<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic First make sure that the ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712050#M191841</link>
    <description>&lt;P&gt;First make sure that the ASA doesn't block ICMP replies (the defaults are typically ok):&lt;/P&gt;

&lt;PRE&gt;
clear configure icmp&lt;/PRE&gt;

&lt;P&gt;Then I would troubleshoot on the router:&lt;/P&gt;
&lt;OL&gt;&lt;LI&gt;Dou you allow outgoing traffic on the router from the ASA outside IP?&lt;/LI&gt;&lt;LI&gt;Is the transfer-network from the ASA to the router (the network of your outside ASA IP) part of the traffic that the router is allowed to NAT?&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Thu, 07 May 2015 10:55:12 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2015-05-07T10:55:12Z</dc:date>
    <item>
      <title>How to bypass NAT</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712044#M191835</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I want to know the commands to bypass NAT on an asa 5505 pre 8.3&lt;/P&gt;&lt;P&gt;I have a router at the edge that is doing natting so &amp;nbsp;i want the asa to simply send the traffic without perming any natting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:53:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712044#M191835</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2019-03-12T05:53:59Z</dc:date>
    </item>
    <item>
      <title>Hi,If you want all the</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712045#M191836</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If you want all the traffic to be not natted , you can use this simple ASA NAT statement:-&lt;/P&gt;&lt;P&gt;object network obj-0.0.0.0&lt;/P&gt;&lt;P&gt;subnet 0 0&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 0.0.0.0&lt;/P&gt;&lt;P&gt;Also , if you want only certain traffic to not be natted , you can use the Manaul NAT:-&lt;/P&gt;&lt;P&gt;object network obj-LAN&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;object network remote-subnet&lt;/P&gt;&lt;P&gt;subnet 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside,ouside) source static obj-LAN obj-LAN destination static remote-subnet remote-subnet&lt;/P&gt;&lt;P&gt;This would mean that any traffic from 10.0.0.0 going to 172.16.0.0 would only be not natted.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 05:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712045#M191836</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-05-07T05:35:37Z</dc:date>
    </item>
    <item>
      <title>You are looking for NAT</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712046#M191837</link>
      <description>&lt;P&gt;You are looking for &lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/nat_bypassing.html#wp1090667"&gt;NAT Exemption&lt;/A&gt;.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;You configure an ACL with the traffic that should not be NATted.&lt;/LI&gt;&lt;LI&gt;You use this ACL with the "nat (interface) 0" command for the interface with the higher security-level.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 07 May 2015 06:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712046#M191837</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-07T06:39:01Z</dc:date>
    </item>
    <item>
      <title>Hi, Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712047#M191838</link>
      <description>&lt;P&gt;Hi, Thanks for the responses&lt;/P&gt;&lt;P&gt;So the existing nat config I have is as follows, firewalls are my very weak point:&lt;/P&gt;&lt;P&gt;global (OUTSIDE) 10 interface&lt;BR /&gt;nat (INSIDE) 10 172.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 172.20.152.2 1&lt;BR /&gt;route INSIDE 172.20.0.0 255.255.0.0 172.20.152.9 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive included this ACL, im guessing it wont block any traffic initiated from the inside. This allows the router to connect to the snmp server for monitoring&lt;/P&gt;&lt;P&gt;access-list OUTSIDE_access_in extended permit ip any host 172.20.0.57&lt;/P&gt;&lt;P&gt;access-group OUTSIDE_access_in in interface OUTSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So 172.20 being my inside network.&lt;/P&gt;&lt;P&gt;Am I right in saying, I do the following&amp;nbsp;&lt;/P&gt;&lt;P&gt;no&amp;nbsp;nat (INSIDE) 10 172.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (INSIDE) 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lokking at the commands, the 0 indicates no translations.&amp;nbsp;I just want to not nat anything coming through the firewall, as the router will be doing the natting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 09:02:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712047#M191838</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2015-05-07T09:02:35Z</dc:date>
    </item>
    <item>
      <title>If you don't wamt to do any</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712048#M191839</link>
      <description>&lt;P&gt;If you don't want to do any NAT on the firewall, you can disable NAT completely:&lt;/P&gt;

&lt;PRE&gt;
no nat-control
clear config nat
clear config global
clear config static
&lt;/PRE&gt;

&lt;P&gt;&lt;DEL&gt;But for that, your ASA-version shouldn't be too old.&lt;/DEL&gt;&lt;/P&gt;
&lt;P&gt;Just see, that "no nat-control" was introduced in 7.0, so you probably have that.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 09:12:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712048#M191839</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-07T09:12:12Z</dc:date>
    </item>
    <item>
      <title>Thanks GuysI can now ping</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712049#M191840</link>
      <description>&lt;P&gt;Thanks Guys&lt;/P&gt;&lt;P&gt;I can now ping from the internal&amp;nbsp;network to external IPs, however I cannot ping external IPs from the ASA only. My ping to the internet gateway are intermittent, but I get ???? when pinging any other external IPs&lt;/P&gt;&lt;P&gt;I have allowed icmp to travel through the asa&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 10:43:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712049#M191840</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2015-05-07T10:43:50Z</dc:date>
    </item>
    <item>
      <title>First make sure that the ASA</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712050#M191841</link>
      <description>&lt;P&gt;First make sure that the ASA doesn't block ICMP replies (the defaults are typically ok):&lt;/P&gt;

&lt;PRE&gt;
clear configure icmp&lt;/PRE&gt;

&lt;P&gt;Then I would troubleshoot on the router:&lt;/P&gt;
&lt;OL&gt;&lt;LI&gt;Dou you allow outgoing traffic on the router from the ASA outside IP?&lt;/LI&gt;&lt;LI&gt;Is the transfer-network from the ASA to the router (the network of your outside ASA IP) part of the traffic that the router is allowed to NAT?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 07 May 2015 10:55:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712050#M191841</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-07T10:55:12Z</dc:date>
    </item>
    <item>
      <title>Thanks KarstenManaged to get</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712051#M191842</link>
      <description>&lt;P&gt;Thanks Karsten&lt;/P&gt;&lt;P&gt;Managed to get it to work by investigating on the router. There was a static NAT statement converting a public ip to the ip address of the outside interface. Didn't see any use for it as I believe the router config was copied from another router.&lt;/P&gt;&lt;P&gt;Upon removing it the asa pings started working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2015 12:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat/m-p/2712051#M191842</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2015-05-07T12:42:34Z</dc:date>
    </item>
  </channel>
</rss>

