<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic interface GigabitEthernet1/1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951128#M148085</link>
    <description>&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address X.X.X.X 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif BackhaultoMGMTNetworks&lt;BR /&gt;&amp;nbsp;security-level 99&lt;BR /&gt;&amp;nbsp;ip address 10.254.0.34 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;object network VeeamWANReplicationTarget&lt;BR /&gt;&amp;nbsp;host 10.140.50.17&lt;BR /&gt;&lt;BR /&gt;object network VeeamGateway01&lt;BR /&gt;&amp;nbsp;host 10.140.50.17&lt;BR /&gt;&lt;BR /&gt;object service VeaamReplication&lt;BR /&gt;&amp;nbsp;service tcp destination eq 6180 &lt;BR /&gt;&lt;BR /&gt;object-group service VeeamReplicationServices&lt;BR /&gt;&amp;nbsp;service-object object VeaamReplication &lt;BR /&gt;&lt;BR /&gt;nat (BackhaultoMGMTNetworks,outside) source static VeeamWANReplicationTarget VeeamReplicationExternalIP description NAT rule for Veeam Replication&lt;BR /&gt;&lt;BR /&gt;access-group Outside in interface outside&lt;BR /&gt;access-list Outside extended permit object-group VeeamReplicationServices object-group VeeamReplicationSourceIPs object VeeamGateway01 &lt;BR /&gt;&lt;BR /&gt;route BackhaultoMGMTNetworks 10.140.0.0 255.255.0.0 10.254.0.33 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Nexus&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;vlan 550&lt;BR /&gt;&amp;nbsp; name Backup_Network&lt;/P&gt;
&lt;P&gt;vrf context Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; ip route 0.0.0.0/0 10.254.0.2&lt;BR /&gt;&amp;nbsp; ip route 10.107.0.0/24 10.254.0.26&lt;BR /&gt;&amp;nbsp; ip route 172.16.4.0/24 10.254.0.34&lt;BR /&gt;&amp;nbsp; ip route 192.168.4.0/23 10.254.0.26&lt;/P&gt;
&lt;P&gt;interface Vlan550&lt;BR /&gt;&amp;nbsp; description VLAN550-Backup_Network&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;&amp;nbsp; mtu 9216&lt;BR /&gt;&amp;nbsp; vrf member Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; no ip redirects&lt;BR /&gt;&amp;nbsp; ip address 10.140.50.2/24&lt;BR /&gt;&amp;nbsp; vrrp 150&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; priority 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.140.50.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no shutdown&lt;/P&gt;
&lt;P&gt;interface Vlan998&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;&amp;nbsp; vrf member Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; ip address 10.254.0.35/29&lt;BR /&gt;&amp;nbsp; vrrp 253&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; priority 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.254.0.33&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no shutdown&lt;BR /&gt;&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;&amp;nbsp; description UCS-FI-01:1/1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 500-505,510-511,520-521,530,540-542,545,&lt;STRONG&gt;550&lt;/STRONG&gt;,1003&lt;BR /&gt;-1004,1500-1506,1600&lt;BR /&gt;&amp;nbsp; spanning-tree port type edge trunk&lt;BR /&gt;&amp;nbsp; channel-group 11 mode active&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jan 2017 15:39:22 GMT</pubDate>
    <dc:creator>Epiccloud</dc:creator>
    <dc:date>2017-01-04T15:39:22Z</dc:date>
    <item>
      <title>ASA to Nexus NAT not working</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951125#M148079</link>
      <description>&lt;P&gt;Wondering if anyone has run into something like this before.&lt;BR /&gt;&lt;BR /&gt;We have an ASA cluster acting as our network firewall.&lt;BR /&gt;We are using the ASA to NAT public IPs 1:1 to two different internal servers.&lt;/P&gt;
&lt;P&gt;Most of our servers are attached to a Pair of Cisco Nexus switches running virtual port channel.&lt;BR /&gt;Traffic is routed between the ASAs and the Nexus using a /30 subnet and static routes.&lt;BR /&gt;&lt;BR /&gt;Network traffic works, the ASA is able to ping Server 1 and Server 2 and vice versa.&lt;BR /&gt;We are seeing the ACL gets hits&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NAT rules applying to an interface directly on the ASA to Server 1 work fine.&lt;BR /&gt;But identical NAT rules (different IPs) applying to the routed interface to the Nexus and Server 2 don't work and we can't figure out why.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/nexusnat_0.png" class="migrated-markup-image" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/nexusnatport_interfaces.png" class="migrated-markup-image" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951125#M148079</guid>
      <dc:creator>Epiccloud</dc:creator>
      <dc:date>2019-03-12T08:43:45Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951126#M148081</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Is this an ASA cluster or a HA failover pair?&lt;/P&gt;
&lt;P&gt;Can you ping from the ASA to Server 2?&lt;/P&gt;
&lt;P&gt;Are you getting hits on the NAT entry?&lt;/P&gt;
&lt;P&gt;Did you run a packet tracer on the ASA to see if the traffic is being allowed? If not, what was the drop code?&lt;/P&gt;
&lt;P&gt;Can you post the sanitize configurations from the ASA and the Nexus?&lt;/P&gt;
&lt;P&gt;__ __&lt;/P&gt;
&lt;P&gt;Pablo&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 00:16:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951126#M148081</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2017-01-04T00:16:08Z</dc:date>
    </item>
    <item>
      <title>Is this an ASA cluster or a</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951127#M148082</link>
      <description>&lt;P&gt;Is this an ASA cluster or a HA failover pair?&amp;nbsp;&amp;nbsp; Yes&lt;/P&gt;
&lt;P&gt;Can you ping from the ASA to Server 2?&amp;nbsp;&amp;nbsp; Yes&lt;/P&gt;
&lt;P&gt;Are you getting hits on the NAT entry?&lt;/P&gt;
&lt;P&gt;3 (BackhaultoMGMTNetworks) to (outside) source static VeeamWANReplicationTarget VeeamReplicationExternalIP&amp;nbsp; description NAT rule for Veeam Replication&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 13, untranslate_hits = 89459&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you run a packet tracer on the ASA to see if the traffic is being allowed? If not, what was the drop code?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Packet tracer shows the packet is allowed&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you post the sanitize configurations from the ASA and the Nexus?&lt;/P&gt;
&lt;P&gt;Yes, give me a bit&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 15:08:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951127#M148082</guid>
      <dc:creator>Epiccloud</dc:creator>
      <dc:date>2017-01-04T15:08:31Z</dc:date>
    </item>
    <item>
      <title>interface GigabitEthernet1/1</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951128#M148085</link>
      <description>&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address X.X.X.X 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;&amp;nbsp;nameif BackhaultoMGMTNetworks&lt;BR /&gt;&amp;nbsp;security-level 99&lt;BR /&gt;&amp;nbsp;ip address 10.254.0.34 255.255.255.248&lt;BR /&gt;&lt;BR /&gt;object network VeeamWANReplicationTarget&lt;BR /&gt;&amp;nbsp;host 10.140.50.17&lt;BR /&gt;&lt;BR /&gt;object network VeeamGateway01&lt;BR /&gt;&amp;nbsp;host 10.140.50.17&lt;BR /&gt;&lt;BR /&gt;object service VeaamReplication&lt;BR /&gt;&amp;nbsp;service tcp destination eq 6180 &lt;BR /&gt;&lt;BR /&gt;object-group service VeeamReplicationServices&lt;BR /&gt;&amp;nbsp;service-object object VeaamReplication &lt;BR /&gt;&lt;BR /&gt;nat (BackhaultoMGMTNetworks,outside) source static VeeamWANReplicationTarget VeeamReplicationExternalIP description NAT rule for Veeam Replication&lt;BR /&gt;&lt;BR /&gt;access-group Outside in interface outside&lt;BR /&gt;access-list Outside extended permit object-group VeeamReplicationServices object-group VeeamReplicationSourceIPs object VeeamGateway01 &lt;BR /&gt;&lt;BR /&gt;route BackhaultoMGMTNetworks 10.140.0.0 255.255.0.0 10.254.0.33 1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Nexus&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;vlan 550&lt;BR /&gt;&amp;nbsp; name Backup_Network&lt;/P&gt;
&lt;P&gt;vrf context Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; ip route 0.0.0.0/0 10.254.0.2&lt;BR /&gt;&amp;nbsp; ip route 10.107.0.0/24 10.254.0.26&lt;BR /&gt;&amp;nbsp; ip route 172.16.4.0/24 10.254.0.34&lt;BR /&gt;&amp;nbsp; ip route 192.168.4.0/23 10.254.0.26&lt;/P&gt;
&lt;P&gt;interface Vlan550&lt;BR /&gt;&amp;nbsp; description VLAN550-Backup_Network&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;&amp;nbsp; mtu 9216&lt;BR /&gt;&amp;nbsp; vrf member Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; no ip redirects&lt;BR /&gt;&amp;nbsp; ip address 10.140.50.2/24&lt;BR /&gt;&amp;nbsp; vrrp 150&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; priority 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.140.50.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no shutdown&lt;/P&gt;
&lt;P&gt;interface Vlan998&lt;BR /&gt;&amp;nbsp; no shutdown&lt;BR /&gt;&amp;nbsp; vrf member Epiccloud_Mgmt&lt;BR /&gt;&amp;nbsp; ip address 10.254.0.35/29&lt;BR /&gt;&amp;nbsp; vrrp 253&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; priority 20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; address 10.254.0.33&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; no shutdown&lt;BR /&gt;&lt;BR /&gt;interface Ethernet1/1&lt;BR /&gt;&amp;nbsp; description UCS-FI-01:1/1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 500-505,510-511,520-521,530,540-542,545,&lt;STRONG&gt;550&lt;/STRONG&gt;,1003&lt;BR /&gt;-1004,1500-1506,1600&lt;BR /&gt;&amp;nbsp; spanning-tree port type edge trunk&lt;BR /&gt;&amp;nbsp; channel-group 11 mode active&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 15:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951128#M148085</guid>
      <dc:creator>Epiccloud</dc:creator>
      <dc:date>2017-01-04T15:39:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951129#M148087</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Is this an ASA cluster or a HA failover pair?&amp;nbsp;&amp;nbsp; Yes ** this was an OR question** These are 2 different features. &lt;/P&gt;
&lt;P&gt;Configuration looks fine and you also have hits on the NAT rule. Can you get a capture on the internal interface of the ASA and see if you get the return traffic from the server? &lt;/P&gt;
&lt;P&gt;It would be a good idea to take an ELAM capture on the Nexus as well.&lt;/P&gt;
&lt;P&gt;__ __&lt;/P&gt;
&lt;P&gt;Pablo&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2017 22:47:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951129#M148087</guid>
      <dc:creator>Pablo</dc:creator>
      <dc:date>2017-01-04T22:47:47Z</dc:date>
    </item>
    <item>
      <title>HA failover pair of 5508's</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951130#M148090</link>
      <description>&lt;P&gt;HA failover pair of 5508's&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'll get the captures and see what I can see&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jan 2017 17:12:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951130#M148090</guid>
      <dc:creator>Epiccloud</dc:creator>
      <dc:date>2017-01-05T17:12:03Z</dc:date>
    </item>
    <item>
      <title>Turns out the issue was a bad</title>
      <link>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951131#M148092</link>
      <description>&lt;P&gt;Turns out the issue was a bad default gateway on the nexus. We were sending the default traffic to a different set of firewalls (once that we are in the process of decommissioning).&lt;BR /&gt;&lt;BR /&gt;Once we updated the default route to point to the ASAs the problem went away.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2017 17:16:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-to-nexus-nat-not-working/m-p/2951131#M148092</guid>
      <dc:creator>Epiccloud</dc:creator>
      <dc:date>2017-02-28T17:16:43Z</dc:date>
    </item>
  </channel>
</rss>

