<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT config in old ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230338#M1117864</link>
    <description>&lt;P&gt;Many Thanks Miranda You are the best.!&lt;/P&gt;</description>
    <pubDate>Fri, 29 Nov 2024 02:16:37 GMT</pubDate>
    <dc:creator>mahesh1818</dc:creator>
    <dc:date>2024-11-29T02:16:37Z</dc:date>
    <item>
      <title>NAT config in old ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230264#M1117859</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to Migrate Cisco ASA to Firepower.&lt;/P&gt;&lt;P&gt;Below is NAT config on ASA&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 172.16.0.0 255.240.0.0&lt;BR /&gt;nat (inside) 0 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;Seems Global is for traffic going from inside to outside and getting PAT to Outside Interface I address right?&lt;/P&gt;&lt;P&gt;And nat inside 0 says that if source is 10.x.x.x then no NAT right?&lt;/P&gt;&lt;P&gt;so which NAT config takes preference?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 22:52:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230264#M1117859</guid>
      <dc:creator>mahesh1818</dc:creator>
      <dc:date>2024-11-28T22:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: NAT config in old ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230270#M1117860</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1818003"&gt;@mahesh1818&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Seems Global is for traffic going from inside to outside and getting PAT to Outside Interface I address right?"&lt;/P&gt;
&lt;P&gt;Yes.&lt;/P&gt;
&lt;P&gt;"And nat inside 0 says that if source is 10.x.x.x then no NAT right?"&lt;/P&gt;
&lt;P&gt;Yes.&lt;/P&gt;
&lt;P&gt;"so which NAT config takes preference?"&lt;/P&gt;
&lt;P&gt;Exemption comes first.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/asdm71/firewall/asdm_71_firewall_config/nat_82.html#19135" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa91/asdm71/firewall/asdm_71_firewall_config/nat_82.html#19135&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 class="p_H_Head2"&gt;Order of NAT Rules &lt;A name="marker-1055524" target="_blank"&gt;&lt;/A&gt;Used to Match Real Addresses&lt;/H3&gt;
&lt;P class="pB1_Body1"&gt;&lt;A name="pgfId-1055529" target="_blank"&gt;&lt;/A&gt;The ASA matches real addresses to NAT rules in the following order:&lt;/P&gt;
&lt;P class="pNF_NumFirst"&gt;&lt;A name="pgfId-1055530" target="_blank"&gt;&lt;/A&gt; 1. NAT exemption—In order, until the first match.&lt;/P&gt;
&lt;P class="pNN_NumNext"&gt;&lt;A name="pgfId-1055531" target="_blank"&gt;&lt;/A&gt; 2. Static NAT and Static PAT (regular and policy)—In order, until the first match. Static identity NAT is included in this category.&lt;/P&gt;
&lt;P class="pNN_NumNext"&gt;&lt;A name="pgfId-1055532" target="_blank"&gt;&lt;/A&gt; 3. Policy dynamic NAT—In order, until the first match. Overlapping addresses are allowed.&lt;/P&gt;
&lt;P class="pNN_NumNext"&gt;&lt;A name="pgfId-1055533" target="_blank"&gt;&lt;/A&gt; 4. Regular dynamic NAT—Best match. Regular identity NAT is included in this category. The order of the NAT rules does not matter; the NAT rule that best matches the real address is used. For example, you can create a general rule to translate all addresses (0.0.0.0) on an interface. If you want to translate a subset of your network (10.1.1.1) to a different address, then you can create a rule to translate only 10.1.1.1. When 10.1.1.1 makes a connection, the specific rule for 10.1.1.1 is used because it matches the real address best. We do not recommend using overlapping rules; they use more memory and can slow the performance of the ASA.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2024 23:21:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230270#M1117860</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-11-28T23:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT config in old ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230301#M1117861</link>
      <description>&lt;P&gt;Thanks for the reply&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, NAT inside 0 are exempt in our case and then Static NAT comes got that.&lt;/P&gt;&lt;P&gt;After that comes dynamic PAT which is statement global in our case?&lt;/P&gt;&lt;P&gt;if we have static nat say&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.76.28.93 10.76.28.93 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;does this NAT policy will get hit? as per my understanding exempt policy for No NAT will take precedence over this&amp;nbsp;&lt;/P&gt;&lt;P&gt;On NAT stats i see&lt;/P&gt;&lt;P&gt;translate_hits = 0, untranslate_hits = 90&amp;nbsp; so above static NAT statement is hitting the NAT rule right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 00:09:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230301#M1117861</guid>
      <dc:creator>mahesh1818</dc:creator>
      <dc:date>2024-11-29T00:09:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT config in old ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230319#M1117862</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"translate_hits = 0, untranslate_hits = 90 so above static NAT statement is hitting the NAT rule right?"&lt;/P&gt;
&lt;P&gt;I only see hit on the untranslate counter, which is exempt. If the static NAT got hit, we should see the counter for translate increase,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 00:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230319#M1117862</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2024-11-29T00:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT config in old ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230338#M1117864</link>
      <description>&lt;P&gt;Many Thanks Miranda You are the best.!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Nov 2024 02:16:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-config-in-old-asa/m-p/5230338#M1117864</guid>
      <dc:creator>mahesh1818</dc:creator>
      <dc:date>2024-11-29T02:16:37Z</dc:date>
    </item>
  </channel>
</rss>

