<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Auto NAT applying two rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775382#M1097791</link>
    <description>&lt;P&gt;Dears ;&lt;BR /&gt;&lt;BR /&gt;I have a basic question regarding auto nat .&lt;BR /&gt;I have below scenario :&lt;BR /&gt;&lt;SPAN&gt;I have asa with two interfaces (inside and outside) (192.168.35.200/24 &amp;amp; 192.168.25.200/24)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;i have two Linux machines (192.168.35.68 &amp;amp; 192.168.25.30) and have ASA as GW .&lt;BR /&gt;two Linux machines have auto nat configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;When I initiate ssh from&amp;nbsp;&lt;SPAN&gt;192.168.35.68 to&amp;nbsp;192.168.200.30 ,Does the two auto nat rules will be applied?&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network 192.168.35.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host 192.168.35.68&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network obj-192.168.25.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host 192.168.25.30&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network 192.168.35.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (inside,outside) static obj-192.168.200.68&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network obj-192.168.25.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (outside,inside) static obj-192.168.200.30&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2023 15:48:18 GMT</pubDate>
    <dc:creator>mohamed shazly</dc:creator>
    <dc:date>2023-02-14T15:48:18Z</dc:date>
    <item>
      <title>ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775382#M1097791</link>
      <description>&lt;P&gt;Dears ;&lt;BR /&gt;&lt;BR /&gt;I have a basic question regarding auto nat .&lt;BR /&gt;I have below scenario :&lt;BR /&gt;&lt;SPAN&gt;I have asa with two interfaces (inside and outside) (192.168.35.200/24 &amp;amp; 192.168.25.200/24)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;i have two Linux machines (192.168.35.68 &amp;amp; 192.168.25.30) and have ASA as GW .&lt;BR /&gt;two Linux machines have auto nat configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;When I initiate ssh from&amp;nbsp;&lt;SPAN&gt;192.168.35.68 to&amp;nbsp;192.168.200.30 ,Does the two auto nat rules will be applied?&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;object network 192.168.35.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host 192.168.35.68&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network obj-192.168.25.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;host 192.168.25.30&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network 192.168.35.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (inside,outside) static obj-192.168.200.68&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;object network obj-192.168.25.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;nat (outside,inside) static obj-192.168.200.30&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:48:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775382#M1097791</guid>
      <dc:creator>mohamed shazly</dc:creator>
      <dc:date>2023-02-14T15:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775385#M1097793</link>
      <description>&lt;P&gt;SRC&amp;nbsp;&lt;SPAN&gt;192.168.35.68 will be source-Natted to&amp;nbsp;192.168.200.68 And DST&amp;nbsp;192.168.200.30 will be D-Natted to&amp;nbsp;192.168.25.30 at a time ??&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775385#M1097793</guid>
      <dc:creator>mohamed shazly</dc:creator>
      <dc:date>2023-02-14T15:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775388#M1097794</link>
      <description>&lt;P&gt;this need to test I will try run lab and check&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:52:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775388#M1097794</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-14T15:52:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775391#M1097795</link>
      <description>&lt;P&gt;Your config doesn't make any sense to me. What exactly do you want to achieve? With RFC1918 on both sides you likely don't need any NAT and can do pure routing and access-control. But if you really want to NAT source and destination at the same time, you should do it with a manual- or twice-NAT config.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775391#M1097795</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2023-02-14T15:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775395#M1097796</link>
      <description>&lt;P&gt;I have tested it , just need to be sure about it from more experienced engineer .&lt;BR /&gt;Below is test :&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Try ssh from linux machine (192.168.25.30) to Pre-NAT IP (192.168.200.68).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Try ping from from linux machine (192.168.25.30) to Pre-NAT IP (192.168.200.68)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Try ping from from linux machine (192.168.35.68) to&amp;nbsp; Pre-NAT IP (192.168.200.30)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;All tests works fine&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Fourth :&amp;nbsp;&lt;BR /&gt;Show commands&lt;/SPAN&gt;&lt;SPAN&gt;==&amp;gt;when Try ping from from linux machine (192.168.25.30) to Pre-NAT IP (192.168.200.68) :&lt;BR /&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa# show nat&lt;/SPAN&gt;&lt;SPAN&gt;Auto NAT Policies (Section 2)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1 (outside) to (inside) source static obj-192.168.25.30 obj-192.168.200.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 1, untranslate_hits = 8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2 (inside) to (outside) source static 192.168.35.68 obj-192.168.200.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 1, untranslate_hits = 8&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Cleared Nat counters&lt;/SPAN&gt;&lt;SPAN&gt;==&amp;gt;When Try ping from from linux machine (192.168.35.68) to&amp;nbsp; Pre-NAT IP (192.168.200.30)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa# show nat&lt;/SPAN&gt;&lt;SPAN&gt;Auto NAT Policies (Section 2)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1 (outside) to (inside) source static obj-192.168.25.30 obj-192.168.200.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 1, untranslate_hits = 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2 (inside) to (outside) source static 192.168.35.68 obj-192.168.200.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 1, untranslate_hits = 6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Cleared Nat counters&lt;/SPAN&gt;&lt;SPAN&gt;===&amp;gt;when Try ssh from linux machine (192.168.25.30) to Pre-NAT IP (192.168.200.68).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa# show nat&lt;/SPAN&gt;&lt;SPAN&gt;Auto NAT Policies (Section 2)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;1 (outside) to (inside) source static obj-192.168.25.30 obj-192.168.200.30&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 1, untranslate_hits = 0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2 (inside) to (outside) source static 192.168.35.68 obj-192.168.200.68&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;translate_hits = 0, untranslate_hits = 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa#&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Attached Packet tracer file for ssh connection (not detailed and detailed)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:57:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775395#M1097796</guid>
      <dc:creator>mohamed shazly</dc:creator>
      <dc:date>2023-02-14T15:57:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775401#M1097797</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/325766"&gt;@Karsten Iwen&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;i understand you .&lt;BR /&gt;Just need to confirm if two auto nat rules can be applied at time if there is matching traffic&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 15:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775401#M1097797</guid>
      <dc:creator>mohamed shazly</dc:creator>
      <dc:date>2023-02-14T15:59:38Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Auto NAT applying two rules</title>
      <link>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775433#M1097801</link>
      <description>&lt;P&gt;I know what you try to do,&amp;nbsp;&lt;BR /&gt;if the client in IN and want to access Server in IN then client must use public IP of Server (instead of private IP) so you need one NAT not two as show below&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (285).png" style="width: 654px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/176476iCAB294988D1A2363/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (285).png" alt="Screenshot (285).png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 16:42:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-auto-nat-applying-two-rules/m-p/4775433#M1097801</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-14T16:42:39Z</dc:date>
    </item>
  </channel>
</rss>

