<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source NAT - ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/source-nat-asa/m-p/3842543#M11417</link>
    <description>Hi,&lt;BR /&gt;Assuming you have no other NAT rule with a higher priority which could potentially nat the traffic behind the wan interface, the traffic from the 192.168.66.0/24 network should be natted with 10.44.0.1.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Mon, 22 Apr 2019 16:40:58 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-04-22T16:40:58Z</dc:date>
    <item>
      <title>Source NAT - ASA</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-asa/m-p/3842525#M11416</link>
      <description>&lt;P&gt;Looking at the below - (This could be any addressing and assume all ACLs are in place etc.. for the traffic flow)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;interface Gi0/1&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;nameif WAN&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;security-level 100&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;ip address 10.99.0.1 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;interface Gi0/1&lt;BR /&gt;nameif DMZ&lt;BR /&gt;security-level 50&lt;BR /&gt;ip address 192.168.66.1 255.255.255.0&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network OBJ_VENDOR&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;subnet 192.168.66.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network OBJ_HIDE&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;host 10.44.0.1&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;nat (dmz,wan) source static OBJ_VENDOR OBJ_HIDE no-proxy-arp&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I have the above NAT, when matching traffic leaves this Firewall, does it leave with a source address of the OBJ_HIDE (10.44.0.1) or does it leave the Firewall with the address of the WAN Interface IP (10.99.0.1) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:03:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-asa/m-p/3842525#M11416</guid>
      <dc:creator>GRANT3779</dc:creator>
      <dc:date>2020-02-21T17:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Source NAT - ASA</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-asa/m-p/3842543#M11417</link>
      <description>Hi,&lt;BR /&gt;Assuming you have no other NAT rule with a higher priority which could potentially nat the traffic behind the wan interface, the traffic from the 192.168.66.0/24 network should be natted with 10.44.0.1.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Mon, 22 Apr 2019 16:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-asa/m-p/3842543#M11417</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-04-22T16:40:58Z</dc:date>
    </item>
  </channel>
</rss>

