<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic nat command removed after acl statement entered in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833744#M174089</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was implementing an acl statement as follows:&amp;nbsp;access-list NAT_EXEMPTION extended permit tcp host 10.x.x.x object-group NameSRC eq ####&lt;/P&gt;
&lt;P&gt;and error came back immediately whic showed that:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;ASA(config)# nat (inside) 0 access-list NAT_EXEMPTION&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;ERROR: access-list has protocol or port&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The command, &lt;SPAN&gt;nat (inside) 0 access-list NAT_EXEMPTION,&lt;/SPAN&gt;&amp;nbsp;was then auto removed from the config.&lt;/P&gt;
&lt;P&gt;The access-list statements for the NAT_EXEMPTION were untouched.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I put the rule back in.&amp;nbsp;At this same time the ASA seemed to be overloaded with processing&lt;/P&gt;
&lt;P&gt;ASA# sh processes cpu-usage sorted &lt;BR /&gt;PC Thread &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5Sec &amp;nbsp; &amp;nbsp; 1Min &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5Min Process&lt;BR /&gt;081a86c4 1c5afa08 52.8% &amp;nbsp; &amp;nbsp;54.4% &amp;nbsp; &amp;nbsp; 66.1% Dispatch Unit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How did this error impact processing on the ASA?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:01:41 GMT</pubDate>
    <dc:creator>Steve Coady</dc:creator>
    <dc:date>2019-03-12T07:01:41Z</dc:date>
    <item>
      <title>nat command removed after acl statement entered</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833744#M174089</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was implementing an acl statement as follows:&amp;nbsp;access-list NAT_EXEMPTION extended permit tcp host 10.x.x.x object-group NameSRC eq ####&lt;/P&gt;
&lt;P&gt;and error came back immediately whic showed that:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;ASA(config)# nat (inside) 0 access-list NAT_EXEMPTION&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #ff0000;"&gt;ERROR: access-list has protocol or port&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The command, &lt;SPAN&gt;nat (inside) 0 access-list NAT_EXEMPTION,&lt;/SPAN&gt;&amp;nbsp;was then auto removed from the config.&lt;/P&gt;
&lt;P&gt;The access-list statements for the NAT_EXEMPTION were untouched.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I put the rule back in.&amp;nbsp;At this same time the ASA seemed to be overloaded with processing&lt;/P&gt;
&lt;P&gt;ASA# sh processes cpu-usage sorted &lt;BR /&gt;PC Thread &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5Sec &amp;nbsp; &amp;nbsp; 1Min &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5Min Process&lt;BR /&gt;081a86c4 1c5afa08 52.8% &amp;nbsp; &amp;nbsp;54.4% &amp;nbsp; &amp;nbsp; 66.1% Dispatch Unit&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How did this error impact processing on the ASA?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:01:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833744#M174089</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2019-03-12T07:01:41Z</dc:date>
    </item>
    <item>
      <title>What version of IOS are you</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833745#M174090</link>
      <description>&lt;P&gt;What version of IOS are you running, the nonat changed if you are above 8.3&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;check this URL:&lt;/P&gt;
&lt;P&gt;https://www.fir3net.com/Firewalls/Cisco/cisco-asa-83-no-nat-nat-exemption.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Rolando Valenzuela&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 20:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833745#M174090</guid>
      <dc:creator>Rolando Valenzuela</dc:creator>
      <dc:date>2015-12-10T20:56:58Z</dc:date>
    </item>
    <item>
      <title>we are on 825</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833746#M174091</link>
      <description>&lt;P&gt;we are on 825&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2015 20:59:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833746#M174091</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2015-12-10T20:59:32Z</dc:date>
    </item>
    <item>
      <title>Hello</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833747#M174092</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can anyone advise on any possible adverse issue that would have been caused by this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 17:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833747#M174092</guid>
      <dc:creator>Steve Coady</dc:creator>
      <dc:date>2015-12-14T17:21:59Z</dc:date>
    </item>
    <item>
      <title>Hi Steve,</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833748#M174093</link>
      <description>&lt;P&gt;Hi Steve,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;NAT exemption does not take any ports into consideration. That's why you should not include protocols and ports into the ACL.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"Do not specify the real and destination ports in the access list; NAT exemption does not consider the ports. NAT exemption considers the inactive and time-range keywords, but it does not support ACL with all inactive and time-range ACEs."&lt;/P&gt;
&lt;P&gt;More details you could see below:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_bypassing.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regarding the CPU load you mentioned about - I do not think it is because of the NAT rule.&lt;/P&gt;
&lt;P&gt;Dispatch Unit process in most of the cases is directly connected to the traffic processing (packet forwarding) tasks.&lt;/P&gt;
&lt;P&gt;So, when you have a similar situation you could check "sh traffic" in order to see the amount of the traffic being forwarded at this moment and to corelate it to the forwarding capacity of the device.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 10:15:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833748#M174093</guid>
      <dc:creator>yfournad</dc:creator>
      <dc:date>2015-12-17T10:15:01Z</dc:date>
    </item>
    <item>
      <title>Hi Steve,</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833749#M174094</link>
      <description>&lt;P&gt;Hi Steve,&lt;/P&gt;
&lt;P&gt;There is a defect related to this nat exempt addressing this issue:&lt;/P&gt;
&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCub53800/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;Dispatch unit is related to traversing traffic. Adding access-list would have increase 'tmatch' process. Also if you notice, 5 minute average is 66.1%. That means, it might be having this much process from some time ago.&lt;/P&gt;
&lt;P&gt;As mentioned by&amp;nbsp;yfournad, 'show traffic' would give you the details on how much traffic received and transmitted through asa during different intervals.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 15:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833749#M174094</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-17T15:15:43Z</dc:date>
    </item>
    <item>
      <title>There is a defect related to</title>
      <link>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833750#M174095</link>
      <description>&lt;P&gt;There is a defect related to this nat exempt addressing this issue:&lt;/P&gt;
&lt;P&gt;https://tools.cisco.com/bugsearch/bug/CSCub53800/?reffering_site=dumpcr&lt;/P&gt;
&lt;P&gt;Dispatch unit is related to traversing traffic. Adding access-list would have increase 'tmatch' process. Also if you notice, 5 minute average is 66.1%. That means, it might be having this much process from some time ago.&lt;/P&gt;
&lt;P&gt;As mentioned, 'show traffic' would give you the details on how much traffic received and transmitted through asa during different intervals.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope it helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Akshay Rastogi&lt;/P&gt;
&lt;P&gt;Remember to rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2015 15:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-command-removed-after-acl-statement-entered/m-p/2833750#M174095</guid>
      <dc:creator>Akshay Rastogi</dc:creator>
      <dc:date>2015-12-17T15:16:52Z</dc:date>
    </item>
  </channel>
</rss>

