<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Hide nat while using inside,outside static nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-hide-nat-while-using-inside-outside-static-nat/m-p/2683978#M191600</link>
    <description>&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the issue we are trying to solve -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switching firewall devices, going to need to have same servers reply to two different firewalls; the servers have always been behind their ASA and replying to the internet for the global Source&amp;nbsp;IPv4 Space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to keep that ASA online, but change the default route to the new firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;old firewall 10.1.1.1&lt;/P&gt;&lt;P&gt;new firewall 10.1.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;existing nat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network 10.1.1.15_Server1&lt;/P&gt;&lt;P&gt;host 10.1.1.15&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 63.118.110.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this all works fine. however, we need to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Keep this working as we bring new firewall online - so servers default gateway becomes 10.1.1.10&lt;/P&gt;&lt;P&gt;2) Keep replying to stuff coming in (do not need to originate NAT OUTBOUND, DO need to REPLY to our static IP's (i.e.&amp;nbsp;63.118.110.15 for global services)&lt;/P&gt;&lt;P&gt;3) Can we AT THE SAME TIME NAT ALL SOURCE IP's for "the internet" to a single overload "HIDE NAT"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is what I&amp;nbsp;tried&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside,inside) dynamic 10.1.1.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal here is to allow us to keep BOTH firewalls ONLINE for a few months as we SLOWLY move public NAT's from The public ip's used on the old firewall to the new firewall.&lt;/P&gt;&lt;P&gt;And YES, connections made THROUGH the old firewall will look like they came from 10.1.1.254&amp;nbsp;&lt;/P&gt;&lt;P&gt;but connections through the new firewall will look like their true source IP's (the ipv4 source on the internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:56:00 GMT</pubDate>
    <dc:creator>joe19366</dc:creator>
    <dc:date>2019-03-12T05:56:00Z</dc:date>
    <item>
      <title>ASA Hide nat while using inside,outside static nat</title>
      <link>https://community.cisco.com/t5/network-security/asa-hide-nat-while-using-inside-outside-static-nat/m-p/2683978#M191600</link>
      <description>&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the issue we are trying to solve -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switching firewall devices, going to need to have same servers reply to two different firewalls; the servers have always been behind their ASA and replying to the internet for the global Source&amp;nbsp;IPv4 Space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to keep that ASA online, but change the default route to the new firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;old firewall 10.1.1.1&lt;/P&gt;&lt;P&gt;new firewall 10.1.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;existing nat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network 10.1.1.15_Server1&lt;/P&gt;&lt;P&gt;host 10.1.1.15&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 63.118.110.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this all works fine. however, we need to&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Keep this working as we bring new firewall online - so servers default gateway becomes 10.1.1.10&lt;/P&gt;&lt;P&gt;2) Keep replying to stuff coming in (do not need to originate NAT OUTBOUND, DO need to REPLY to our static IP's (i.e.&amp;nbsp;63.118.110.15 for global services)&lt;/P&gt;&lt;P&gt;3) Can we AT THE SAME TIME NAT ALL SOURCE IP's for "the internet" to a single overload "HIDE NAT"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;here is what I&amp;nbsp;tried&lt;/P&gt;&lt;P&gt;object network obj_any&lt;BR /&gt;&amp;nbsp;subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (outside,inside) dynamic 10.1.1.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal here is to allow us to keep BOTH firewalls ONLINE for a few months as we SLOWLY move public NAT's from The public ip's used on the old firewall to the new firewall.&lt;/P&gt;&lt;P&gt;And YES, connections made THROUGH the old firewall will look like they came from 10.1.1.254&amp;nbsp;&lt;/P&gt;&lt;P&gt;but connections through the new firewall will look like their true source IP's (the ipv4 source on the internet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:56:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-hide-nat-while-using-inside-outside-static-nat/m-p/2683978#M191600</guid>
      <dc:creator>joe19366</dc:creator>
      <dc:date>2019-03-12T05:56:00Z</dc:date>
    </item>
    <item>
      <title>Hi,I don't think the Dynamic</title>
      <link>https://community.cisco.com/t5/network-security/asa-hide-nat-while-using-inside-outside-static-nat/m-p/2683979#M191603</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I don't think the Dynamic NAT will fulfill the requirement. Also , if you keep both the ASA devices in network , you would certainly face issues with the Proxy-Arp on the ASA devices replying to the arp requests and that would cause Asymmetric routing and dropping the traffic on the ASA device.&lt;/P&gt;&lt;P&gt;I think the only workaround that you would be able to use will be to configure TCP state bypass on the ASA units.&lt;/P&gt;&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/111986-asa-tcp-bypass-00.html&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2015 03:44:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-hide-nat-while-using-inside-outside-static-nat/m-p/2683979#M191603</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-05-14T03:44:27Z</dc:date>
    </item>
  </channel>
</rss>

