firewalls/1150-cisco-asa-firewall-nat-reflection-loopback-hairpinning-configuration.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 18:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4547684#M1087176</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-02-08T18:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4548593#M1087222</link>
      <description>&lt;P&gt;Thank you for the link, and appreciate your response.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Feb 2022 13:32:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4548593#M1087222</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-09T13:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4550942#M1087333</link>
      <description>&lt;P&gt;Hi freind,&lt;/P&gt;&lt;P&gt;Can i see the acl for inisde and outside of asa?&lt;/P&gt;</description>
      <pubDate>Sat, 12 Feb 2022 02:35:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4550942#M1087333</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-02-12T02:35:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4550992#M1087339</link>
      <description>&lt;P&gt;Try please to create two destination service objects, one with destination port 8000/tcp and another with destination port 443/tcp, add them to this NAT rule, and remove the other two you created:&lt;/P&gt;
&lt;PRE&gt;nat (inside,any) source static &amp;lt;server-pivate-IP&amp;gt; &amp;lt;server-public-IP&amp;gt; &amp;lt;real-destination-service&amp;gt; &amp;lt;mapped-destination-service&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Feb 2022 08:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4550992#M1087339</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-12T08:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551110#M1087344</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit udp any object OpServer eq 1394&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq www&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq 8000&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt;access-list inbound extended permit tcp any object AServer eq https&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Feb 2022 17:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551110#M1087344</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-12T17:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551111#M1087345</link>
      <description>&lt;P&gt;unfortunately did not work - with the "any" this overlaps with the ip address of the outside interface.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Feb 2022 17:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551111#M1087345</guid>
      <dc:creator>GR5516</dc:creator>
      <dc:date>2022-02-12T17:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 9.3 Nat U-Turn / NAT Reflection</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551126#M1087348</link>
      <description>&lt;P&gt;Ok, how about if you keep the&amp;nbsp;object network IntServer-8000 NAT rule, remove the "nat (inside,inside)" source dynamic statement, and then you add:&lt;/P&gt;
&lt;PRE&gt;nat (inside,inside) source static &amp;lt;server-pivate-IP&amp;gt; &amp;lt;server-public-IP&amp;gt; &amp;lt;real-destination-service&amp;gt; &amp;lt;mapped-destination-service&amp;gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Feb 2022 18:45:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-3-nat-u-turn-nat-reflection/m-p/4551126#M1087348</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2022-02-12T18:45:27Z</dc:date>
    </item>
  </channel>
</rss>

