<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hello cofee. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971316#M144556</link>
    <description>&lt;P&gt;Hello cofee.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static AV service tcp 8014 8014&lt;/P&gt;
&lt;P&gt;in this above command will the outside server will communicate to the outside interface of firewall ip address. if so this is very similar to the command i wrote earlier,&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static interface service tcp 8014 8014&lt;/P&gt;</description>
    <pubDate>Wed, 30 Nov 2016 15:51:40 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2016-11-30T15:51:40Z</dc:date>
    <item>
      <title>identity nat help</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971304#M144539</link>
      <description>&lt;P&gt;hello.&lt;/P&gt;
&lt;P&gt;kindly please help&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;outside network address 192.168.95.233 (antivirus proxy server) need to get mapped with inside network (Anti virus server 10.7.2.250) here is my config.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV_Inside&lt;/P&gt;
&lt;P&gt;host 10.7.2.250&lt;/P&gt;
&lt;P&gt;object network AV_outside&lt;/P&gt;
&lt;P&gt;host 192.168.95.233&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static AV_Inside AV_outside destination static AV_outside AV_Inside&lt;/P&gt;
&lt;P&gt;access-list AV extended permit ip any object AV_inside&lt;/P&gt;
&lt;P&gt;access-group AV in interface outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;when i do packet trace either was inside or from outside&amp;nbsp; with above addresses everything is passing. however, on my ASDM logging&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i am getting these critical alerts&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;source ip: 192.168.95.10 &amp;nbsp; source port 64818&lt;/P&gt;
&lt;P&gt;destination 192.168.95.233&amp;nbsp; destination port 8014&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;description: Inbound TCP connection denied from 192.168.95.10/64818 to 192.168.95.233/8014 flags SYN on interface outside.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;kindly please advise what could be wrong.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:36:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971304#M144539</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-12T08:36:03Z</dc:date>
    </item>
    <item>
      <title>I am not sure if you are</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971305#M144540</link>
      <description>&lt;P&gt;I am not sure if you are trying to create a policy nat. But if you just want to create a static NAT from inside to outside.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is all you need:&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static AV_Inside AV_outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But if you want to create a policy nat for specific destination then nat syntax will be like this:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network destination_address&lt;/P&gt;
&lt;P&gt;host 1.2.3.4&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static AV_Inside AV_outside destination destination_address destination_address&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If this not what you need then let me know what exactly you are looking for.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 14:07:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971305#M144540</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T14:07:50Z</dc:date>
    </item>
    <item>
      <title>hello cofee,</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971306#M144541</link>
      <description>&lt;P&gt;hello cofee,&lt;/P&gt;
&lt;P&gt;i applied the first config and here is the out put.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside rawip 192.168.71.230 0 10.1$&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 10.178.5.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2be28320, priority=500, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x6, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=192.168.71.230, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here is from inside to outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;packet-tracer input inside rawip 10.178.5.250 0 192.168$&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 192.168.68.0&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.252.0&amp;nbsp;&amp;nbsp; outside&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static AV_Inside AV_outside&lt;BR /&gt;Additional Information:&lt;BR /&gt;Static translate 10.178.5.250/0 to 192.168.71.233/0&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2b6144d0, priority=6, domain=nat, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=2, user_data=0x7fff2c6e9c90, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.178.5.250, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2ac2f460, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=47606, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0x7fff2190e3b0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=46818, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static AV_Inside AV_outside&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2ac3fe90, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3, user_data=0x7fff2bf80ad0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=10.178.5.250, mask=255.255.255.255, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=inside, output_ifc=outside&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: USER-STATISTICS&lt;BR /&gt;Subtype: user-statistics&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;out id=0x7fff2c6eb690, priority=0, domain=user-statistics, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=23566, user_data=0x7fff2bae5890, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=outside&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (sp-security-failed) Slowpath security checks failed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here is the config&lt;/P&gt;
&lt;P&gt;object network AV_Inside&lt;BR /&gt;&amp;nbsp;host 10.178.5.250&lt;BR /&gt;object network AV_outside&lt;BR /&gt;&amp;nbsp;host 192.168.71.233&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static AV_Inside AV_outside&lt;/P&gt;
&lt;P&gt;access-list OUT extended permit ip any object AV_Inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 14:29:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971306#M144541</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-29T14:29:30Z</dc:date>
    </item>
    <item>
      <title>You haven't explained what</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971307#M144542</link>
      <description>&lt;P&gt;You haven't explained what you are trying to accomplish. Does this address 192.168.95.233 belong to anti-virus server that's connected to outside interface and you are trying to nat it to an ip address that's already being used by inside anti-virus 10.7.2.25?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There could be number of reasons for getting (sp-security-failed) Slowpath security checks failed:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Name: sp-security-failed&lt;/P&gt;
&lt;P&gt;Slowpath security checks failed:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This counter is incremented and packet is dropped when the security appliance is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) In routed mode receives a through-the-box:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - L2 broadcast packet&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with destination IP address equal to 0.0.0.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - IPv4 packet with source IP address equal to 0.0.0.0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) In routed or transparent mode and receives a through-the-box IPv4 packet with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - first octet of the source IP address equal to zero&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address equal to the loopback IP address&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of source IP address equal to all 0's&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - network part of the source IP address equal to all 1's&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - source IP address host part equal to all 0's or all 1's&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3) In routed or transparent mode and receives an IPv4 or IPv6 packet with same source &lt;BR /&gt;and destination IP addresses&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Recommendation:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1 and 2) Determine if an external user is trying to compromise the protected network. &lt;BR /&gt;Check for misconfigured clients.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3) If this message counter is incrementing rapidly, an attack may be in progress. Use &lt;BR /&gt;the packet capture feature to capture type asp packets, and check the source MAC address &lt;BR /&gt;in the packet to see where they are coming from.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 14:49:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971307#M144542</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T14:49:54Z</dc:date>
    </item>
    <item>
      <title>thank you for the quick reply</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971308#M144543</link>
      <description>&lt;P&gt;thank you for the quick reply. apologies for note explaining in detail what i want to setup.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;our antivirus ip address is 10.178.5.250 (this is inside network), where as other department X which we classified as outside network, they have a proxy antivirus (address 192.168.71.232) they (department X client) all connected to this address 192.168.71.232 for virus defination to update. now we need to get this proxy server 192.168.71.232 to get its updates from our internal antiversiu server address 10.178.5.250. and this is what i am creating rules for. plese let me know if this make sense to you.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 15:03:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971308#M144543</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-29T15:03:57Z</dc:date>
    </item>
    <item>
      <title>Thanks for the explanation.</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971309#M144544</link>
      <description>&lt;P&gt;Thanks for the explanation. Just to make it clear one more time so we are on the same page.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Inside anti-virus (inside local)&amp;nbsp;- 10.178.5.250&lt;/P&gt;
&lt;P&gt;Inside anti-virus (inside global) - 192.168.95.233&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outside anti-virus - 192.168.71.232 ( it needs to talk to 192.168.95.233/10.178.5.250&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You configuration appears to be fine that you sent earlier. Let's do it one more time.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV_Inside&lt;/P&gt;
&lt;P&gt;host 10.7.2.250&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV_outside&lt;/P&gt;
&lt;P&gt;host 192.168.95.233&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static AV_Inside AV_outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;access-list &lt;SPAN style="color: #ff6600;"&gt;name &lt;SPAN style="color: #000000;"&gt;extended permit&lt;/SPAN&gt; protocol &lt;SPAN style="color: #000000;"&gt;host 192.168.71.232 host 10.7.2.250 log&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;This should work as long as basic layer 3 reachability is there. Please look at the NAT order to see there is no conflict and your internal server is getting NATed to the configured address. Also look at the ACL order to make sure this ACL is not getting denied by some other ACL above it. Packet tracer should give you all that information.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;Also can you try to initiate the connection from the outside anti-virus server to the inside anti-virus and then check the logs&amp;nbsp;for any potential issues, also check the connection table and xlate table (sh xlate) to make sure internal server is getting nated to the right address.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;You also want to make sure that your outside anti-virus server is properly configured to talk to internal anti-virus server and vice versa. Should also check for any policy on both servers that would prevent them from talking to each other and pull files.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff6600;"&gt;&lt;SPAN style="color: #000000;"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 15:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971309#M144544</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T15:30:14Z</dc:date>
    </item>
    <item>
      <title>Hello Cofee,</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971310#M144545</link>
      <description>&lt;P&gt;Hello Cofee,&lt;/P&gt;
&lt;P&gt;apologies for making mess up as in my second post i put the original ip addresses.&lt;/P&gt;
&lt;P&gt;so let me clear this so we are on one page.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Inside anti-virus (inside interface)&amp;nbsp;- 10.178.5.250&lt;/P&gt;
&lt;P&gt;outside anti-virus (outside interface) - 192.168.71.232&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outside anti-virus - 192.168.71.232 ( it needs to talk to 10.178.5.250)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i apologise again as i hide the ip address now i put everything as real. also just to let you know the asa version is 9.x&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 15:34:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971310#M144545</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-29T15:34:35Z</dc:date>
    </item>
    <item>
      <title>That's fine. Just choose any</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971311#M144546</link>
      <description>&lt;P&gt;That's fine. Just choose any available address (that's not assigned to any device) on the outside network and use that to nat your inside anti-virus server .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 15:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971311#M144546</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T15:42:12Z</dc:date>
    </item>
    <item>
      <title>hello cofee,</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971312#M144548</link>
      <description>&lt;P&gt;hello cofee,&lt;/P&gt;
&lt;P&gt;i ended up with a different nat rule.&lt;/P&gt;
&lt;P&gt;as my outside firewall interface ip address is 192.168.71.254 and the requirement was&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Inside anti-virus (inside interface)&amp;nbsp;- 10.178.5.250&lt;/P&gt;
&lt;P&gt;outside anti-virus (outside interface) - 192.168.71.232&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outside anti-virus - 192.168.71.232 ( it needs to talk to 10.178.5.250)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.178.5.250&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static interface server tcp 8014 8014&lt;/P&gt;
&lt;P&gt;access-list AV extended permit tcp any object AV eq 8014&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;this above config worked without using a spare outside address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 21:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971312#M144548</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-29T21:17:11Z</dc:date>
    </item>
    <item>
      <title>Good to know. There are</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971313#M144551</link>
      <description>&lt;P&gt;Good to know. There are different ways to implement NAT . For example identity NAT can also be used which doesn't take up any extra address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for letting me know.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Nov 2016 22:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971313#M144551</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-29T22:08:20Z</dc:date>
    </item>
    <item>
      <title>Hi Cofee,</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971314#M144553</link>
      <description>&lt;P&gt;Hi Cofee,&lt;/P&gt;
&lt;P&gt;could you kindly explain how i can implement identity NAT in this scenario please.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Inside anti-virus (inside server)&amp;nbsp;- 10.178.5.250&lt;/P&gt;
&lt;P&gt;outside anti-virus (outside server) - 192.168.71.232&lt;/P&gt;
&lt;P&gt;my firewall outside interface ip address 192.168.71.254 (For Example)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outside anti-virus - 192.168.71.232 ( it needs to talk to 10.178.5.250)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.178.5.250&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static interface server tcp 8014 8014&lt;/P&gt;
&lt;P&gt;access-list AV extended permit tcp any object AV eq 8014&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;by giving the above command in asa. from outside the antivirus server which is acting as proxy when i go into this proxy antivirus and initiate telnet with ip address in it 192.168.71.254 (which is my outside firewall interface address) with port 8014 this address mapped with inside server 10.178.5.250 and connection opened.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 08:44:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971314#M144553</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-30T08:44:05Z</dc:date>
    </item>
    <item>
      <title>Identity NAT:</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971315#M144555</link>
      <description>&lt;P&gt;Identity NAT:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network AV&lt;/P&gt;
&lt;P&gt;host 10.178.5.250&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static AV service tcp 8014 8014&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;you won't have to do anything with the acl.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please let me know if this answers your question.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 15:24:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971315#M144555</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-30T15:24:08Z</dc:date>
    </item>
    <item>
      <title>Hello cofee.</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971316#M144556</link>
      <description>&lt;P&gt;Hello cofee.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static AV service tcp 8014 8014&lt;/P&gt;
&lt;P&gt;in this above command will the outside server will communicate to the outside interface of firewall ip address. if so this is very similar to the command i wrote earlier,&lt;/P&gt;
&lt;P&gt;nat (inside,outside) static interface service tcp 8014 8014&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 15:51:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971316#M144556</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-11-30T15:51:40Z</dc:date>
    </item>
    <item>
      <title>*  With this identity NAT</title>
      <link>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971317#M144558</link>
      <description>&lt;P&gt;*&amp;nbsp; With this identity NAT outside server will communicate directly to the real IP and not the outside address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;* The one that you configured you are NATing 10.178.5.250 to the IP address of outside interface of firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if this makes sense.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2016 16:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/identity-nat-help/m-p/2971317#M144558</guid>
      <dc:creator>cofee</dc:creator>
      <dc:date>2016-11-30T16:22:07Z</dc:date>
    </item>
  </channel>
</rss>

