<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Vibhor, What we have is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574069#M206029</link>
    <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we have is follows: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients -&amp;gt; virtual firewall with public IP on sub-interface (security level 50) of Cisco ASA -&amp;gt; Outside interface of Cisco ASA (security level 0)&amp;nbsp;-&amp;gt; private sub-interface (security level 100)&amp;nbsp;-&amp;gt;&amp;nbsp;Webserver with private IP&lt;/P&gt;&lt;P&gt;The 2 sub-interfaces are on the same physical interface.&lt;/P&gt;&lt;P&gt;The NAT statement is an object NAT statement as below: -&lt;/P&gt;&lt;P&gt;object network WEBSERVER_DMZ.HTTPS&lt;BR /&gt;&amp;nbsp;nat (WEBSERVER_DMZ,outside) static &amp;lt;public IP&amp;gt; service tcp https https&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet Tracer output: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW01# packet-tracer input outside tcp &amp;lt;client public IP&amp;gt;&amp;nbsp;3456 &amp;lt;server private IP&amp;gt; 443 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x73fdbd08, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6961066005, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 1.2.3.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.128 WEBSERVER_DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; a.b.c.d&amp;nbsp; &amp;nbsp;255.255.255.224 ClientExternalNetwork&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: WEBSERVER_DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hmmm... is that packet trace correct? &amp;nbsp;Is the RPF the cause of my issue?&lt;/P&gt;</description>
    <pubDate>Wed, 15 Oct 2014 02:46:55 GMT</pubDate>
    <dc:creator>Peter Ellwood</dc:creator>
    <dc:date>2014-10-15T02:46:55Z</dc:date>
    <item>
      <title>ASA NAT with 2 interfaces with public IP ranges</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574067#M206027</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am having some difficulty with what I believe is a NAT issue.&lt;/P&gt;&lt;P&gt;We have a Cisco ASA 5520 that we have a large amount of sub-interfaces on.&lt;/P&gt;&lt;P&gt;Some of these sub-interfaces have public IP address ranges, whilst others have private IP address ranges.&lt;/P&gt;&lt;P&gt;Our outside interface, for example, is one with a public IP address range.&lt;/P&gt;&lt;P&gt;I am experiencing an issue when trying to access a webserver server from one of the sub-interfaces with a public IP address range associated to it.&lt;/P&gt;&lt;P&gt;I am leaning towards it being a NAT issue because I can see the traffic leaving the Public interface A and I can see it reaching the outside interface but it does not reach the back end server.&lt;/P&gt;&lt;P&gt;Originally I thought it may be hairpinning but I don't believe it is as these are 2 different interfaces with different security levels. &amp;nbsp;Public interface A has security level 50 and the outside interface has security level 0.&lt;/P&gt;&lt;P&gt;The outside interface of the Cisco ASA is in a /28 however the public IP address on the outside interface is part of a routed /24. &amp;nbsp;The IP address we are trying from is in a seperate /28 that is also routed to the Cisco ASA but is associated to a sub-interface.&lt;/P&gt;&lt;P&gt;The NAT on the outside interface of the web server uses Proxy Arp and does not use DNS translation.&lt;/P&gt;&lt;P&gt;Has anyone done anything similar successfully (I imagine so?). &amp;nbsp;&lt;/P&gt;&lt;P&gt;I am not seeing any denies or portmap translation errors in the logs, nor am I seeing any packets reaching the backend host when using Wireshark.&lt;/P&gt;&lt;P&gt;One the firewall I can see the SYN's reaching the outside interface but not progressing any further.&lt;/P&gt;&lt;P&gt;I have tested several different NAT scenario's all to no avail and am hoping someone can point me in the right direction.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:55:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574067#M206027</guid>
      <dc:creator>Peter Ellwood</dc:creator>
      <dc:date>2019-03-12T04:55:51Z</dc:date>
    </item>
    <item>
      <title>Hi,Please explain a bit more</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574068#M206028</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Please explain a bit more about the setup.&lt;/P&gt;&lt;P&gt;Clients ---- Public IP Interface [ASA]---Outside interface-----Interface&lt;/P&gt;&lt;P&gt;Where is the WebServer located ? If on the Outside , can you give me the packet tracer output:-&lt;/P&gt;&lt;P&gt;packet input &amp;lt;Public IP Interface&amp;gt; tcp &amp;lt;IP of the client&amp;gt; 3456 &amp;lt;Webserver IP&amp;gt; 80 det&lt;/P&gt;&lt;P&gt;If not , which interface is it located behind and what NAT statements are there on the ASA device for it ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 01:59:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574068#M206028</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-15T01:59:19Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor, What we have is</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574069#M206029</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What we have is follows: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clients -&amp;gt; virtual firewall with public IP on sub-interface (security level 50) of Cisco ASA -&amp;gt; Outside interface of Cisco ASA (security level 0)&amp;nbsp;-&amp;gt; private sub-interface (security level 100)&amp;nbsp;-&amp;gt;&amp;nbsp;Webserver with private IP&lt;/P&gt;&lt;P&gt;The 2 sub-interfaces are on the same physical interface.&lt;/P&gt;&lt;P&gt;The NAT statement is an object NAT statement as below: -&lt;/P&gt;&lt;P&gt;object network WEBSERVER_DMZ.HTTPS&lt;BR /&gt;&amp;nbsp;nat (WEBSERVER_DMZ,outside) static &amp;lt;public IP&amp;gt; service tcp https https&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Packet Tracer output: -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FW01# packet-tracer input outside tcp &amp;lt;client public IP&amp;gt;&amp;nbsp;3456 &amp;lt;server private IP&amp;gt; 443 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x73fdbd08, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6961066005, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; 1.2.3.0 &amp;nbsp; &amp;nbsp; &amp;nbsp;255.255.255.128 WEBSERVER_DMZ&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; a.b.c.d&amp;nbsp; &amp;nbsp;255.255.255.224 ClientExternalNetwork&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: WEBSERVER_DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hmmm... is that packet trace correct? &amp;nbsp;Is the RPF the cause of my issue?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 02:46:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574069#M206029</guid>
      <dc:creator>Peter Ellwood</dc:creator>
      <dc:date>2014-10-15T02:46:55Z</dc:date>
    </item>
    <item>
      <title>Hi,You need to correct the</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574070#M206030</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You need to correct the Packet trace.&lt;/P&gt;&lt;P&gt;The packet tracer has to be for the destination as server public IP and not the private IP.&lt;/P&gt;&lt;P&gt;Also , why are you routing the traffic from the Source Sub interface of the client to the Outside interface first and then routing it back to the Webserver DMz interface ?&lt;/P&gt;&lt;P&gt;Why can't it be routed from the Source Sub Interface for the client to the WebServer DMZ on the ASA device ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 03:46:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574070#M206030</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-15T03:46:35Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor,Packet trace below,</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574071#M206031</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;Packet trace below, corrected as advised.&lt;/P&gt;&lt;P&gt;With regards to the your question on the routing, the Web Server and the client are different customers - they should not "see" each other's private IP ranges and should only see the public IP addresses.&lt;/P&gt;&lt;P&gt;FW01# packet-tracer input outside tcp &lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp;&amp;lt;client public IP&amp;gt;&amp;nbsp;3456 &amp;lt;web server public IP&amp;gt; 443 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x73fdbd08, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=6971222339, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;/P&gt;&lt;P style="font-size: 14px;"&gt;object network WEBSERVER_DMZ.HTTPS&lt;BR /&gt;&amp;nbsp;nat (WEBSERVER_DMZ,outside) static EXT-WEBSERVER service tcp https https&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface WEBSERVER_DMZ&lt;BR /&gt;Untranslate &amp;lt;public IP&amp;gt;/443 to &amp;lt;private IP&amp;gt;/443&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in &amp;nbsp; a.b.c.d &amp;nbsp;255.255.255.224 ClientExternalNetwork&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: WEBSERVER_DMZ&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (rpf-violated) Reverse-path verify failed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 03:53:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574071#M206031</guid>
      <dc:creator>Peter Ellwood</dc:creator>
      <dc:date>2014-10-15T03:53:32Z</dc:date>
    </item>
    <item>
      <title>Hi,If i understand it correct</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574072#M206032</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;If i understand it correct , you are using ASA in mutiple context on the ASA device ? Is that correct ?&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 05:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574072#M206032</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-15T05:30:52Z</dc:date>
    </item>
    <item>
      <title>Hello Vibhor,Thanks for</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574073#M206033</link>
      <description>&lt;P&gt;Hello Vibhor,&lt;/P&gt;&lt;P&gt;Thanks for trying to assist.&lt;/P&gt;&lt;P&gt;No we are not running the ASA in multi-context mode, it is running in single-context mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 06:06:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574073#M206033</guid>
      <dc:creator>Peter Ellwood</dc:creator>
      <dc:date>2014-10-15T06:06:53Z</dc:date>
    </item>
    <item>
      <title>Hi,Can you share the complete</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574074#M206034</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can you share the complete packet tracer output and the configuration.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 06:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574074#M206034</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2014-10-15T06:19:01Z</dc:date>
    </item>
    <item>
      <title>Hi Vibhor,That's difficult</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574075#M206035</link>
      <description>&lt;P&gt;Hi Vibhor,&lt;/P&gt;&lt;P&gt;That's difficult due to the confidential nature of the information but I'll do the best I can.&lt;/P&gt;&lt;P&gt;Having said that, it is definitely RPF on the outside interface - if I disable RPF on the outside interface it works like a charm.&lt;/P&gt;&lt;P&gt;For some reason the traffic flow is acting like this: -&lt;/P&gt;&lt;P&gt;client --&amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;virtual firewall with public IP on sub-interface (security level 50) of Cisco ASA -- routed externally -- back to outside Interface of Cisco ASA -- Cisco ASA drops the packet due to RPF (as it originated from a sub-interface of the ASA).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Argh! &amp;nbsp;It shouldn't have to NAT as I can't imagine it having to translate anything - it's going from a public IP on one interface to a public IP on another interface, that should be routing, not NAT'ing... though thinking about it, it's sending it externally because the IP on the outside interface isn't directly on the outside interface, it's in a different subnet (class /24) that's routed down to the outside interface and proxy-ARP'd so there's no route on the firewall for that subnet....&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2014 11:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-with-2-interfaces-with-public-ip-ranges/m-p/2574075#M206035</guid>
      <dc:creator>Peter Ellwood</dc:creator>
      <dc:date>2014-10-15T11:12:54Z</dc:date>
    </item>
  </channel>
</rss>

