<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA Static NAT Issue with Server not connected directly to A in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967421#M1106321</link>
    <description>&lt;P&gt;I don't have access to exact switches and firewalls but what I did was to replicate the same scenario in my EVE-NG lab and I noticed I have the same issue here so I must be doing something stupid.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Configurations&lt;/STRONG&gt;:&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.1.15.82 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.203 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network AIMS&lt;BR /&gt;host 192.168.0.88&lt;BR /&gt;object network SWITCH&lt;BR /&gt;host 192.168.0.201&lt;BR /&gt;!&lt;BR /&gt;object network AIMS&lt;BR /&gt;nat (inside,outside) static 10.1.15.81&lt;BR /&gt;object network SWITCH&lt;BR /&gt;nat (inside,outside) static 10.1.15.83&lt;BR /&gt;!&lt;BR /&gt;access-list PASS extended permit ip any any&lt;BR /&gt;access-group PASS in interface outside&lt;BR /&gt;access-group PASS out interface outside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Verifications&lt;/STRONG&gt;:&lt;BR /&gt;From PC:&lt;BR /&gt;&lt;BR /&gt;ciscoasa# show xlate&lt;BR /&gt;2 in use, 2 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;s - static, T - twice, N - net-to-net&lt;BR /&gt;NAT from inside:192.168.0.88 to outside:10.1.15.81&lt;BR /&gt;flags s idle 0:00:51 timeout 0:00:00&lt;BR /&gt;NAT from inside:192.168.0.201 to outside:10.1.15.83&lt;BR /&gt;flags s idle 0:06:20 timeout 0:00:00&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show nat&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static AIMS 10.1.15.81&lt;BR /&gt;translate_hits = 0, untranslate_hits = 16&lt;BR /&gt;2 (inside) to (outside) source static SWITCH 10.1.15.83&lt;BR /&gt;translate_hits = 1, untranslate_hits = 5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ciscoasa# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list PASS; 1 elements; name hash: 0x69403060&lt;BR /&gt;access-list PASS line 1 extended permit ip any any (hitcnt=22) 0x7e6cca6f&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 28 Nov 2023 12:54:13 GMT</pubDate>
    <dc:creator>Atif Masood</dc:creator>
    <dc:date>2023-11-28T12:54:13Z</dc:date>
    <item>
      <title>Cisco ASA Static NAT Issue with Server not connected directly to ASA</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967286#M1106305</link>
      <description>&lt;P&gt;I am trying to use Static NAT to NAT my internal sever accessible from outside interface.&lt;BR /&gt;I am able to NAT the switch connected directly to ASA Firewall however it doesn’t work for device hanging off from that switch.&lt;BR /&gt;Am I doing something wrong?&lt;/P&gt;&lt;P&gt;I have drawn my topology here and also the ASA software version is 9.12&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Firewall NAT Issue.png" style="width: 693px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/203547i1306E405A4B254F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="Firewall NAT Issue.png" alt="Firewall NAT Issue.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 08:52:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967286#M1106305</guid>
      <dc:creator>Atif Masood</dc:creator>
      <dc:date>2023-11-28T08:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967341#M1106311</link>
      <description>&lt;P&gt;Did you config acl to allow ping from outside to inside?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 10:21:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967341#M1106311</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-28T10:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967349#M1106312</link>
      <description>&lt;P&gt;yes I applied access list to permit all traffic.&lt;BR /&gt;The other NAT entry for the directly connected switch to Firewall is working without any issues.&lt;BR /&gt;&lt;BR /&gt;access-list PASS extended permit ip&amp;nbsp;any&amp;nbsp;any&lt;BR /&gt;access-group PASS in interface outside&lt;BR /&gt;access-group PASS out interface outside&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 10:33:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967349#M1106312</guid>
      <dc:creator>Atif Masood</dc:creator>
      <dc:date>2023-11-28T10:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967352#M1106313</link>
      <description>&lt;P&gt;From asa&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Show nat&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I need to see translate and untranslate count.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 10:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967352#M1106313</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-28T10:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967421#M1106321</link>
      <description>&lt;P&gt;I don't have access to exact switches and firewalls but what I did was to replicate the same scenario in my EVE-NG lab and I noticed I have the same issue here so I must be doing something stupid.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Configurations&lt;/STRONG&gt;:&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.1.15.82 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.0.203 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;object network AIMS&lt;BR /&gt;host 192.168.0.88&lt;BR /&gt;object network SWITCH&lt;BR /&gt;host 192.168.0.201&lt;BR /&gt;!&lt;BR /&gt;object network AIMS&lt;BR /&gt;nat (inside,outside) static 10.1.15.81&lt;BR /&gt;object network SWITCH&lt;BR /&gt;nat (inside,outside) static 10.1.15.83&lt;BR /&gt;!&lt;BR /&gt;access-list PASS extended permit ip any any&lt;BR /&gt;access-group PASS in interface outside&lt;BR /&gt;access-group PASS out interface outside&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Verifications&lt;/STRONG&gt;:&lt;BR /&gt;From PC:&lt;BR /&gt;&lt;BR /&gt;ciscoasa# show xlate&lt;BR /&gt;2 in use, 2 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;s - static, T - twice, N - net-to-net&lt;BR /&gt;NAT from inside:192.168.0.88 to outside:10.1.15.81&lt;BR /&gt;flags s idle 0:00:51 timeout 0:00:00&lt;BR /&gt;NAT from inside:192.168.0.201 to outside:10.1.15.83&lt;BR /&gt;flags s idle 0:06:20 timeout 0:00:00&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show nat&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static AIMS 10.1.15.81&lt;BR /&gt;translate_hits = 0, untranslate_hits = 16&lt;BR /&gt;2 (inside) to (outside) source static SWITCH 10.1.15.83&lt;BR /&gt;translate_hits = 1, untranslate_hits = 5&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ciscoasa# show access-list&lt;BR /&gt;access-list cached ACL log flows: total 0, denied 0 (deny-flow-max 4096)&lt;BR /&gt;alert-interval 300&lt;BR /&gt;access-list PASS; 1 elements; name hash: 0x69403060&lt;BR /&gt;access-list PASS line 1 extended permit ip any any (hitcnt=22) 0x7e6cca6f&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 12:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967421#M1106321</guid>
      <dc:creator>Atif Masood</dc:creator>
      <dc:date>2023-11-28T12:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967483#M1106324</link>
      <description>&lt;P&gt;Ok' the server use fw as gw or svi of vlan in sw?&lt;/P&gt;
&lt;P&gt;The server must use fw as gw.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 14:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967483#M1106324</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-28T14:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA Static NAT Issue with Server not connected directly to A</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967891#M1106344</link>
      <description>&lt;P&gt;Yes, that was the issue - Its fixed after I changed GW to FW &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Nov 2023 03:16:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-static-nat-issue-with-server-not-connected-directly-to/m-p/4967891#M1106344</guid>
      <dc:creator>Atif Masood</dc:creator>
      <dc:date>2023-11-29T03:16:54Z</dc:date>
    </item>
  </channel>
</rss>

