<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is it a must to set NAT in ASA for initial the network and which NAT config is the most secure in real practice in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580575#M198049</link>
    <description>&lt;P&gt;Is it a must to set NAT in ASA for initial the network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i see that there are a number of kinds of NAT setting such as policies, NAT, PAT,&lt;/P&gt;&lt;P&gt;what are their difference? which one is the simplest one? which is the most secure in real practice?&lt;/P&gt;</description>
    <pubDate>Tue, 26 Mar 2019 00:54:31 GMT</pubDate>
    <dc:creator>martlee2</dc:creator>
    <dc:date>2019-03-26T00:54:31Z</dc:date>
    <item>
      <title>Is it a must to set NAT in ASA for initial the network and which NAT config is the most secure in real practice</title>
      <link>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580575#M198049</link>
      <description>&lt;P&gt;Is it a must to set NAT in ASA for initial the network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i see that there are a number of kinds of NAT setting such as policies, NAT, PAT,&lt;/P&gt;&lt;P&gt;what are their difference? which one is the simplest one? which is the most secure in real practice?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580575#M198049</guid>
      <dc:creator>martlee2</dc:creator>
      <dc:date>2019-03-26T00:54:31Z</dc:date>
    </item>
    <item>
      <title>Hi, Typically you will need</title>
      <link>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580576#M198050</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Typically you will need atleast a Dynamic PAT configuration for a firewall that is on the LAN/WAN edge of a network. This is because without this the users traffic (if allowed by ACL) will be forwarded through the firewall without any NAT to a public IP address and naturally connection will fail as private IP addresses are not routable on the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the new ASA software levels that are 8.3 or above there are 2 ways to configure Dynamic PAT for your users&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Manual NAT / Twice NAT&lt;/LI&gt;&lt;LI&gt;Auto NAT / Network Object NAT&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The above are mainly different configuration formats on the ASA which give different options for you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here are examples of both&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Dynamic PAT with Manual NAT&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below configuration will perform Dynamic PAT for &lt;STRONG&gt;"any"&lt;/STRONG&gt; source address behind &lt;STRONG&gt;"any"&lt;/STRONG&gt; source interface and the Dynamic PAT IP address will be the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; IP address of the interface &lt;STRONG&gt;"outside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below configuration is similiar to the above example but uses an &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; to tell the ASA which internal subnet are valid source subnets for the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network LAN-SUBNETS&lt;BR /&gt;&amp;nbsp;network-object 10.10.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (any,outside) after-auto source LAN-SUBNETS interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Dynamic PAT with Auto NAT&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When comparing Auto NAT with the above Manual NAT its important to notice that the above Manual NAT only uses different objects as its parameters. Auto NAT on the other hand will always be configured under an &lt;STRONG&gt;"object"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below is a very basic Dynamic PAT configuration you can use for a single subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DYNAMIC-PAT&lt;BR /&gt;&amp;nbsp;subnet 10.10.10.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of the above examples I tend to use the Manual NAT configuration format as it keeps the NAT configuration smaller when dealing with multiple LAN subnets. Part of it also has to do with how I want to organize the NAT configuration in general.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can check some NAT configuration information about the new 8.3+ format from a document I wrote in 2013&lt;/P&gt;&lt;P&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question. Feel free to ask more if needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2015 09:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580576#M198050</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2015-01-12T09:11:33Z</dc:date>
    </item>
    <item>
      <title> it seems the essential NAT</title>
      <link>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580577#M198051</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it seems the essential NAT config for initial setup&lt;/P&gt;&lt;P&gt;i find a youtube video using config below, is it wrong? it seems different from your official one.&lt;/P&gt;&lt;P&gt;conf t&lt;BR /&gt;no global (outside) 1 192.168.1.4&lt;BR /&gt;no nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;end&lt;/P&gt;&lt;P&gt;then i change to use your config below&lt;/P&gt;&lt;P&gt;conf t&lt;BR /&gt;object network DYNAMIC-PAT&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;besides essential NAT, why it can implement extra NAT? what are they? will they duplicate the function as essential ones?&lt;/P&gt;&lt;P&gt;just a mapping table, what extra function can be implemented besides essential NAT command above&lt;/P&gt;&lt;P&gt;as i know that there is a kind of NAT include the port too, is PAT represent Port something?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2015 14:58:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-it-a-must-to-set-nat-in-asa-for-initial-the-network-and-which/m-p/2580577#M198051</guid>
      <dc:creator>martlee2</dc:creator>
      <dc:date>2015-01-12T14:58:49Z</dc:date>
    </item>
  </channel>
</rss>

