<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I still don't understand this in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016643#M146960</link>
    <description>&lt;P&gt;I still don't understand this, weren't both NAT's static?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (Lab_13_LAN,inside_11_infrastructure) static interface service tcp 3389 3389 (&lt;STRONG&gt;&lt;SPAN style="color: #ff0000;"&gt;not working&lt;/SPAN&gt;&lt;/STRONG&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (Lab_13_LAN,inside_11_infrastructure) static x.x.x.251 service tcp 3389 3389 (&lt;SPAN style="color: #00ff00;"&gt;&lt;STRONG&gt;working&lt;/STRONG&gt;&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In terms of logging, I was using 'debugging' mode from ASDM, so I would've expected it to show up.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Feb 2017 08:10:23 GMT</pubDate>
    <dc:creator>Gregor Blaj</dc:creator>
    <dc:date>2017-02-03T08:10:23Z</dc:date>
    <item>
      <title>ASA - NAT Help</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016634#M146915</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;Hi,&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;I can’t seem to get the below to work, so hopefully someone can help. The ASA has 4 live interfaces as below.&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;1. Outside (security 0)&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;2. Inside (one sub interface, security 100)&lt;/P&gt;
&lt;P class="p1"&gt;- inside_11_infrastructure&lt;/P&gt;
&lt;P class="p1"&gt;- - PAT’d to the outside interface (works)&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;3. Lab (with 2 sub interfaces, security 90 and security 80).&lt;/P&gt;
&lt;P class="p1"&gt;- Lab_13_LAN&lt;/P&gt;
&lt;P class="p1"&gt;- - PAT’d to the outside interface (works)&lt;/P&gt;
&lt;P class="p1"&gt;- Lab_14_DMZ&lt;/P&gt;
&lt;P class="p1"&gt;- - PAT’d to the outside interface (works)&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;The Lab interfaces are routable between each other, and this works correctly. The Lab subnets are not routable from the ‘inside’ network but I want RDP (3389) NAT’d to one of the inside hosts, and this is where something isn’t quite working. NAT and ACL config below, but please let me know if you need any more info.&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;NAT&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (outside,inside_11_infrastructure) source dynamic ANYCONNECT_VPN_SUBNET interface&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (inside_11_infrastructure,outside) source dynamic CC_11 interface&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (Lab_13_LAN,outside) source dynamic LAN_13 interface&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (Lab_14_DMZ,outside) source dynamic DMZ_14 interface&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (Lab_13_LAN,inside_11_infrastructure) source dynamic LAN_13 interface &lt;EM&gt;# added as a test&lt;/EM&gt;&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (Lab_14_DMZ,inside_11_infrastructure) source dynamic DMZ_14 interface &lt;EM&gt;# added as a test&lt;/EM&gt;&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;!&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;&lt;EM&gt;… # few other static NATs&lt;/EM&gt;&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;object network LAB_ManagementPC&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;nat (Lab_13_LAN,inside_11_infrastructure) static interface service tcp 3389 3389&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;Access Lists&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;…&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list DMZ_14_out extended permit tcp object DMZ_14 object LAN_13 eq https&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list DMZ_14_out extended permit udp object DMZ_14 object LAN_13 eq domain&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list DMZ_14_out extended permit udp object DMZ_14 object LAN_13 eq ntp&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list DMZ_14_out extended permit icmp object DMZ_14 any&lt;/P&gt;
&lt;P class="p2" style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit tcp object LAN_13 any eq https&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit tcp object LAN_13 any eq www&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit tcp object LAN_13 any eq ssh&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit udp object LAN_13 any eq domain&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit udp object LAN_13 any eq ntp&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-list LAN_13_out extended permit icmp object LAN_13 any&lt;/P&gt;
&lt;P class="p2" style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-group inbound in interface outside&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-group LAN_13_out in interface Lab_13_LAN&lt;/P&gt;
&lt;P class="p1" style="padding-left: 30px;"&gt;access-group DMZ_14_out in interface Lab_14_DMZ&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p2"&gt;When I do a capture, while doing 'telnet ASA_inside_IP 3389', nothing comes up in the log.&lt;/P&gt;
&lt;P class="p2"&gt;&lt;/P&gt;
&lt;P class="p1"&gt;Any help appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016634#M146915</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2019-03-12T08:52:39Z</dc:date>
    </item>
    <item>
      <title>To be clear, you are saying</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016635#M146919</link>
      <description>&lt;P&gt;To be clear, you are saying their is no routable path from the inside network to the lab networks? &amp;nbsp;Can you change this?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 19:43:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016635#M146919</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2017-02-02T19:43:39Z</dc:date>
    </item>
    <item>
      <title>Where is the ACL for the</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016636#M146926</link>
      <description>&lt;P&gt;Where is the ACL for the&amp;nbsp;&lt;SPAN&gt;inside_11_infrastructure interface?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You are using the interface IP which is already in use on the ASA and is most probably the default gateway for the&amp;nbsp;inside_11_infrastructure network. &amp;nbsp;For proxy ARP to work you need to configure NAT to an IP that is not in use and will not be used on the&amp;nbsp;inside_11_infrastructure network, so that only the ASA will answer ARP requests.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 20:05:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016636#M146926</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-02T20:05:42Z</dc:date>
    </item>
    <item>
      <title>Correct. I tried adding a</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016637#M146931</link>
      <description>&lt;P&gt;Correct. I tried adding a static route to one host but it still doesn't work. I can then&amp;nbsp;ping&amp;nbsp;this host from the lab network which verifies the PAT working.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 20:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016637#M146931</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-02T20:38:06Z</dc:date>
    </item>
    <item>
      <title>I had an any to any ACL in</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016638#M146935</link>
      <description>&lt;P&gt;I had an any to any ACL in&amp;nbsp;there as a test but it still didn't work. Anyway, the security levels of the interfaces should allow this traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Its the default gateway for some devices, only a handful.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you suggest I add a second IP to the inside_11_infrastructure interface? How do I then reference this second IP in the NAT statement?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 21:00:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016638#M146935</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-02T21:00:24Z</dc:date>
    </item>
    <item>
      <title>you don't add an IP to the</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016639#M146941</link>
      <description>&lt;P&gt;you don't add an IP to the interface. &amp;nbsp;You just change the static NAT rule to translate to another IP on the same subnet as the&amp;nbsp;&lt;SPAN&gt;inside_11_infrastructure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Also run a packet tracer to see where it is stopping up.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;packet-tracer input&amp;nbsp;inside_11_infrastructure tcp &amp;lt;source IP&amp;gt; 12345 &amp;lt;destination IP&amp;gt; 3389&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;--&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please remember to select a correct answer and rate helpful posts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 21:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016639#M146941</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-02T21:19:12Z</dc:date>
    </item>
    <item>
      <title>Alright, I'll give that a go</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016640#M146948</link>
      <description>&lt;P dir="ltr"&gt;Alright, I'll give that a go and post back.&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;The packet trace was failing at an implicit ACL, that's when I tried adding the permit any to 11_infrastructure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 21:44:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016640#M146948</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-02T21:44:02Z</dc:date>
    </item>
    <item>
      <title>That works, config below. Can</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016641#M146952</link>
      <description>&lt;P&gt;That works, config below. Can you explain to me why I can't use the ASA's interface IP?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, why wasn't I able to capture traffic for port 3389 on the ASA with the previous config? It was as if the traffic wasn't getting there at all, probably related to the first question &lt;span class="lia-unicode-emoji" title=":neutral_face:"&gt;😐&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;nat (Lab_13_LAN,inside_11_infrastructure) static x.x.x.251 service tcp 3389 3389&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks so much Marius, much appreciated!&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 22:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016641#M146952</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-02T22:10:04Z</dc:date>
    </item>
    <item>
      <title>Well, theoretically you could</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016642#M146956</link>
      <description>&lt;P&gt;Well, theoretically you could use the interface, but I like to keep things seperate as I feel it will be easier to troubleshoot. &amp;nbsp;The problem you had was that you had a dynamic NAT which is unidirectional, while static NAT is by directional. &amp;nbsp;You didn't see anything in your capture because traffic is dropped before the capture is taken. &amp;nbsp;You would however have seen it in the logs if you had the logging level set to informational or lower.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 02 Feb 2017 22:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016642#M146956</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-02T22:34:00Z</dc:date>
    </item>
    <item>
      <title>I still don't understand this</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016643#M146960</link>
      <description>&lt;P&gt;I still don't understand this, weren't both NAT's static?&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (Lab_13_LAN,inside_11_infrastructure) static interface service tcp 3389 3389 (&lt;STRONG&gt;&lt;SPAN style="color: #ff0000;"&gt;not working&lt;/SPAN&gt;&lt;/STRONG&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (Lab_13_LAN,inside_11_infrastructure) static x.x.x.251 service tcp 3389 3389 (&lt;SPAN style="color: #00ff00;"&gt;&lt;STRONG&gt;working&lt;/STRONG&gt;&lt;/SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In terms of logging, I was using 'debugging' mode from ASDM, so I would've expected it to show up.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 08:10:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016643#M146960</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-03T08:10:23Z</dc:date>
    </item>
    <item>
      <title>I am not entirely sure why it</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016644#M146964</link>
      <description>&lt;P&gt;I am not entirely sure why it did not work. I would need to set this up in a lab to test it, and not sure when I will be able to do that.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 08:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016644#M146964</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-03T08:40:09Z</dc:date>
    </item>
    <item>
      <title>No problem, thanks again for</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016645#M146969</link>
      <description>&lt;P&gt;No problem, thanks again for your help. I'm happy knowing I didn't do anything obvious wrong &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Feb 2017 10:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help/m-p/3016645#M146969</guid>
      <dc:creator>Gregor Blaj</dc:creator>
      <dc:date>2017-02-03T10:15:50Z</dc:date>
    </item>
  </channel>
</rss>

