<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Old NAT ASA Config Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4802920#M1099066</link>
    <description>&lt;P&gt;Thank you so much for the elaborate explanation!&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Mar 2023 17:14:14 GMT</pubDate>
    <dc:creator>pinoybot</dc:creator>
    <dc:date>2023-03-28T17:14:14Z</dc:date>
    <item>
      <title>Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4800331#M1098961</link>
      <description>&lt;P&gt;Hello Network Gurus,&lt;BR /&gt;&lt;BR /&gt;Just trying to figure out what is this NAT config for?&lt;BR /&gt;&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (inside,outside) 10.17.1.5 10.17.1.5 netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Saw this access list command as well:&lt;BR /&gt;&lt;BR /&gt;access-group OUTSIDE_FILTER in interface outside&lt;BR /&gt;access-list OUTSIDE_FILTER extended permit tcp any host 10.17.1.5 eq www&lt;BR /&gt;&lt;BR /&gt;I'll appreciate any input. Thank you!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 20:46:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4800331#M1098961</guid>
      <dc:creator>pinoybot</dc:creator>
      <dc:date>2023-03-23T20:46:04Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4800715#M1098964</link>
      <description>&lt;P&gt;Dynamic PAT is configured for all traffic going from inside to outside, except for 10.17.1.5 which is not NATed or PATed. ACL allows HTTP to this host from the outside.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 09:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4800715#M1098964</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-03-24T09:33:35Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801117#M1098983</link>
      <description>&lt;P&gt;Thanks tvotna, so is this not a form of a NAT -&amp;nbsp;&lt;SPAN&gt;static (inside,outside) 10.17.1.5 10.17.1.5 netmask 255.255.255.255 ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2023 19:40:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801117#M1098983</guid>
      <dc:creator>pinoybot</dc:creator>
      <dc:date>2023-03-24T19:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801123#M1098984</link>
      <description>&lt;P&gt;please check below&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Mar 2023 13:50:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801123#M1098984</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-25T13:50:43Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801255#M1098990</link>
      <description>&lt;P&gt;This is called static identity NAT.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Mar 2023 08:59:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801255#M1098990</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2023-03-25T08:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801303#M1098999</link>
      <description>&lt;P&gt;&lt;SPAN&gt;static (inside,outside) 10.17.1.5 10.17.1.5 netmask 255.255.255.255 &amp;lt;&amp;lt;- NO-NAT, also called identity&amp;nbsp;NAT&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT configuration is always something that draws a lot of attention.&amp;nbsp; NAT can perform lots of different functions in many different configurations.&amp;nbsp; That being said, it can be complex to understand at first.&amp;nbsp; However, I think its probably more important to understand NAT than any other function on the ASA’s.&amp;nbsp; If you don’t fully understand the concept you can get yourself in a lot of trouble real fast.&amp;nbsp; So lets get right into it and look at a couple of scenarios and examples.&amp;nbsp; In this post I’m going to talk about the most common NAT configurations.&amp;nbsp; In upcoming posts we’ll talk about NAT DMZ configurations and policy NAT.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;The standard 5505 overload&lt;/FONT&gt;&lt;BR /&gt;&lt;/STRONG&gt;I call this the ‘standard’ because its pretty typical to see on a 5505 box.&amp;nbsp; The client usually has 1 external IP and has a couple of services with a single subnet behind it.&amp;nbsp; Nothing too special here.&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#008000"&gt;ASA(config)#&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;global (outside) 1 interface&lt;BR /&gt;&lt;FONT color="#008000"&gt;ASA(config)#&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;So, what does this mean?&amp;nbsp; Lets break it down.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&lt;FONT size="2"&gt;The Global Command&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT color="#0000ff"&gt;global&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– Indicates that we are defining a global address pool.&amp;nbsp; This can either be a pool of addresses or a single IP that’s being overloaded through the use of PAT&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;(&lt;STRONG&gt;outside)&lt;/STRONG&gt;&lt;/FONT&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– The item in the parenthesis is the interface we are defining the pool on.&amp;nbsp; In this case, its the outside interface&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;1&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;–&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;Specifies the ID of the pool, this will be matched up against the internal NAT pool&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;interface&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– The interface keyword specifies that PAT is being used with the IP defined on the interface.&amp;nbsp; PAT (also referred to as overload) uses a single external IP address for all of the clients in the NAT pool.&amp;nbsp; To make the distinction clear, NAT usually means that you are using a pool of IP’s and PAT usually means you are using one external IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="3"&gt;&lt;FONT size="2"&gt;The Nat command&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;FONT color="#0000ff"&gt;nat&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– The NAT command is what you use to associate a network with a pool of global addresses&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;(inside)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– The item in the parenthesis is the interface in which the NAT network exists.&amp;nbsp; In this case its going to be on the inside interface&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;1&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– This number is what is used to pair the global and NAT statements together.&amp;nbsp; In other words, global pool 1 will be used with NAT network 1.&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;0.0.0.0 0.0.0.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– Translates to mean all networks.&amp;nbsp; If there is only a single internal subnet that requires translation this could just as easily read something like ‘192.168.127.0 255.255.255.0’.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 Mar 2023 13:50:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4801303#M1098999</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-25T13:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Old NAT ASA Config Question</title>
      <link>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4802920#M1099066</link>
      <description>&lt;P&gt;Thank you so much for the elaborate explanation!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 17:14:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/old-nat-asa-config-question/m-p/4802920#M1099066</guid>
      <dc:creator>pinoybot</dc:creator>
      <dc:date>2023-03-28T17:14:14Z</dc:date>
    </item>
  </channel>
</rss>

