<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks! This helped lead me in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785194#M173348</link>
    <description>&lt;P&gt;Thanks! This helped lead me to the right direction of what I needed to find.&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jan 2016 20:54:02 GMT</pubDate>
    <dc:creator>tbthurman</dc:creator>
    <dc:date>2016-01-28T20:54:02Z</dc:date>
    <item>
      <title>NAT - Configuration Cleanup Help</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785192#M173346</link>
      <description>&lt;P&gt;I am attempting to cleanup some of the NAT configurations on our ASA before we upgrade from 8.2.5 to 8.3+. I had a question regarding the global nat configurations.&lt;/P&gt;
&lt;P&gt;I understand of the purpose of most the statements below, but I don't understand the &lt;STRONG&gt;global (INSIDE) 10 interface.&amp;nbsp;&lt;/STRONG&gt; I also don't like the &lt;STRONG&gt;global (DMZ) 10 interface&lt;/STRONG&gt; with the &lt;STRONG&gt;nat (INSIDE) 10 0.0.0.0 0.0.0.0&lt;/STRONG&gt; command. It causes the logs on the DMZ servers to only show the DMZ interface IP instead of the actual host IP.&amp;nbsp; Can anyone think of a reason why they would be there?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;global (OUTSIDE) 15 &lt;EM&gt;external-IP1&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;global (OUTSIDE) 10 &lt;EM&gt;external-IP2&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;global (OUTSIDE) 20 interface&lt;/P&gt;
&lt;P&gt;global (INSIDE) 10 interface&lt;/P&gt;
&lt;P&gt;global (DMZ) 10 interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (OUTSIDE) 0 access-list NONAT-OUTSIDE&lt;/P&gt;
&lt;P&gt;nat (OUTSIDE) 20 192.168.x.x 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (INSIDE) 0 access-l NONAT&lt;/P&gt;
&lt;P&gt;nat (INSIDE) 10 0.0.0.0 0.0.0.0&lt;/P&gt;
&lt;P&gt;nat (DMZ) 0 access-l NONAT&lt;/P&gt;
&lt;P&gt;nat (DMZ) 15 0.0.0.0 0.0.0.0&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785192#M173346</guid>
      <dc:creator>tbthurman</dc:creator>
      <dc:date>2019-03-12T07:08:36Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785193#M173347</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;For Global(inside) 10 and nat(inside) 10, it looks like the U Turning has been performed where the anything coming from inside hosts get natted to the inside interface ip.&lt;/P&gt;
&lt;P&gt;This kind of configuration is used to prevent Asymetric routing as well where the SYN goes through ASA however SYN-ACK goes directly to client without passing through ASA. Therefore for return traffic to go through ASA, source ip is natted to Interface ip so that the reply packet first goes to the interface and then ASA performs Untranslation and sends the traffic back to actual source.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regarding global (DMZ) 10 and nat (inside) 10, it could be possible that you might not want your DMZ hosts to see the actual source ip from Inside. Also you can check if 'nat-control' is enabled. If yes, then you need to have NAT configured on ASA for communication between interface. That could be also be the reason why this nat was kept.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps you finding the main reason.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2016 16:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785193#M173347</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2016-01-14T16:45:47Z</dc:date>
    </item>
    <item>
      <title>Thanks! This helped lead me</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785194#M173348</link>
      <description>&lt;P&gt;Thanks! This helped lead me to the right direction of what I needed to find.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jan 2016 20:54:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration-cleanup-help/m-p/2785194#M173348</guid>
      <dc:creator>tbthurman</dc:creator>
      <dc:date>2016-01-28T20:54:02Z</dc:date>
    </item>
  </channel>
</rss>

