<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ASA NAT Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513352#M235602</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;In my scenario I have a remote server communicating with a private local server open to the world via static NAT.&lt;/P&gt;&lt;P&gt;Remote server: 1.1.1.1&lt;BR /&gt;ASA Outside: 2.2.2.2&lt;BR /&gt;ASA Inside:&amp;nbsp;192.168.1.254&lt;BR /&gt;Private Server: 192.168.1.100&lt;/P&gt;&lt;P&gt;I have configured static NAT to allow outside connections in to the private server. The private server is a linux host with a default gateway pointing to another device in the LAN on IP address 192.168.1.1.&lt;/P&gt;&lt;P&gt;So as to not add static routes on&amp;nbsp;the linux host pointing towards the ASA for each destination the Private server will be replying to, I am looking to change the Remote servers IP address using&amp;nbsp;NAT during the&amp;nbsp;initial connection.&lt;/P&gt;&lt;P&gt;This would mean the packet has the following details before NAT:&lt;/P&gt;&lt;P&gt;Source IP: 1.1.1.1&lt;BR /&gt;Destination IP: 2.2.2.2&lt;/P&gt;&lt;P&gt;After NAT, the packets should have the following details:&lt;/P&gt;&lt;P&gt;Source IP:&amp;nbsp;192.168.1.254&lt;BR /&gt;Destination IP: 192.168.1.100&lt;/P&gt;&lt;P&gt;Rather than:&lt;/P&gt;&lt;P&gt;Source IP: 1.1.1.1&lt;BR /&gt;Destination IP: 192.168.1.100&lt;/P&gt;&lt;P&gt;Is this solution possbile on a Cisco ASA?&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:37:26 GMT</pubDate>
    <dc:creator>Stuart Stevenson</dc:creator>
    <dc:date>2019-03-12T04:37:26Z</dc:date>
    <item>
      <title>Cisco ASA NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513352#M235602</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;In my scenario I have a remote server communicating with a private local server open to the world via static NAT.&lt;/P&gt;&lt;P&gt;Remote server: 1.1.1.1&lt;BR /&gt;ASA Outside: 2.2.2.2&lt;BR /&gt;ASA Inside:&amp;nbsp;192.168.1.254&lt;BR /&gt;Private Server: 192.168.1.100&lt;/P&gt;&lt;P&gt;I have configured static NAT to allow outside connections in to the private server. The private server is a linux host with a default gateway pointing to another device in the LAN on IP address 192.168.1.1.&lt;/P&gt;&lt;P&gt;So as to not add static routes on&amp;nbsp;the linux host pointing towards the ASA for each destination the Private server will be replying to, I am looking to change the Remote servers IP address using&amp;nbsp;NAT during the&amp;nbsp;initial connection.&lt;/P&gt;&lt;P&gt;This would mean the packet has the following details before NAT:&lt;/P&gt;&lt;P&gt;Source IP: 1.1.1.1&lt;BR /&gt;Destination IP: 2.2.2.2&lt;/P&gt;&lt;P&gt;After NAT, the packets should have the following details:&lt;/P&gt;&lt;P&gt;Source IP:&amp;nbsp;192.168.1.254&lt;BR /&gt;Destination IP: 192.168.1.100&lt;/P&gt;&lt;P&gt;Rather than:&lt;/P&gt;&lt;P&gt;Source IP: 1.1.1.1&lt;BR /&gt;Destination IP: 192.168.1.100&lt;/P&gt;&lt;P&gt;Is this solution possbile on a Cisco ASA?&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:37:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513352#M235602</guid>
      <dc:creator>Stuart Stevenson</dc:creator>
      <dc:date>2019-03-12T04:37:26Z</dc:date>
    </item>
    <item>
      <title>Hi, It should be possible. At</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513353#M235603</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It should be possible. At the moment I am wondering what your ASA software level is though? This is a little simpler to handle in the new ASA softwares (8.3 and above) and the older ones (8.2 and below)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the new software you would use the following configurations. In your case though I would probably use some free IP address from the subnet 192.168.1.0/24 for this NAT rather than the ASA interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SOURCE-REAL&lt;BR /&gt;&amp;nbsp;host 192.168.1.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SOURCE-MAPPED&lt;BR /&gt;&amp;nbsp;host 2.2.2.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DESTINATION-REAL&lt;BR /&gt;&amp;nbsp;host 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DESTINATION-MAPPED&lt;BR /&gt;&amp;nbsp;host 192.168.1.253&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static SOURCE-REAL SOURCE-MAPPED destination static DESTINATION-MAPPED DESTINATION-REAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This&lt;STRONG&gt; "nat"&lt;/STRONG&gt; configuration would do translation to both the source and destination IP address. Looking at the above NAT configuration we would see that traffic coming from &lt;STRONG&gt;DESTINATION-REAL&lt;/STRONG&gt; towards &lt;STRONG&gt;SOURCE-MAPPED&lt;/STRONG&gt; would have the effect that the &lt;STRONG&gt;SOURCE-MAPPED&lt;/STRONG&gt; would get untranslated to &lt;STRONG&gt;SOURCE-REAL&lt;/STRONG&gt; and &lt;STRONG&gt;DESTINATION-REAL&lt;/STRONG&gt; would get translated to &lt;STRONG&gt;DESTINATION-MAPPED&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Naturally me using the terms &lt;STRONG&gt;SOURCE&lt;/STRONG&gt; and &lt;STRONG&gt;DESTINATION&lt;/STRONG&gt; in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations might create some confusion depending from which "direction" you are actually looking the situation from. You should naturally use different &lt;STRONG&gt;"object"&lt;/STRONG&gt; names to make the configuration easier to read for you. That is if you are using the new software?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 05:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513353#M235603</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-08-13T05:45:47Z</dc:date>
    </item>
    <item>
      <title>Hi Jouni,Thanks for that.We</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513354#M235605</link>
      <description>&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;Thanks for that.&lt;/P&gt;&lt;P&gt;We are currently using ASA 8.2.&lt;/P&gt;&lt;P&gt;I know we're talking about 8.3 here; however would this solution not require every possible destination to be added to the DESTINATION-REAL object? This wouldn't be a problem for us as we only have a small amount of possible DESTINATION-REALs&amp;nbsp;(remote servers only accessible over site-to-site VPN).&lt;/P&gt;&lt;P&gt;I understand the best solution would be to simply change the default gateway on the internal server, just curious if this would be possible in an 8.2 environment without any changes to hosts.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Aug 2014 08:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat-problem/m-p/2513354#M235605</guid>
      <dc:creator>Stuart Stevenson</dc:creator>
      <dc:date>2014-08-13T08:05:06Z</dc:date>
    </item>
  </channel>
</rss>

