<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 7.2 - override Nat0 for single IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3828132#M11542</link>
    <description>&lt;P&gt;I have inherited a very old and very ugly ASA firewall policy.&amp;nbsp; I'm more of a Checkpoint firewall engineer but do have some basic Cisco knowledge and have been muddling through on the CLI as best I can until we can get this site to our corporate standards.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;That said, we have recently deployed a proxy server/content filter for internet browsing and due to the positioning of this, we have had to implement a rather large nat0 ACL so that browser traffic gets sent (via WCCP managed on the internet router, one step beyond the ASA outbound), it is not NAT'd.&amp;nbsp; While this works fine in most cases, its obviously problematic in a few situations (such as any service other than http/https still needing a public NAT for traversing the internet.&amp;nbsp; Currently this is handled via overload addresses on the Internet router).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My critical/immediate issue right now is that I've got an entry in the nat0 ACL for a /24 internal network, but I need to essentially override that for a single IP within that /24 network range so that this one particular source IP gets a specific public NAT when traversing the internet.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I guess what I'm looking for is some kind of ACL I can write for a specific host which would be 'more specific' and therefore take precedent over the nat0 ACL for the /24 network?&amp;nbsp; Or does the nat0 ACL 'trump all other ACLs' ?&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help is appreciated.&amp;nbsp; Note that upgrading this ASA code is kind of out of the question at this time.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:59:31 GMT</pubDate>
    <dc:creator>shuem@trinity-health.org</dc:creator>
    <dc:date>2020-02-21T16:59:31Z</dc:date>
    <item>
      <title>ASA 7.2 - override Nat0 for single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3828132#M11542</link>
      <description>&lt;P&gt;I have inherited a very old and very ugly ASA firewall policy.&amp;nbsp; I'm more of a Checkpoint firewall engineer but do have some basic Cisco knowledge and have been muddling through on the CLI as best I can until we can get this site to our corporate standards.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;That said, we have recently deployed a proxy server/content filter for internet browsing and due to the positioning of this, we have had to implement a rather large nat0 ACL so that browser traffic gets sent (via WCCP managed on the internet router, one step beyond the ASA outbound), it is not NAT'd.&amp;nbsp; While this works fine in most cases, its obviously problematic in a few situations (such as any service other than http/https still needing a public NAT for traversing the internet.&amp;nbsp; Currently this is handled via overload addresses on the Internet router).&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;My critical/immediate issue right now is that I've got an entry in the nat0 ACL for a /24 internal network, but I need to essentially override that for a single IP within that /24 network range so that this one particular source IP gets a specific public NAT when traversing the internet.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I guess what I'm looking for is some kind of ACL I can write for a specific host which would be 'more specific' and therefore take precedent over the nat0 ACL for the /24 network?&amp;nbsp; Or does the nat0 ACL 'trump all other ACLs' ?&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Any help is appreciated.&amp;nbsp; Note that upgrading this ASA code is kind of out of the question at this time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:59:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3828132#M11542</guid>
      <dc:creator>shuem@trinity-health.org</dc:creator>
      <dc:date>2020-02-21T16:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 7.2 - override Nat0 for single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3828411#M11544</link>
      <description>&lt;P&gt;Just an update - I have found the answer for this particular need.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;A 'deny' statement for the host IP above the 'permit' statement for the network excludes that one host from nat exclusion and therefore invokes the static NAT for that host.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;None of this is ideal, obviously, but its what I've got to work with for now.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 18:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3828411#M11544</guid>
      <dc:creator>shuem@trinity-health.org</dc:creator>
      <dc:date>2019-03-28T18:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 7.2 - override Nat0 for single IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3829087#M11546</link>
      <description>&lt;P&gt;Hey Shuem,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is correct. The easiest way to bypass the NAT Exemption (NAT 0) for a single host when using network like that is to put a deny statement for the single host in the network that should still NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also recommend upgrading that code version when/if you get the chance.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 19:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-7-2-override-nat0-for-single-ip/m-p/3829087#M11546</guid>
      <dc:creator>John-Finnegan</dc:creator>
      <dc:date>2019-03-29T19:26:00Z</dc:date>
    </item>
  </channel>
</rss>

