<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: problem with Destination NAT on ASAv in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022187#M22873</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You are communicating with 44.44.44.44, in your current configuration you have defined the original destination as &lt;STRONG&gt;map_inside &lt;/STRONG&gt;(192.168.1.240), the original and translated destination should be the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source static real_inside map_inside destination static &lt;STRONG&gt;real_outside&lt;/STRONG&gt; real_outside&lt;/PRE&gt;&lt;P&gt;This will translate source from 192.168.1.200 to 192.168.1.240 when the destination is 44.44.44.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 01 Feb 2020 21:43:33 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-02-01T21:43:33Z</dc:date>
    <item>
      <title>problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022183#M22870</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am new to Asa doing practice in eve-ng with ASAv&amp;nbsp; V 9.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TEST.png" style="width: 652px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66364i07AA61069F3F8759/image-dimensions/652x199?v=v2" width="652" height="199" role="button" title="TEST.png" alt="TEST.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;in this topology i have a server inside with IP address of&amp;nbsp;&amp;nbsp; 192.168.1.200&amp;nbsp;&amp;nbsp; and want to reach the loopback address on R2 with IP 44.44.44.44 with NAT&amp;nbsp;&amp;nbsp; but i want to practice the Twice NAT (Destination NAT ) and change both source and destination .&amp;nbsp;&amp;nbsp; this is configuration I have done on firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network real_inside&lt;/P&gt;&lt;P&gt;Host 192.168.1.200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network&amp;nbsp; real_outside&lt;/P&gt;&lt;P&gt;Host 44.44.44.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network map_inside&lt;/P&gt;&lt;P&gt;Host 192.168.1.240&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network map_outside&lt;/P&gt;&lt;P&gt;Host 10.10.14.40&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static real_inside map_inside destination static map_inside real_outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;without NAT , destination is reachable but when apply NAT can not reach destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;bellow is result of packet capture on ASAv&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa#packet-tracer input inside icmp 192.168.1.200 0 0 44.44.44.44&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 10.10.14.4 using egress ifc outside&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Result: DROP&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Config:&lt;BR /&gt;nat (inside,outside) source static real_inside map_inside destination static map_inside real_outside&lt;BR /&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;Action: drop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ciscoasa# show xlate&lt;BR /&gt;2 in use, 11 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;s - static, T - twice, N - net-to-net&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;NAT from inside:192.168.1.200 to outside:192.168.1.240&lt;/FONT&gt;&lt;BR /&gt;flags sT idle 0:10:59 timeout 0:00:00&lt;BR /&gt;&lt;FONT color="#0000FF"&gt;NAT from outside:44.44.44.44 to inside:192.168.1.240&lt;/FONT&gt;&lt;BR /&gt;flags sT idle 0:10:59 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;==============================&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in bellow I paste the firewall configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.10.13.1 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 10.10.14.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;object network real_inside&lt;BR /&gt;host 192.168.1.200&lt;BR /&gt;object network real_outside&lt;BR /&gt;host 44.44.44.44&lt;BR /&gt;object network map_inside&lt;BR /&gt;host 192.168.1.240&lt;BR /&gt;object network map_outside&lt;BR /&gt;host 10.10.14.40&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list out extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;nat (inside,outside) source static real_inside map_inside destination static map_inside real_outside&lt;BR /&gt;access-group out in interface outside&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router ospf 1&lt;BR /&gt;network 10.10.13.0 255.255.255.0 area 0&lt;BR /&gt;default-information originate&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 10.10.14.4 1&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 21:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022183#M22870</guid>
      <dc:creator>wikinetwork</dc:creator>
      <dc:date>2020-02-01T21:30:54Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022187#M22873</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You are communicating with 44.44.44.44, in your current configuration you have defined the original destination as &lt;STRONG&gt;map_inside &lt;/STRONG&gt;(192.168.1.240), the original and translated destination should be the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source static real_inside map_inside destination static &lt;STRONG&gt;real_outside&lt;/STRONG&gt; real_outside&lt;/PRE&gt;&lt;P&gt;This will translate source from 192.168.1.200 to 192.168.1.240 when the destination is 44.44.44.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 21:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022187#M22873</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-01T21:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022197#M22875</link>
      <description>&lt;P&gt;thanks Dear&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;your solution works but is this change the source and destination in this solution ?and is this same as Twice NAT ?&lt;/P&gt;&lt;P&gt;one more question in which scenario we use &lt;U&gt;different destination address at the end of script&lt;/U&gt; ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 22:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022197#M22875</guid>
      <dc:creator>wikinetwork</dc:creator>
      <dc:date>2020-02-01T22:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022199#M22876</link>
      <description>&lt;P&gt;Your example only changes the source. A Twice NAT rule basically lets you identify the source and destination address in a NAT rule, which is what you've configured except you haven't changed the destination IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One scenario when you would change the destination IP address could be if your client devices are configured to use Google DNS 8.8.8.8 but you want to redirect any traffic destined to 8.8.8.8 to another provider such as Cisco Umbrella (207.67.222.222). NAT rule example:-&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source static real_inside map_inside destination static GoogleDNS UmbrellaDNS&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Feb 2020 22:56:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022199#M22876</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-01T22:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022262#M22922</link>
      <description>&lt;P&gt;Thank You so much Dear RJI&lt;/P&gt;&lt;P&gt;I test and it work perfect ,I just post the details of the topology it might help somebody in future&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in this topology if somebody want to reach the google DNS (8.8.8.8) from inside host , ASA will redirect the packets to destination which we will define and send the packet back to the WEB server (Web server don't know the IP address of destination and only set google DNS as destination )&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Topo.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66373i6F5D2F86F1869F96/image-size/large?v=v2&amp;amp;px=999" role="button" title="Topo.JPG" alt="Topo.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Debug on Router R4&amp;nbsp; in outside (Loopback 44 : 44:44:44:44 )&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="R4.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66371i462167A28979D144/image-size/large?v=v2&amp;amp;px=999" role="button" title="R4.JPG" alt="R4.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WEB-SERVER.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66372i0EA097CC5FCB3CD0/image-size/large?v=v2&amp;amp;px=999" role="button" title="WEB-SERVER.JPG" alt="WEB-SERVER.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa.JPG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/66370iA95C620FF602ADFD/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa.JPG" alt="asa.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;final NAT configuration :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network real_inside&lt;/P&gt;&lt;P&gt;Host 192.168.1.200&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network map_inside&lt;/P&gt;&lt;P&gt;Host 192.168.1.240&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;googledns&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;host 8.8.8.8&lt;BR /&gt;object network &lt;STRONG&gt;&lt;FONT color="#3366FF"&gt;ciscoum&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;host 44.44.44.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static real_inside map_inside destination static &lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;googledns &lt;FONT color="#3366FF"&gt;ciscoum&lt;/FONT&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 02 Feb 2020 07:04:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022262#M22922</guid>
      <dc:creator>wikinetwork</dc:creator>
      <dc:date>2020-02-02T07:04:20Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022476#M22923</link>
      <description>&lt;P&gt;Dear RJI&lt;/P&gt;&lt;P&gt;one more question comes in my minds is that regarding to real word design ,how we should choose this IP address n real world network&amp;nbsp; for map_inside&amp;nbsp; IP , since in this topology i have default route for return route to firewall , do we need to choose this IP in private range of our organization , I would appreciate to clear it for me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Object network map_inside&lt;/P&gt;&lt;P&gt;Host 192.168.1.240&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 03:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022476#M22923</guid>
      <dc:creator>wikinetwork</dc:creator>
      <dc:date>2020-02-03T03:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: problem with Destination NAT on ASAv</title>
      <link>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022561#M22924</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The NAT ip address you use needs to be routable from the destination, so if the firewall is connected to the internet you would need to NAT to a public IP address. If the firewall is located on a private WAN and the destination device can route to a private IP address then that will obviously work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 09:12:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-with-destination-nat-on-asav/m-p/4022561#M22924</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-03T09:12:56Z</dc:date>
    </item>
  </channel>
</rss>

