<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025524#M22770</link>
    <description>&lt;P&gt;Static NAT to the outside interface will likely not work. Configure a dynamic NAT/PAT for outgoing traffic. This NAT-statement should go to Section 3, "after auto NAT".&lt;/P&gt;</description>
    <pubDate>Fri, 07 Feb 2020 09:42:24 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2020-02-07T09:42:24Z</dc:date>
    <item>
      <title>ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025439#M22766</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;I have problem to give internet access to a specific host from the ASA, I have a static NAT from host x.x.x.x to the outside interface and I also have an acces-list&amp;nbsp; permit the host x.x.x.x to any ip. But the host still not going to the internet.&lt;/P&gt;&lt;P&gt;Please see the attached pcap for you reference and please help me to figure out what happen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;DM&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 07:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025439#M22766</guid>
      <dc:creator>denilson.mota</dc:creator>
      <dc:date>2020-02-07T07:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025524#M22770</link>
      <description>&lt;P&gt;Static NAT to the outside interface will likely not work. Configure a dynamic NAT/PAT for outgoing traffic. This NAT-statement should go to Section 3, "after auto NAT".&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 09:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025524#M22770</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-02-07T09:42:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025533#M22774</link>
      <description>&lt;P&gt;Hello Karsten,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply,&lt;/P&gt;&lt;P&gt;I deleted all NAT for this particular rule and I have created a dynamic NAT/PAT but still not going to the internet.&lt;/P&gt;&lt;P&gt;this is the command a used:&lt;/P&gt;&lt;P&gt;nat (Customs,Outside) after-auto source dynamic RemoteGroup_Internet-Access interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 10:11:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025533#M22774</guid>
      <dc:creator>denilson.mota</dc:creator>
      <dc:date>2020-02-07T10:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025537#M22778</link>
      <description>&lt;P&gt;What does packet-tracer tell you when simulating a connection?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 10:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025537#M22778</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-02-07T10:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025544#M22780</link>
      <description>&lt;P&gt;This is the output for the packet tracer:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: CAPTURE&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaadcffd810, priority=13, domain=capture, deny=false&lt;BR /&gt;hits=21355839, user_data=0x2aaadccc62c0, cs_id=0x0, l3_type=0x0&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad82c9fe0, priority=1, domain=permit, deny=false&lt;BR /&gt;hits=754156783, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.30.3 using egress ifc Outside&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Customs_access_in in interface Customs&lt;BR /&gt;access-list Customs_access_in extended permit object-group DM_INLINE_SERVICE_45 object-group RemoteGroup_Internet-Access any4&lt;BR /&gt;object-group service DM_INLINE_SERVICE_45&lt;BR /&gt;group-object Ping&lt;BR /&gt;service-object tcp destination eq www&lt;BR /&gt;service-object tcp destination eq https&lt;BR /&gt;object-group network RemoteGroup_Internet-Access&lt;BR /&gt;network-object object Maputo-APN-TEST&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaadd3c4820, priority=13, domain=permit, deny=false&lt;BR /&gt;hits=19, user_data=0x2aaae7bcef80, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=172.189.10.11, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=443, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt;match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class class-default&lt;BR /&gt;set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaea091890, priority=7, domain=conn-set, deny=false&lt;BR /&gt;hits=43004879, user_data=0x2aaaea08b1c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Customs,Outside) after-auto source dynamic RemoteGroup_Internet-Access interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Dynamic translate 172.189.10.11/443 to 10.0.30.1/443&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaecade330, priority=6, domain=nat, deny=false&lt;BR /&gt;hits=24, user_data=0x2aaadc22e850, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.189.10.11, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac6e87930, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=191613289, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad82d2f00, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=59151317, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaaea09f4b0, priority=70, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=39551817, user_data=0x2aaaea097490, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaadb59e9a0, priority=20, domain=lu, deny=false&lt;BR /&gt;hits=16725822, user_data=0x0, cs_id=0x0, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (Customs,Outside) after-auto source dynamic RemoteGroup_Internet-Access interface&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;out id=0x2aaaddc47a60, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;hits=25, user_data=0x2aaadcd83270, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=172.189.10.11, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Customs, output_ifc=Outside&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaac6e87930, priority=1, domain=nat-per-session, deny=true&lt;BR /&gt;hits=191613291, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x2aaad81033c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=44025294, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=Outside, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 14&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 241221054, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 15&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.0.30.3 using egress ifc Outside&lt;/P&gt;&lt;P&gt;Phase: 16&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 001f.a011.9838 hits 201496 reference 6236&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: Customs&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 10:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025544#M22780</guid>
      <dc:creator>denilson.mota</dc:creator>
      <dc:date>2020-02-07T10:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025555#M22783</link>
      <description>&lt;P&gt;At least the ASA says it would be allowed and that the right NAT-rule is used. It is likely that the problem is somewhere else.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Feb 2020 10:41:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/4025555#M22783</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2020-02-07T10:41:19Z</dc:date>
    </item>
  </channel>
</rss>

