<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Routing issue with dst nat - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5013029#M1108812</link>
    <description>&lt;P&gt;Thank you all, especially &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;, for your time and sharing your knowledge. I finally got it. I also have to nat the source to make the difference as to which egress interface and crypto map to use.&lt;/P&gt;</description>
    <pubDate>Mon, 05 Feb 2024 15:22:58 GMT</pubDate>
    <dc:creator>a.maldonado</dc:creator>
    <dc:date>2024-02-05T15:22:58Z</dc:date>
    <item>
      <title>Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003804#M1108309</link>
      <description>&lt;P&gt;Hello! and I hope someone can help me.&lt;/P&gt;&lt;P&gt;As part of delivering a service to our customers I had the need to nat their destination (as well as our source). However, two different customers wanted me to nat their end and later noticed they use a similar IP subnet. The only difference being in the length of the mask. Then, when I troubleshooted one of them I discovered the two entries in the routing table of the firewall (see below). Note: The root cause of the problem turned out to be something else and not these duplicated routes.&lt;/P&gt;&lt;P&gt;This is not a problem at present because the subnets are different and the hosts within those subnets are different. However, I wonder what would have happened if both had wanted me to send packets to the same real IP. Let’s say 192.168.100.2, which is within both IP prefixes.&lt;/P&gt;&lt;P&gt;Cisco_ASA# sh route | i 192.168.100.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;V&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;V&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.100.0 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;Could someone tell me how I solve this issue, if there is a solution? Please see Phase 2 configuration of their &amp;nbsp;VPNs attached.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Other info:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.16(2)&lt;/P&gt;&lt;P&gt;SSP Operating System Version 2.10(1.162)&lt;/P&gt;&lt;P&gt;Device Manager Version 7.16(1)150&lt;/P&gt;&lt;P&gt;Hardware:&amp;nbsp;&amp;nbsp; ASA5516, 8192 MB RAM, CPU Atom C2000 series 2416 MHz, 1 CPU (8 cores)&lt;/P&gt;&lt;P&gt;Internal ATA Compact Flash, 8000MB&lt;/P&gt;&lt;P&gt;BIOS Flash M25P64 @ 0xfed01000, 16384KB&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 17:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003804#M1108309</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-01-23T17:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003872#M1108310</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This can help you&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 17:29:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003872#M1108310</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-23T17:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003953#M1108317</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt; those "V" static routes are in the routing table because reverse route injection (RRI) configured under the crypto map sequences. You can remove them using the following:&lt;/P&gt;
&lt;PRE&gt;no crypto map OUTSIDE_map 163 set reverse-route&lt;BR /&gt;no crypto map OUTSIDE_map 158 set reverse-route&lt;/PRE&gt;
&lt;P&gt;You would also need to use Twice NAT to workaround the overlap.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2024 19:56:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5003953#M1108317</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-23T19:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004772#M1108368</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp; and thank you for your post.&lt;/P&gt;&lt;P&gt;If I remove the reverse route command, how does the FW know that the packet destined to the nated address 1&lt;SPAN&gt;92.168.100.2 is destined for the customer using crypto map 163? If both customers were using the same /24 range and the same real server address&amp;nbsp;192.168.100.2. Do you know?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regarding twice nat, I am already doing that and just by luck the source of the services is different for each customer so I that is why there are no conflicts but one of those services use the same source address for all customers and there could be a problem if I ever have two customers using the same real IP range and both happen to use the same address for the server.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 17:53:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004772#M1108368</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-01-24T17:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004777#M1108369</link>
      <description>&lt;P&gt;I run lab year ago and it work.&lt;/P&gt;
&lt;P&gt;Can I see twice NAT you use ?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 17:57:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004777#M1108369</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T17:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004781#M1108370</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt; those V routes are used to redistribute via a routing protocol so connected devices learn the route is via the VPN, it is optional not a requirement (it depends on your environment). As long as the traffic is routed to the ASA, the ASA will check the crypto ACL and determine whether the traffic should be encrypted and route it via the correct tunnel.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 17:59:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004781#M1108370</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-24T17:59:46Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004787#M1108371</link>
      <description>&lt;P&gt;If you do twice NAT correctly then last steps is&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remove RRI from VPN&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Config static route for MAPPED IP not real IP toward the internet your use for vpn and NAT.&lt;/P&gt;
&lt;P&gt;Note- one more point you need to use mapped IP in acl of VPN not real IP&lt;/P&gt;
&lt;P&gt;That it'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am sure it will work&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 19:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004787#M1108371</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-24T19:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004815#M1108373</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt;, &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; is absolutely right. It's ok that real addresses of two remote subnets overlap so long as your traffic is routed to the correct egress interface where crypto map lives. The only requirement in this case is to NAT your local subnets in a unique way for each of those tunnels, because crypto ACLs must not overlap. This is just to clarify a bit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 19:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5004815#M1108373</guid>
      <dc:creator>tvotna</dc:creator>
      <dc:date>2024-01-24T19:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005861#M1108414</link>
      <description>&lt;P&gt;Please see the nat statements that I am using for each customer:&lt;/P&gt;&lt;P&gt;This is for&amp;nbsp;customer 1 crypto map 163&lt;/P&gt;&lt;P&gt;nat (any,OUTSIDE) source dynamic COMPANY_NET-GROUP-A NAT_COMPANY_HOST-X.X.X.201 destination static CUSTOMER_1_HOST-10.241.242.9 CUSTOMER_1_REAL_HOST-192.168.100.2&lt;/P&gt;&lt;P&gt;This is for&amp;nbsp;customer 2 crypto map 158&lt;/P&gt;&lt;P&gt;nat (any,OUTSIDE) source static HOST1_172.16.252.10 NAT_HOST1-CUSTOMER_2_HOST-10.239.93.137 destination static CUSTOMER_2_HOST-10.240.209.25 CUSTOMER_2_REAL_HOST-192.168.100.30&lt;BR /&gt;nat (any,OUTSIDE) source static HOST2_172.16.252.20 NAT_HOST2-CUSTOMER_2_HOST-10.239.93.138 destination static CUSTOMER_2_HOST-10.240.209.25 CUSTOMER_2_REAL_HOST-192.168.100.30&lt;BR /&gt;nat (any,OUTSIDE) source static SERVER-NET_GROUP NAT_POLLING-CUSTOMER_2_HOST-10.239.93.139 destination static CUSTOMER_2_HOST-10.240.209.25 CUSTOMER_2_REAL_HOST-192.168.100.30&lt;BR /&gt;nat (any,OUTSIDE) source dynamic MANAGEMENT-NET_GROUP NAT_GNUKA_MGSrv-CUSTOMER_2_HOST-10.239.93.140 destination static CUSTOMER_2_HOST-10.240.209.25 CUSTOMER_2_REAL_HOST-192.168.100.30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 18:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005861#M1108414</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-01-25T18:57:15Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005887#M1108417</link>
      <description>&lt;P&gt;Hi, thank you for your comments. The problem is the customers can't or do not want to nat their end. Hence, they use their real IP subnet for their crypto ACL and I have to do the same on my crypto ACL.&lt;/P&gt;&lt;P&gt;I can and will remove the RRI from the crypto maps&lt;/P&gt;&lt;P&gt;I already configure the static routes for the mapped addresses pointing to the ISP:&lt;/P&gt;&lt;P&gt;route OUTSIDE 10.241.242.8 255.255.255.248 ISP1 1&lt;/P&gt;&lt;P&gt;route OUTSIDE 10.240.209.24 255.255.255.248 ISP1 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 19:40:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005887#M1108417</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-01-25T19:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005890#M1108418</link>
      <description>&lt;P&gt;Excellent Rob, thank you. I understood the explanation regarding the V in the routing table.&lt;/P&gt;&lt;P&gt;But what I am concerned is that I could potentially have 2 customers with the same crypto ACL as per below. In this case how does the firewall knows what is the correct tunnel?&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_cryptomap_163 extended permit ip object-group CRYPTO_COMPANY_NET-GROUP-A object-group CRYPTO_CUSTOMER_1_NET-GROUP-A&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_cryptomap_158 extended permit ip object-group CRYPTO_COMPANY_NET-GROUP-A object-group CRYPTO_CUSTOMER_2_NET-GROUP-A&lt;/P&gt;&lt;P&gt;where&amp;nbsp;CRYPTO_CUSTOMER_1_NET-GROUP-A and&amp;nbsp;CRYPTO_CUSTOMER_2_NET-GROUP-A will have the same 192.168.100.0 as part of the group because this is their interesting traffic (real subnet the customers are using because they don't want or they can't nat it). In this case, how does the firewall knows what crypto map the signal is for? if the source (CRYPTO_COMPANY_NET-GROUP-A) is exactly the same for both customers.&lt;/P&gt;&lt;P&gt;My nat statements for the two different customers abobe will look like this:&lt;/P&gt;&lt;P&gt;This is for customer 1 crypto map 163&lt;BR /&gt;nat (any,OUTSIDE) source dynamic COMPANY_NET-GROUP-A NAT_COMPANY_HOST-X.X.X.201 destination static CUSTOMER_1_HOST-10.241.242.9 CUSTOMER_1_REAL_HOST-192.168.100.2&lt;/P&gt;&lt;P&gt;This is for customer 2 crypto map 158&lt;BR /&gt;nat (any,OUTSIDE) source dynamic COMPANY_NET-GROUP-A NAT_COMPANY_HOST-X.X.X.201 destination static CUSTOMER_2_HOST-10.240.209.25 CUSTOMER_2_REAL_HOST-192.168.100.2&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The only thing that ties the nat statement to the crypto map would be the nated destination (because 192.168.100.0 it is in the crypto ACL of both customers) so how does the ASA know what cryptomap to use?&lt;BR /&gt;I hope I am explaining myslef and also I wonder if I am doing this right? I thought I was until I saw the&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 19:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005890#M1108418</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-01-25T19:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005895#M1108419</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/177536"&gt;@a.maldonado&lt;/a&gt; perform NAT on your side, refer to the &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/211275-Configuration-Example-of-ASA-VPN-with-Ov.html#anc24" target="_self"&gt;example&lt;/A&gt; to avoid the overlap.&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static LOCAL LOCAL-XLATE-SPOKE1 destination static REMOTE-XLATE-SPOKE1 SPOKES-NETWORK&lt;BR /&gt;nat (inside,outside) source static LOCAL LOCAL-XLATE-SPOKE2 destination static REMOTE-XLATE-SPOKE2 SPOKES-NETWORK&lt;/P&gt;
&lt;P&gt;Configure the crypto ACL with the translated subnets&lt;/P&gt;
&lt;P&gt;access-list VPN-to-SPOKE1 extended permit ip object LOCAL-XLATE-SPOKE1 object SPOKES-NETWORKS&lt;BR /&gt;access-list VPN-to-SPOKE2 extended permit ip object LOCAL-XLATE-SPOKE2 object SPOKES-NETWORKS&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 19:53:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005895#M1108419</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-01-25T19:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005901#M1108420</link>
      <description>&lt;P&gt;The conflict is between two sites noy between you and other sites&lt;/P&gt;
&lt;P&gt;Now&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NAT(inside'outside) static source&amp;nbsp; local-lan local-lan destiantion remote-real remote-mapped&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Acl will be&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ip access-extende 100 permit local-lan remote-mapped&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note:- this step need mandatory adjust the acl in peer&lt;/P&gt;
&lt;P&gt;Route outside remote-mapped &amp;lt;next hop&amp;gt;&lt;/P&gt;
&lt;P&gt;This must be done for only one site other no need&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2024 20:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5005901#M1108420</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-01-25T20:19:28Z</dc:date>
    </item>
    <item>
      <title>Re: Routing issue with dst nat - ASA</title>
      <link>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5013029#M1108812</link>
      <description>&lt;P&gt;Thank you all, especially &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;, for your time and sharing your knowledge. I finally got it. I also have to nat the source to make the difference as to which egress interface and crypto map to use.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 15:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routing-issue-with-dst-nat-asa/m-p/5013029#M1108812</guid>
      <dc:creator>a.maldonado</dc:creator>
      <dc:date>2024-02-05T15:22:58Z</dc:date>
    </item>
  </channel>
</rss>

