<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How are object groups processed in NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865271#M177278</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have seen, and indeed used object groups in a "twice NAT" configuration especially for exempting translation for VPN traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was wondering how object groups are processed correctly as so far, the results have been as expected. &amp;nbsp;Please see the brief example below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network vpn-local&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; object-group network vpn-remote&lt;BR /&gt; network-object 10.0.10.0 255.255.255.0&lt;BR /&gt; network-object 10.0.20.0 255.255.255.0&lt;BR /&gt; network-object 10.0.30.0 255.255.255.0&lt;BR /&gt; network-object 10.0.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) 1 source static vpn-local vpn-local destination static vpn-remote vpn-remote&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Why and how&amp;nbsp;does the NAT process work when for example, the remote network is 10.0.30.0/24? &amp;nbsp;How does the ASA know to translate that to itself rather than the first object in the list - 10.0.10.0/24?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We make extensive use of object groups in NAT statements and I have never found the logic behind the process!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:26:00 GMT</pubDate>
    <dc:creator>DarrenB_UK</dc:creator>
    <dc:date>2019-03-12T07:26:00Z</dc:date>
    <item>
      <title>How are object groups processed in NAT</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865271#M177278</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have seen, and indeed used object groups in a "twice NAT" configuration especially for exempting translation for VPN traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I was wondering how object groups are processed correctly as so far, the results have been as expected. &amp;nbsp;Please see the brief example below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network vpn-local&lt;BR /&gt; network-object 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt; object-group network vpn-remote&lt;BR /&gt; network-object 10.0.10.0 255.255.255.0&lt;BR /&gt; network-object 10.0.20.0 255.255.255.0&lt;BR /&gt; network-object 10.0.30.0 255.255.255.0&lt;BR /&gt; network-object 10.0.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,outside) 1 source static vpn-local vpn-local destination static vpn-remote vpn-remote&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Why and how&amp;nbsp;does the NAT process work when for example, the remote network is 10.0.30.0/24? &amp;nbsp;How does the ASA know to translate that to itself rather than the first object in the list - 10.0.10.0/24?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We make extensive use of object groups in NAT statements and I have never found the logic behind the process!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks in advance,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865271#M177278</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2019-03-12T07:26:00Z</dc:date>
    </item>
    <item>
      <title>Hi DarrenB_UK,</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865272#M177279</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/darrenbuk" title="View user profile." class="username" lang="" about="/users/darrenbuk" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;DarrenB_UK&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The logic is the traffic is matched with the NAT entities and since nat exemption takes precedence over other NAT &lt;G class="gr_ gr_305 gr-alert gr_gramm undefined Punctuation multiReplace" id="305" data-gr-id="305"&gt;statements ,&lt;/G&gt; ASA confirms if the remote destination is indeed part of object-group defined in destination static argument.and if it &lt;G class="gr_ gr_402 gr-alert gr_gramm undefined Punctuation multiReplace" id="402" data-gr-id="402"&gt;is, ,&lt;/G&gt; &lt;G class="gr_ gr_389 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del" id="389" data-gr-id="389"&gt;it &lt;/G&gt;&lt;G class="gr_ gr_401 gr-alert gr_spell undefined ContextualSpelling multiReplace" id="401" data-gr-id="401"&gt;&lt;G class="gr_ gr_389 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del" id="389" data-gr-id="389"&gt;self&lt;/G&gt; translates&lt;/G&gt;&amp;nbsp;or &lt;G class="gr_ gr_419 gr-alert gr_spell undefined ContextualSpelling" id="419" data-gr-id="419"&gt;nat&lt;/G&gt; exempts the source in this case.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The statement "nat (inside,outside) 1 source static &lt;G class="gr_ gr_487 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="487" data-gr-id="487"&gt;vpn&lt;/G&gt;-local &lt;G class="gr_ gr_488 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="488" data-gr-id="488"&gt;vpn&lt;/G&gt;-local destination static &lt;G class="gr_ gr_489 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="489" data-gr-id="489"&gt;vpn&lt;/G&gt;-remote &lt;G class="gr_ gr_490 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="490" data-gr-id="490"&gt;vpn&lt;/G&gt;-remote"&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;states that whenever &lt;G class="gr_ gr_527 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="527" data-gr-id="527"&gt;vpn&lt;/G&gt;-local tries to access &lt;G class="gr_ gr_537 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="537" data-gr-id="537"&gt;vpn&lt;/G&gt;-remote &lt;G class="gr_ gr_602 gr-alert gr_gramm undefined Punctuation multiReplace" id="602" data-gr-id="602"&gt;object-group ,&lt;/G&gt; (irrespective of the subnets/host &lt;G class="gr_ gr_603 gr-alert gr_gramm undefined Punctuation multiReplace" id="603" data-gr-id="603"&gt;involved) ,&lt;/G&gt;&amp;nbsp;&lt;G class="gr_ gr_683 gr-alert gr_spell undefined ContextualSpelling multiReplace" id="683" data-gr-id="683"&gt;self translate&lt;/G&gt; &lt;G class="gr_ gr_656 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="656" data-gr-id="656"&gt;vpn&lt;/G&gt;-local to itself and do not translate &lt;G class="gr_ gr_722 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="722" data-gr-id="722"&gt;vpn&lt;/G&gt;-remote as well.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;You might want to take a moment and go through this wonderful document on nat:&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 01:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865272#M177279</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-03T01:21:19Z</dc:date>
    </item>
    <item>
      <title>Thank you Dinesh - exactly</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865273#M177280</link>
      <description>&lt;P&gt;Thank you Dinesh - exactly what I needed to have confirmed!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"ASA confirms if the destination is&amp;nbsp;&lt;SPAN style="text-decoration: underline;"&gt;part&lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;/SPAN&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;/SPAN&gt; of the object group" is the key criteria"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;All the best,&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 05:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865273#M177280</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2016-03-03T05:41:18Z</dc:date>
    </item>
    <item>
      <title>You got it , Darren</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865274#M177281</link>
      <description>&lt;P&gt;You got &lt;G class="gr_ gr_47 gr-alert gr_gramm undefined Punctuation multiReplace" id="47" data-gr-id="47"&gt;it ,&lt;/G&gt; &lt;G class="gr_ gr_48 gr-alert gr_gramm undefined Punctuation only-ins replaceWithoutSep" id="48" data-gr-id="48"&gt;Darren&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-Dinesh&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 05:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865274#M177281</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-03T05:50:00Z</dc:date>
    </item>
    <item>
      <title>One question does arise</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865275#M177282</link>
      <description>&lt;P&gt;One question does arise though Dinesh, what happens if the destination object group is different?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network vpn-local&lt;BR /&gt;network-object 192.168.10.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;object-group network vpn-remote&lt;BR /&gt;network-object 10.0.10.0 255.255.255.0&lt;BR /&gt;network-object 10.0.20.0 255.255.255.0&lt;BR /&gt;network-object 10.0.30.0 255.255.255.0&lt;BR /&gt;network-object 10.0.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network vpn-remote-new&lt;BR /&gt;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;network-object 172.16.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (inside,outside) 1 source static vpn-local vpn-local destination static vpn-remote vpn-remote-new&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If the ASA cannot confirm the entry is in the list, will it fail or will it match to the entry at the same location?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 05:58:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865275#M177282</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2016-03-03T05:58:38Z</dc:date>
    </item>
    <item>
      <title>Darren,You don't have to</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865276#M177283</link>
      <description>&lt;P&gt;Darren,&lt;BR /&gt;&lt;BR /&gt;You don't&amp;nbsp;have to worry about the latter part of destination static i.e.&amp;nbsp;&lt;G class="gr_ gr_78 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="78" data-gr-id="78"&gt;vpn&lt;/G&gt;-remote-new&lt;/P&gt;
&lt;P&gt;As long as the traffic is coming from "&lt;SPAN&gt;&lt;G class="gr_ gr_104 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="104" data-gr-id="104"&gt;vpn&lt;/G&gt;-local&lt;/SPAN&gt;" to "&lt;SPAN&gt;&lt;G class="gr_ gr_127 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="127" data-gr-id="127"&gt;vpn&lt;/G&gt;-remote&lt;/SPAN&gt;" (&lt;G class="gr_ gr_673 gr-alert gr_gramm undefined Grammar multiReplace" id="673" data-gr-id="673"&gt;other&lt;/G&gt; condition is &lt;G class="gr_ gr_149 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="149" data-gr-id="149"&gt;vpn&lt;/G&gt;-local has to be from inside and &lt;G class="gr_ gr_170 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="170" data-gr-id="170"&gt;vpn&lt;/G&gt;-remote has to be reachable on the outside, this is nothing but the interfaces that we mentioned in this nat statement) , this nat statement will be used where &lt;G class="gr_ gr_482 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="482" data-gr-id="482"&gt;vpn&lt;/G&gt;-local is self-translated/nat-exempted and &lt;G class="gr_ gr_520 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="520" data-gr-id="520"&gt;vpn&lt;/G&gt;-remote is translated to &lt;G class="gr_ gr_597 gr-alert gr_spell gr_disable_anim_appear undefined ContextualSpelling ins-del multiReplace" id="597" data-gr-id="597"&gt;vpn&lt;/G&gt;-remote-new.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hope this addresses your query.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 06:08:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865276#M177283</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-03T06:08:07Z</dc:date>
    </item>
    <item>
      <title>Hi Dinesh and thank you for</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865277#M177284</link>
      <description>&lt;P&gt;Hi Dinesh and thank you for your continued input!&lt;/P&gt;
&lt;P&gt;So looking at these remote object groups:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network vpn-remote&lt;BR /&gt;network-object 10.0.10.0 255.255.255.0&lt;BR /&gt;network-object 10.0.20.0 255.255.255.0&lt;BR /&gt;network-object 10.0.30.0 255.255.255.0&lt;BR /&gt;network-object 10.0.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object-group network vpn-remote-new&lt;BR /&gt;network-object 172.16.10.0 255.255.255.0&lt;BR /&gt;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;network-object 172.16.40.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;If the matched destination address is 10.0.30.0, at position 3 in the object group, would the ASA translate this to position 3 in the vpn-remote-new group - 172.16.30.0?&lt;/P&gt;
&lt;P&gt;Just want to be clear about the order of processing logic in object groups for ASA NAT!&lt;/P&gt;
&lt;P&gt;Thanks again&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 06:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865277#M177284</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2016-03-03T06:18:07Z</dc:date>
    </item>
    <item>
      <title>Darren,</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865278#M177285</link>
      <description>&lt;P&gt;Darren,&lt;/P&gt;
&lt;P&gt;&lt;G class="gr_ gr_111 gr-alert gr_gramm undefined Punctuation multiReplace" id="111" data-gr-id="111"&gt;Actually&lt;/G&gt; this is not the optimum way to configure natting.&lt;BR /&gt;I will suggest you to create separate&amp;nbsp;nat statements for the destination object-groups so that 10.0.30.0 translates to 172.16.30.0 and similarly for other objects.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 07:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865278#M177285</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-03T07:37:49Z</dc:date>
    </item>
    <item>
      <title>Hi Dinesh,</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865279#M177286</link>
      <description>&lt;P&gt;Hi Dinesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again for your input. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So you are suggesting that whilst using the same object group for identity NAT is OK, use separate NAT statements with the relevant objects if an actual translation is required?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Thu, 03 Mar 2016 19:18:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865279#M177286</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2016-03-03T19:18:59Z</dc:date>
    </item>
    <item>
      <title>I'd suggest that whether you</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865280#M177287</link>
      <description>&lt;P&gt;I'd suggest that whether you go for nat exemption or &lt;G class="gr_ gr_43 gr-alert gr_spell undefined ContextualSpelling ins-del multiReplace" id="43" data-gr-id="43"&gt;trasnlation&lt;/G&gt;. always use separate&amp;nbsp;NAT statements.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Mar 2016 01:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865280#M177287</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-04T01:22:34Z</dc:date>
    </item>
    <item>
      <title>I finally managed to lab this</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865281#M177288</link>
      <description>&lt;P&gt;I finally managed to lab this up!&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ciscoasa# show object-group&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;object-group network vpn-remote&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 10.0.100.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 10.0.101.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 10.0.102.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 10.0.103.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;object-group network vpn-remote-new&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 192.168.100.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 192.168.101.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;network-object 192.168.102.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; network-object 192.168.103.0 255.255.255.0&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;object-group network vpn-local&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt; network-object 10.0.10.0 255.255.255.0 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ciscoasa# show run nat&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (inside,outside) source static vpn-local vpn-local destination static vpn-remote vpn-remote-new &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ciscoasa# packet-tracer input inside tcp 10.0.10.1 12345 10.0.101.1 80 detailed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: static&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (inside,outside) source static vpn-local vpn-local destination static vpn-remote vpn-remote-new&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;NAT divert to egress interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Untranslate 10.0.101.1/80 to 192.168.101.1/80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ciscoasa# packet-tracer input inside tcp 10.0.10.1 12345 10.0.103.1 80 det&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: static&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (inside,outside) source static vpn-local vpn-local destination static vpn-remote vpn-remote-new&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;NAT divert to egress interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Untranslate 10.0.103.1/80 to 192.168.103.1/80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;ciscoasa# packet-tracer input inside tcp 10.0.10.1 12345 10.0.101.1 80 det&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Phase: 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Type: UN-NAT&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Subtype: static&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Result: ALLOW&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Config:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;nat (inside,outside) source static vpn-local vpn-local destination static vpn-remote vpn-remote-new&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Additional Information:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;NAT divert to egress interface outside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;Untranslate 10.0.101.1/80 to 192.168.101.1/80&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-family: arial, helvetica, sans-serif;"&gt;What this demonstrates is that the static NAT translates the object-group to the corresponding position in the groups! &amp;nbsp;Cool!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2016 08:46:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865281#M177288</guid>
      <dc:creator>DarrenB_UK</dc:creator>
      <dc:date>2016-03-06T08:46:57Z</dc:date>
    </item>
    <item>
      <title>Wonderful Darren,</title>
      <link>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865282#M177289</link>
      <description>&lt;P&gt;Wonderful Darren,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Appreciate your efforts on a quick lab-repro to confirm the behavior.&lt;BR /&gt;Way to &lt;G class="gr_ gr_69 gr-alert gr_gramm undefined Punctuation multiReplace" id="69" data-gr-id="69"&gt;go !&lt;/G&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2016 08:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-are-object-groups-processed-in-nat/m-p/2865282#M177289</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-03-06T08:50:32Z</dc:date>
    </item>
  </channel>
</rss>

