<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic nat question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question/m-p/2979495#M149439</link>
    <description>&lt;P&gt;we have ASA running 9.6(1).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the firewall has an outside interface and an inside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- we manage the servers that are on the inside interface from terminal servers that are from the outside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- when I add a nat statement =&amp;nbsp;&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- I can no longer manage the devices on the inside of the firewall from the outside.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the logs show as follows:&lt;/P&gt;
&lt;P&gt;Oct 06 2016 11:54:21: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:216.x.x.x dst inside:10.x.x.x (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;any info would be great. Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:21:46 GMT</pubDate>
    <dc:creator>christianstp1</dc:creator>
    <dc:date>2019-03-12T08:21:46Z</dc:date>
    <item>
      <title>nat question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/2979495#M149439</link>
      <description>&lt;P&gt;we have ASA running 9.6(1).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the firewall has an outside interface and an inside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- we manage the servers that are on the inside interface from terminal servers that are from the outside interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- when I add a nat statement =&amp;nbsp;&lt;BR /&gt;nat (inside,outside) after-auto source dynamic any interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;- I can no longer manage the devices on the inside of the firewall from the outside.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;the logs show as follows:&lt;/P&gt;
&lt;P&gt;Oct 06 2016 11:54:21: %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src outside:216.x.x.x dst inside:10.x.x.x (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;any info would be great. Thanks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:21:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/2979495#M149439</guid>
      <dc:creator>christianstp1</dc:creator>
      <dc:date>2019-03-12T08:21:46Z</dc:date>
    </item>
    <item>
      <title>This issue is because packet</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/2979496#M149440</link>
      <description>&lt;P&gt;This issue is because packet getting NAT for internal IPs so you have to configure nonat as below&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network Internal-Server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;host&amp;nbsp; x.x.x.x &amp;nbsp;(se&lt;SPAN&gt;rver IPs that are on the inside interface)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;object-group network Terminal-Server&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;host &amp;nbsp;10.x.x.x &amp;nbsp;(&lt;SPAN&gt;terminal &lt;/SPAN&gt;se&lt;SPAN&gt;rver IPs that are on the outside&amp;nbsp;interface)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,outside) 1 source static&amp;nbsp;Internal-&lt;SPAN&gt;Server&amp;nbsp;Internal-&lt;SPAN&gt;Server destination static&amp;nbsp;Terminal-&lt;SPAN&gt;Server&amp;nbsp;Terminal-&lt;SPAN&gt;Server&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2016 04:48:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/2979496#M149440</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-10-07T04:48:40Z</dc:date>
    </item>
    <item>
      <title>Thanks that worked.</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/2979497#M149441</link>
      <description>&lt;P&gt;Thanks that worked.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2016 12:07:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/2979497#M149441</guid>
      <dc:creator>christianstp1</dc:creator>
      <dc:date>2016-10-07T12:07:24Z</dc:date>
    </item>
    <item>
      <title>You are always welcome</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/2979498#M149442</link>
      <description>&lt;P&gt;You are always welcome&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2016 12:10:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/2979498#M149442</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-10-07T12:10:34Z</dc:date>
    </item>
  </channel>
</rss>

