<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thank you Jon for the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652129#M195360</link>
    <description>&lt;P&gt;Thank you Jon for the information, it really is very confusing to me, I am used to pre- 8.3 code. &amp;nbsp;Below is the ACL to the NAT statement above, any help would be appreciated&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 10.0.0.0 255.255.0.0 10.54.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.0.0 255.255.255.0 10.0.100.0 255.255.254.0&lt;/P&gt;&lt;P&gt;access-list policy_nat_smtp extended permit tcp host 10.10.0.5 eq smtp any&lt;/P&gt;</description>
    <pubDate>Sat, 04 Apr 2015 01:21:54 GMT</pubDate>
    <dc:creator>peter.williams</dc:creator>
    <dc:date>2015-04-04T01:21:54Z</dc:date>
    <item>
      <title>9.0 NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652127#M195358</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to create NAT on a 9.0 ASA, I am trying to convert from PIX 7.2, the sample config is below, I cant figure out what the correct syntax is in the now ASA 9.0 syntax. &amp;nbsp;Can someone please help me?&lt;/P&gt;&lt;P&gt;nat-control&lt;BR /&gt;global (Outside) 1 &lt;SPAN style="font-size:14px;"&gt;&lt;SPAN style="color: rgb(34, 34, 34); font-family: arial, sans-serif; line-height: 28.7999992370605px;"&gt;24.55.156.3&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;netmask 255.255.255.252&lt;BR /&gt;global (Outside) 2 24.55.156.4&lt;BR /&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;BR /&gt;nat (inside) 2 access-list policy_nat_smtp&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (DMZ) 0 access-list nonatDMZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652127#M195358</guid>
      <dc:creator>peter.williams</dc:creator>
      <dc:date>2019-03-12T05:44:11Z</dc:date>
    </item>
    <item>
      <title>PeterYou don't use acls on</title>
      <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652128#M195359</link>
      <description>&lt;P&gt;Peter&lt;/P&gt;&lt;P&gt;You don't use acls on post 8.3 NAT so to help we would need to know what the acls&amp;nbsp;are that&amp;nbsp;you have used in your NAT.&lt;/P&gt;&lt;P&gt;In addition NAT after 8.3 is quite a bit more complicated because it now has an ordering to your NAT rules with different sections and where you put your NAT rules can determine whether everything works or not.&lt;/P&gt;&lt;P&gt;I have only recently started getting up to speed with it and it is a bit of change to say the least &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'm logging off now as it's&amp;nbsp;late where I am&amp;nbsp;but if you post up the acl details I'm sure someone can help out and i'll check in with the thread over the weekend if I get the chance.&lt;/P&gt;&lt;P&gt;However the reason I posted primarily was to provide a link to a really excellent document on this site which I have&amp;nbsp;learnt most of the new NAT from. It gives examples of each type of NAT but also covers the sections and the ordering which really are important to understand.&lt;/P&gt;&lt;P&gt;It's worth a read to get up to speed on it but like I say if you are in a hurry there are some very clear examples in there for your needs ie. dynamic NAT, NAT exemptions etc. -&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Like I say I'm sure someone will be able to help out as well so not trying to fob you off but you may be able to work it out from the document.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2015 01:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652128#M195359</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-04-04T01:11:19Z</dc:date>
    </item>
    <item>
      <title>Thank you Jon for the</title>
      <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652129#M195360</link>
      <description>&lt;P&gt;Thank you Jon for the information, it really is very confusing to me, I am used to pre- 8.3 code. &amp;nbsp;Below is the ACL to the NAT statement above, any help would be appreciated&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 10.0.0.0 255.255.0.0 10.54.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.0.0 255.255.255.0 10.0.100.0 255.255.254.0&lt;/P&gt;&lt;P&gt;access-list policy_nat_smtp extended permit tcp host 10.10.0.5 eq smtp any&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2015 01:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652129#M195360</guid>
      <dc:creator>peter.williams</dc:creator>
      <dc:date>2015-04-04T01:21:54Z</dc:date>
    </item>
    <item>
      <title>Thank you Jon for the</title>
      <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652130#M195361</link>
      <description>&lt;P&gt;Thank you Jon for the information, it really is very confusing to me, I am used to pre- 8.3 code. &amp;nbsp;Below is the ACL to the NAT statement above, any help would be appreciated&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 10.0.0.0 255.255.0.0 10.54.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;access-list nonatDMZ extended permit ip 192.168.0.0 255.255.255.0 10.0.100.0 255.255.254.0&lt;/P&gt;&lt;P&gt;access-list policy_nat_smtp extended permit tcp host 10.10.0.5 eq smtp any&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2015 01:22:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652130#M195361</guid>
      <dc:creator>peter.williams</dc:creator>
      <dc:date>2015-04-04T01:22:01Z</dc:date>
    </item>
    <item>
      <title>Hi,object network obj-0.0.0</title>
      <link>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652131#M195362</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;object network obj-0.0.0.0&lt;BR /&gt;subnet 0.0.0.0&lt;BR /&gt;nat (inside,outside) dynamic 24.55.156.3&lt;/P&gt;&lt;P&gt;object network obj-10.0.0.0&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network obj-10.54.0.0&lt;BR /&gt;subnet 10.54.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-10.0.0.0 obj-10.0.0.0 destination static obj-10.54.0.0 obj-10.54.0.0 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;I don't think a policy is required as you are already mapping one private IP to the Public IP&lt;/P&gt;&lt;P&gt;object network obj-10.10.0.5&lt;BR /&gt;host 10.10.0.5&lt;BR /&gt;nat (inside,outside) static 24.55.156.4&lt;/P&gt;&lt;P&gt;No Nat on the DMZ should not be required anymore as NAT control is disabled now on the ASA 8.3 + code.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Sat, 04 Apr 2015 02:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/9-0-nat-question/m-p/2652131#M195362</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-04-04T02:00:49Z</dc:date>
    </item>
  </channel>
</rss>

