<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, Ok that again clears some in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493537#M236698</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok that again clears some things up but you have not mentioned the IP address that you want us to use as the NAT IP address. Or if you want to NAT the whole LAN network 172.16.58.0/24 to some other NAT network perhaps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or perhaps you are meaning something else with the Hide NAT? I would presume you want to "hide" the internal network 172.16.58.0/24 by NATing it to some IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you clear this up then we should be able to provide the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jul 2014 09:58:59 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-07-11T09:58:59Z</dc:date>
    <item>
      <title>Hide NAT</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493521#M236660</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can&amp;nbsp; some&amp;nbsp; one&amp;nbsp; guide&amp;nbsp; me to&amp;nbsp; configure&amp;nbsp; Hide&amp;nbsp; NAT on the Cisco ASA 5510 Firewall.&amp;nbsp; i am&amp;nbsp; using&amp;nbsp; the&amp;nbsp; ASA in my&amp;nbsp; network.The&amp;nbsp; users&amp;nbsp; at&amp;nbsp; inside&amp;nbsp; interface&amp;nbsp;&amp;nbsp; traffic&amp;nbsp;&amp;nbsp; need to&amp;nbsp; go&amp;nbsp; to&amp;nbsp; the&amp;nbsp; DMZ&amp;nbsp; interface&amp;nbsp; and&amp;nbsp; access the remote&amp;nbsp; three &amp;nbsp; servers&amp;nbsp; through&amp;nbsp; s2s vpn .The&amp;nbsp; VPN device&amp;nbsp;&amp;nbsp; connected&amp;nbsp; between&amp;nbsp; the&amp;nbsp; Internet&amp;nbsp; Router and&amp;nbsp; ASA DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advice,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:27:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493521#M236660</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2019-03-12T04:27:31Z</dc:date>
    </item>
    <item>
      <title>Duplicate post.  Go here:</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493522#M236662</link>
      <description>&lt;P&gt;Duplicate post.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Go here: &amp;nbsp;https://supportforums.cisco.com/discussion/12252981/hide-nat&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 05:37:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493522#M236662</guid>
      <dc:creator>Leo Laohoo</dc:creator>
      <dc:date>2014-07-11T05:37:17Z</dc:date>
    </item>
    <item>
      <title>I need  command  to </title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493523#M236665</link>
      <description>&lt;P&gt;I need&amp;nbsp; command&amp;nbsp; to&amp;nbsp; configure&amp;nbsp; it either&amp;nbsp; through ASDM or&amp;nbsp; CLI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 05:45:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493523#M236665</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T05:45:50Z</dc:date>
    </item>
    <item>
      <title>Hi, I think we need a bit</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493524#M236668</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think we need a bit more information to confirm what the actual situation is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understood correctly you have a VPN device behind the DMZ interface of the ASA that has the L2L VPN connection behind which the resources you need are.&lt;/P&gt;&lt;P&gt;It also seems that you would be needing a NAT configuration that does a translation for &lt;STRONG&gt;"inside"&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; traffic ONLY when the traffic is destined to the remote network behind the L2L VPN connection?&lt;/P&gt;&lt;P&gt;In that case you would probably use a Dynamic Policy PAT type of configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you confirm the above information? Naturally if you can provide some current configurations OR tell us the network/IP information related to the required NAT and how its supposed to work. Also an important information would be what software version your ASA is running as the NAT configuration format might be completely different depending on the software you are running (8.2 and below vs. 8.3 and above have totally different NAT configuration format)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 06:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493524#M236668</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-11T06:20:56Z</dc:date>
    </item>
    <item>
      <title>please find the details. i</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493525#M236672</link>
      <description>&lt;P&gt;please find the details.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have&amp;nbsp; one&amp;nbsp; internet&amp;nbsp; router. Behind&amp;nbsp; it&amp;nbsp; the&amp;nbsp; ASA Firewall&amp;nbsp; is&amp;nbsp; connected then&amp;nbsp; the&amp;nbsp; L3&amp;nbsp; Switch.&lt;/P&gt;&lt;P&gt;the&amp;nbsp; VPN Device&amp;nbsp; is&amp;nbsp; public&amp;nbsp; interface is&amp;nbsp; connected&amp;nbsp; to&amp;nbsp; Internet&amp;nbsp; Router and&amp;nbsp; private&amp;nbsp; Interface is&amp;nbsp; connected to&amp;nbsp; the ASA Firewall&amp;nbsp;&amp;nbsp; DMZ.&amp;nbsp; for&amp;nbsp; connecting&amp;nbsp; ASA and the vpn Router&amp;nbsp; using&amp;nbsp; /29&amp;nbsp; space of private &amp;nbsp; ip address .the&amp;nbsp; users of&amp;nbsp; one&amp;nbsp; VLAN&amp;nbsp; Traffic&amp;nbsp; need&amp;nbsp; to&amp;nbsp; access the remote&amp;nbsp; servers&amp;nbsp; through the&lt;/P&gt;&lt;P&gt;VPN device .for example&amp;nbsp; users&amp;nbsp; subnet&amp;nbsp; is&amp;nbsp; 172.16.58.0/24&amp;nbsp;&amp;nbsp; need&amp;nbsp; to&amp;nbsp; access the server ip address 209.196.208.52&amp;nbsp; through the vpn device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also&amp;nbsp; i am&amp;nbsp; going the&amp;nbsp; enclosed the viso&amp;nbsp; of the network in pdf form&amp;nbsp; for&amp;nbsp; better understanding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493525#M236672</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T07:06:46Z</dc:date>
    </item>
    <item>
      <title>Your query is quite confusing</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493526#M236676</link>
      <description>&lt;P&gt;Your query is quite confusing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) You want to access the servers that are in DMZ zone from inside LAN?&lt;/P&gt;&lt;P&gt;2) Also you want to access some servers that are in remote site through site to site VPN?&lt;/P&gt;&lt;P&gt;3) what do you mean by VPN device connected between ASA DMZ and Internet?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:09:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493526#M236676</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-11T07:09:36Z</dc:date>
    </item>
    <item>
      <title>Hi, Ok, that clarifies things</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493527#M236679</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok, that clarifies things a bit but I am still wondering what is the NAT IP address you want to use? What is the IP address with which the users connections should be visible to the remote server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also you did not mention the ASAs software level which we need to know for the correct NAT configuration format.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To give you example of both configuration formats then they could be the following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Software 8.2 and below&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN-POLICYPAT remark Policy NAT for L2L VPN&lt;BR /&gt;access-list VPN-POLICYPAT permit ip 172.16.58.0 255.255.255.0 host 209.196.208.52&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (dmz) 200 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (dmz) 200 &amp;lt;NAT ip address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 200 access-list VPN-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Software 8.3 and above&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMX-LAN&lt;BR /&gt;&amp;nbsp;subnet 172.16.58.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE-SERVER&lt;BR /&gt;&amp;nbsp;host 209.196.208.52&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,dmz) source dynamic SMX-LAN interface destination static REMOTE-SERVER REMOTE-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The above configuration uses the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter to define that the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface IP address is used as the PAT address. (in the same way that the above older format configuration uses the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; parameter)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you wanted to use a separate NAT IP address (other than the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface IP address) then you would need one additional &lt;STRONG&gt;"object"&lt;/STRONG&gt; configuration and a bit different &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMX-LAN&lt;BR /&gt;&amp;nbsp;subnet 172.16.58.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE-SERVER&lt;BR /&gt;&amp;nbsp;host 209.196.208.52&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAT-IP&lt;BR /&gt;&amp;nbsp;host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,dmz) source dynamic SMX-LAN NAT-IP destination static REMOTE-SERVER REMOTE-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind that in both of the cases (with both levels of software) the required configuration depends on how your firewall is currently configured. There might be other NAT configurations that affect these configurations and would therefore override their operation.&lt;/P&gt;&lt;P&gt;Hope this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:20:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493527#M236679</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-11T07:20:41Z</dc:date>
    </item>
    <item>
      <title>so you want the inside LAN</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493528#M236684</link>
      <description>&lt;P&gt;so you want the inside LAN users to access the servers in SxM network through the DMZ interface of ASA to the VPN router to go out instead of going out through outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your requirement: Inside LAN (inside)-ASA-(DMZ)---VPN Router---Internet Router----SXM Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please correct me if am wrong&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:21:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493528#M236684</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-11T07:21:49Z</dc:date>
    </item>
    <item>
      <title>you  are  right  sir.  Their </title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493529#M236685</link>
      <description>&lt;P&gt;you&amp;nbsp; are&amp;nbsp; right&amp;nbsp; sir.&amp;nbsp; Their&amp;nbsp; internet&amp;nbsp; traffic will&amp;nbsp; go&amp;nbsp; through&amp;nbsp; Outside&amp;nbsp; interface&amp;nbsp; which&amp;nbsp; is&amp;nbsp; working fine . But&amp;nbsp;&amp;nbsp; the&amp;nbsp; users&amp;nbsp; access of&amp;nbsp; sxm&amp;nbsp; network will go&amp;nbsp; through&amp;nbsp; DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493529#M236685</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T07:36:31Z</dc:date>
    </item>
    <item>
      <title>Please find  the ASA Version</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493530#M236687</link>
      <description>&lt;P&gt;Please find&amp;nbsp; the ASA Version details.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;when&amp;nbsp; i run the subnet&amp;nbsp; command&amp;nbsp; get error.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMX-LAN&lt;BR /&gt;&amp;nbsp;subnet 172.16.58.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Netlink-MDP-ASA(config-network)# sub&lt;BR /&gt;Netlink-MDP-ASA(config-network)# ?&lt;/P&gt;&lt;P&gt;&amp;nbsp; description&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify description text&lt;BR /&gt;&amp;nbsp; group-object&amp;nbsp;&amp;nbsp;&amp;nbsp; Configure an object group as an object&lt;BR /&gt;&amp;nbsp; help&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Help for network object-group configuration commands&lt;BR /&gt;&amp;nbsp; network-object&amp;nbsp; Configure a network object&lt;BR /&gt;&amp;nbsp; no&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remove an object or description from object-group&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;please advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 07:55:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493530#M236687</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T07:55:32Z</dc:date>
    </item>
    <item>
      <title>please find  the ASA Verson.</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493531#M236690</link>
      <description>&lt;P&gt;please find&amp;nbsp; the ASA Verson.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;BR /&gt;Device Manager Version 6.4(5)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and&amp;nbsp; the ip address details like&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;source ip address 172.16.58.0 /24&amp;nbsp; destination translated ip address 209.196.208.52&amp;nbsp; translated&amp;nbsp; source 172.31.82.0/23&amp;nbsp; translated&amp;nbsp; destination 172.31.82.0/23&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;need&amp;nbsp; the command details for&amp;nbsp; ASA&amp;nbsp; version 8.2 support.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 08:03:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493531#M236690</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T08:03:38Z</dc:date>
    </item>
    <item>
      <title>Hi Saroj,Then i guess you</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493532#M236691</link>
      <description>&lt;P&gt;Hi Saroj,&lt;/P&gt;&lt;P&gt;Then i guess you should have the proper access-list and routing that needs to be done on the ASA....&lt;/P&gt;&lt;P&gt;you need to route the traffic that is destined via DMZ thru VPN and required NAT/No-NAT to allow the traffic via DMZ.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess the public ip NATing will be done on your VPN server.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 08:32:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493532#M236691</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-11T08:32:38Z</dc:date>
    </item>
    <item>
      <title>Karthik, the  Routing  is </title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493533#M236694</link>
      <description>&lt;P&gt;Karthik,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the&amp;nbsp; Routing&amp;nbsp; is&amp;nbsp; already&amp;nbsp; done&amp;nbsp;&amp;nbsp; .Need&amp;nbsp; the NAT&amp;nbsp; Part&amp;nbsp; to&amp;nbsp; complete.&lt;/P&gt;&lt;P&gt;please advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saroj&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 08:39:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493533#M236694</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T08:39:22Z</dc:date>
    </item>
    <item>
      <title> answer of 1:--there is no </title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493534#M236695</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;answer of 1:--there is no&amp;nbsp; servers in DMZ.&lt;/P&gt;&lt;P&gt;naswer of 2: Inside LAN (inside)-ASA-(DMZ)---VPN Router---Internet Router----SXM Network&lt;/P&gt;&lt;P&gt;answer of 3 : s2s vpn is&amp;nbsp; configured on a Router&amp;nbsp; connected between&amp;nbsp; ASA and Internet Router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 08:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493534#M236695</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T08:52:18Z</dc:date>
    </item>
    <item>
      <title>Hi,You can't use the other</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493535#M236696</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can't use the other configuration that I listed as you are not running ASA software 8.3 or a newer version. The &lt;STRONG&gt;"object network"&lt;/STRONG&gt; doesnt exist in 8.2 software and if you use it the ASA&amp;nbsp; will regocnize it as &lt;STRONG&gt;"object-group network"&lt;/STRONG&gt; command. That is why you are not able to configure it and the required parameters under it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again the above IP information is confusing. You are talking about a network 172.16.82.0/23 as both the source and destination? Which one is it?&lt;/P&gt;&lt;P&gt;From what I understood before the information would be this&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;source ip/network = 172.16.58.0/24&lt;/LI&gt;&lt;LI&gt;source networks NAT IP = ?&lt;/LI&gt;&lt;LI&gt;destination ip/network = 209.196.208.52/32&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;You first time mention the network 172.31.82.0/24 and I dont know what it is. Pleasey clarify the purpose/role of each IP address/network mentioned.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 09:02:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493535#M236696</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-11T09:02:06Z</dc:date>
    </item>
    <item>
      <title>please find the detailsInside</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493536#M236697</link>
      <description>&lt;P&gt;please find the details&lt;/P&gt;&lt;P&gt;Inside LAN (inside)&amp;nbsp;&amp;nbsp; 172.16.58.0/24----ASA-(DMZ) private(172.16.59.0/29)&amp;nbsp; ---VPN Router -- 122.168.191.232/29---Internet Router----SXM Network(172.31.82.0/23) and 209.196.208&amp;nbsp; and 52,209.196.208.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Saroj&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 09:19:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493536#M236697</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T09:19:12Z</dc:date>
    </item>
    <item>
      <title>Hi, Ok that again clears some</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493537#M236698</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ok that again clears some things up but you have not mentioned the IP address that you want us to use as the NAT IP address. Or if you want to NAT the whole LAN network 172.16.58.0/24 to some other NAT network perhaps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or perhaps you are meaning something else with the Hide NAT? I would presume you want to "hide" the internal network 172.16.58.0/24 by NATing it to some IP address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you clear this up then we should be able to provide the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 09:58:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493537#M236698</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-11T09:58:59Z</dc:date>
    </item>
    <item>
      <title> The  DMZ is  configured </title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493538#M236699</link>
      <description>&lt;P&gt;&amp;nbsp;The&amp;nbsp; DMZ is&amp;nbsp; configured&amp;nbsp; with&amp;nbsp; private&amp;nbsp; IP. so&amp;nbsp; cant&amp;nbsp; configure NAT.The&amp;nbsp; VPN&amp;nbsp; Device&amp;nbsp; connected&amp;nbsp; to&amp;nbsp; DMZ&amp;nbsp; use&amp;nbsp; private IP&amp;nbsp; 172.16.59.0/29&lt;/P&gt;&lt;P&gt;and&amp;nbsp; the&amp;nbsp; Vpn dive&amp;nbsp; connect&amp;nbsp; the internet&amp;nbsp; Router&amp;nbsp; use&amp;nbsp; public IP 122.168.191.232/29&lt;/P&gt;&lt;P&gt;i need&amp;nbsp; to configure&amp;nbsp;&amp;nbsp; hide&amp;nbsp; nat.&amp;nbsp;&lt;/P&gt;&lt;P&gt;please advice .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 10:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493538#M236699</guid>
      <dc:creator>saroj pradhan</dc:creator>
      <dc:date>2014-07-11T10:04:09Z</dc:date>
    </item>
    <item>
      <title>Hi Saroj, As suggested by</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493539#M236700</link>
      <description>&lt;P&gt;Hi Saroj,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As suggested by Jouni...&lt;/P&gt;&lt;P&gt;Software 8.2 and below&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list VPN-POLICYPAT remark Policy NAT for L2L VPN&lt;BR /&gt;access-list VPN-POLICYPAT permit ip 172.16.58.0 255.255.255.0 host 209.196.208.52&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (dmz) 200 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (dmz) 200 &amp;lt;NAT ip address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 200 access-list VPN-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will do for you... or else you can do the No-NAT if you do not want to do the double NAT&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list VPN-POLICYPAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have the proper routing towards and upwards then you should be able to do with.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure your ASA to VPN router and VPN router to ASA back you need to have a proper routing and your VPN configurations should be having required configurations to get this work.&lt;/P&gt;&lt;P&gt;Also NAT the traffic in VPN router.... for getting in to public network.....&amp;nbsp; tunneled traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 10:05:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493539#M236700</guid>
      <dc:creator>nkarthikeyan</dc:creator>
      <dc:date>2014-07-11T10:05:38Z</dc:date>
    </item>
    <item>
      <title>Hi,From what I have</title>
      <link>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493540#M236701</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;From what I have understood so far all this traffic will use a L2L VPN connection between the sites. With that in mind I don't think there are real limitations on what NAT IP address you use as long as the VPN device has a route for it pointing towards the ASA.&lt;/P&gt;&lt;P&gt;It doesnt really matter if the link network between the ASA DMZ interface and the VPN Router is private IP address. You can still use any IP address you want as the NAT IP address to which you translate the LAN network 172.16.58.0/24&lt;/P&gt;&lt;P&gt;So again, I will have to know with what IP address will the network 172.16.58.0/24 be visible to the remote site? It will be the same IP address that you are configuring (or have configured) as the source network/IP in the L2L VPN configurations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2014 10:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hide-nat/m-p/2493540#M236701</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-07-11T10:10:09Z</dc:date>
    </item>
  </channel>
</rss>

