<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Ronaldo,The flow on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953919#M155850</link>
    <description>&lt;P&gt;Hi Ronaldo,&lt;BR /&gt;&lt;BR /&gt;The flow on ASA has been changed post 8.3 where NAT untranslation for destination happens before it check for the access rules. Thus the access rule applied on 8.2 won't help.&lt;BR /&gt;&lt;BR /&gt;In 8.2 we do allow flow coming from outside to inside over Public (Mapped) IP since the access rules do match first and then NAT untranslation happens. But post 8.3, you need to create a rule on Real IP address and not on Mapped IP address to allow the flow.&lt;BR /&gt;&lt;BR /&gt;Please refer the below document to understand the flow pre and post 8.3.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://learningnetwork.cisco.com/thread/46543" target="_blank"&gt;https://learningnetwork.cisco.com/thread/46543&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Pradyumna&lt;/P&gt;</description>
    <pubDate>Thu, 25 Aug 2016 08:17:48 GMT</pubDate>
    <dc:creator>pradypan</dc:creator>
    <dc:date>2016-08-25T08:17:48Z</dc:date>
    <item>
      <title>NAT 8.4 question</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953916#M155847</link>
      <description>&lt;P&gt;&lt;SPAN class="message_body"&gt;Hello community! &lt;BR /&gt;According to firewall migration tool that cisco provides (&lt;A href="https://fwm.cisco.com" target="_blank"&gt;https://fwm.cisco.com&lt;/A&gt;) I need to this the following change:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="message_body"&gt;##### 8.2 code #####&lt;BR /&gt;static (inside,outside) tcp 50.50.50.50 https 10.34.4.11 32030 netmask 255.255.255.255&lt;BR /&gt;!&lt;BR /&gt;access-list outside extended permit tcp object-group public-ips host 50.50.50.50 eq https&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="message_body"&gt;##### 8.4 code #####&lt;BR /&gt;object network obj-10.34.4.11-48&lt;BR /&gt; host 10.34.4.11&lt;BR /&gt; nat (inside,outside) static 50.50.50.50 service tcp 32030 https&lt;BR /&gt;!&lt;BR /&gt;access-list outside remark Migration, ACE (line 671) expanded: permit tcp object-group public-ips host 50.50.50.50&lt;BR /&gt;access-list outside extended permit tcp 60.60.60.60 255.255.255.252 host 10.34.4.11 eq 32030&lt;BR /&gt;access-list outside extended permit tcp 70.70.70.0 255.255.255.0 host 10.34.4.11 eq 32030&lt;BR /&gt;access-list outside extended permit tcp 80.80.80.0 255.255.255.0 host 10.34.4.11 eq 32030&lt;BR /&gt;access-list outside extended permit tcp 90.90.90.0 255.255.255.0 host 10.34.4.11 eq 32030&lt;BR /&gt;access-list outside remark Migration: End of expansion&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;&lt;SPAN class="para_break"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="message_body"&gt;I know that the practice now is to uses the private IP on the inside and outside interface for consistency, but it will still work with the ACL used on 8.2 code, right?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="message_body"&gt;Rolando A. Valenzuela&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953916#M155847</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2019-03-12T08:06:22Z</dc:date>
    </item>
    <item>
      <title>Bump</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953917#M155848</link>
      <description>&lt;P&gt;Bump&lt;/P&gt;</description>
      <pubDate>Tue, 09 Aug 2016 17:00:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953917#M155848</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2016-08-09T17:00:57Z</dc:date>
    </item>
    <item>
      <title>anyone? :( after some testing</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953918#M155849</link>
      <description>&lt;P&gt;anyone? &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; after some testing I believe it will not work &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; is there a workaround?&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 24 Aug 2016 13:03:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953918#M155849</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2016-08-24T13:03:07Z</dc:date>
    </item>
    <item>
      <title>Hi Ronaldo,The flow on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953919#M155850</link>
      <description>&lt;P&gt;Hi Ronaldo,&lt;BR /&gt;&lt;BR /&gt;The flow on ASA has been changed post 8.3 where NAT untranslation for destination happens before it check for the access rules. Thus the access rule applied on 8.2 won't help.&lt;BR /&gt;&lt;BR /&gt;In 8.2 we do allow flow coming from outside to inside over Public (Mapped) IP since the access rules do match first and then NAT untranslation happens. But post 8.3, you need to create a rule on Real IP address and not on Mapped IP address to allow the flow.&lt;BR /&gt;&lt;BR /&gt;Please refer the below document to understand the flow pre and post 8.3.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://learningnetwork.cisco.com/thread/46543" target="_blank"&gt;https://learningnetwork.cisco.com/thread/46543&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;Pradyumna&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 08:17:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953919#M155850</guid>
      <dc:creator>pradypan</dc:creator>
      <dc:date>2016-08-25T08:17:48Z</dc:date>
    </item>
    <item>
      <title>I am not much expert in it</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953920#M155851</link>
      <description>&lt;P&gt;I am not much expert in it but I did recent Migration of many ASA 8.2 to 8.4 above and as per my experienced we need Internal Private IP address in ACLs and not the natted one. So your 8.4 nat and acl looks good to me.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Pawan (CCIE 52104)&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 12:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953920#M155851</guid>
      <dc:creator>Pawan Raut</dc:creator>
      <dc:date>2016-08-25T12:06:44Z</dc:date>
    </item>
    <item>
      <title>Thank you both!</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953921#M155852</link>
      <description>&lt;P&gt;Thank you both!&lt;/P&gt;
&lt;P&gt;Pradypan, regarding the flow, after a lot of testing I find out that the ACLs used by crypto maps need the mapped IP &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; and not the real one (if no nat is allowed) so that kinds of mess all my configuration making this migration harder for me.&lt;/P&gt;
&lt;P&gt;Thanks for the the documentation.&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 14:40:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953921#M155852</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2016-08-25T14:40:46Z</dc:date>
    </item>
    <item>
      <title>Hello Rolando,</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953922#M155853</link>
      <description>&lt;P&gt;Hello Rolando,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just as Pradypan stated, in 8.3 and up the flow changed and now NAT takes precedence over ACL look up, hence the need to reference the real IP address. Also it should be noted that when upgrading from 8.2 to 8.4.7 the ASA takes care of the migration process and changes the ACLs and NAT statement as needed.&lt;/P&gt;
&lt;P&gt;Curiously the crypto map config does not change from one version to another so it should be the same on both version.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 25 Aug 2016 20:01:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-question/m-p/2953922#M155853</guid>
      <dc:creator>ccorreap</dc:creator>
      <dc:date>2016-08-25T20:01:54Z</dc:date>
    </item>
  </channel>
</rss>

