<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic not passing through NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939942#M24138</link>
    <description>&lt;P&gt;And in that packet tracer was traffic hitting the correct NAT statements?&amp;nbsp; It sounds like traffic from Web1 is matching a different NAT rule than the one you intent it to match.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Oct 2019 05:09:34 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2019-10-14T05:09:34Z</dc:date>
    <item>
      <title>Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939711#M24126</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a situation with an ASA 5508-X where I cannot get any traffic to pass through on anything other than it's own IP address on the outside interface. To clarify, the outside interface has a /28 on say 1.2.3.34/28. Traffic passes through for 1.2.3.34 but not 35-46.&lt;BR /&gt;I am upgrading from ASA 5510s which have a similar config (minus the post 8.3 NAT changes) so I'm quite baffled.&lt;/P&gt;&lt;P&gt;I do have hosts configured and NAT statements for them under the IPs 35-46.&lt;/P&gt;&lt;P&gt;I also have 2 more sets of /28 that are routed to my outside interface that DOES work, and the NAT statements are exactly the same (minus the host IP address of course).&lt;/P&gt;&lt;P&gt;Here is what I have:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;interface Redundant1.1
 vlan xxx
 nameif outside
 security-level 0
 ip address 1.2.3.34 255.255.255.240 
&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 1.2.3.33 1&lt;BR /&gt;&lt;BR /&gt;object network Web1&lt;BR /&gt;host 192.168.0.2&lt;BR /&gt;&lt;BR /&gt;object network E3&lt;BR /&gt;host 192.168.0.3&lt;BR /&gt;&lt;BR /&gt;object network v1&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;object-group service DM_INLINE_SERVICE_5&lt;BR /&gt;service-object icmp &lt;BR /&gt;service-object tcp-udp destination eq domain &lt;BR /&gt;&lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list v1_access_in extended permit object-group DM_INLINE_SERVICE_5 192.168.0.0 255.255.255.0 any &lt;BR /&gt;
Does not work:
object network Web1
 nat (v1,outside) static 1.2.3.35

Does work:
object network E3
 nat (v1,outside) static 1.2.3.78&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also have a NAT statement for everything else that's not matched, so everything that sits behind .34 without a specific static NAT is working fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;object network VNAT
 nat (v1,outside) dynamic interface&lt;/PRE&gt;&lt;P&gt;Hopefully this makes sense, I'm sure I'm missing something small.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 12 Oct 2019 22:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939711#M24126</guid>
      <dc:creator>DaveJones24876</dc:creator>
      <dc:date>2019-10-12T22:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939755#M24128</link>
      <description>&lt;P&gt;try this,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Web1_Public&lt;BR /&gt;host 1.2.3.35&lt;BR /&gt;!&lt;BR /&gt;nat (v1,outside) source static Web1 Web1_Public&lt;BR /&gt;!&lt;BR /&gt;object network E3_Public&lt;BR /&gt;host 1.2.3.78&lt;BR /&gt;!&lt;BR /&gt;nat (v1,outside) source static E3 E3_public&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 08:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939755#M24128</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-10-13T08:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939758#M24130</link>
      <description>Can you post packet tracer output.&lt;BR /&gt;Moreover, i would say that you should also check for Proxy-arp issue.&lt;BR /&gt;To overcome you can make a static host route (1.2.3.35) on the upstream router just to check.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Sun, 13 Oct 2019 09:11:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939758#M24130</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-13T09:11:28Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939770#M24132</link>
      <description>&lt;P&gt;Thanks Sheraz, I'll try that when I can get there next (hopefully tomorrow night). I had to plug in the 5510 until I get this working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;&lt;A href="https://community.cisco.com/t5/user/viewprofilepage/user-id/79917" target="_self"&gt;bhargavdesai&lt;/A&gt;, I'll run a packet trace when I am in next as mentioned above.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Just odd that no IPs within the /28 can be NATted but the routed IPs (such as the .78) can using the same statements. Is this a common issue (byt that I mean an incorrect config) that I somehow have just never faced?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 10:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939770#M24132</guid>
      <dc:creator>DaveJones24876</dc:creator>
      <dc:date>2019-10-13T10:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939773#M24134</link>
      <description>&lt;P&gt;Yes packet tracer would be good to look at.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But I do not quite understand what is not working.&amp;nbsp; Is it from the server to internet or from internet to the server?&amp;nbsp; If the issue is that the server cannot reach the internet and the ACL you have posted is all you have configured for this interface then that is where the problem is.&amp;nbsp; You are only permitting DNS traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 10:58:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939773#M24134</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-13T10:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939882#M24136</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I only posted a basic ACL to show things were in place. In reality there are many more to allow http/https, etc but in this example I kept it simple.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both directions cannot ping when the NAT rule(s) above are in place. Otherwise the host can ping as 1.2.3.34.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did run a packet tracer from the v1 interface a couple of days ago and it passed.&lt;/P&gt;</description>
      <pubDate>Sun, 13 Oct 2019 22:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939882#M24136</guid>
      <dc:creator>DaveJones24876</dc:creator>
      <dc:date>2019-10-13T22:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939942#M24138</link>
      <description>&lt;P&gt;And in that packet tracer was traffic hitting the correct NAT statements?&amp;nbsp; It sounds like traffic from Web1 is matching a different NAT rule than the one you intent it to match.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 05:09:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939942#M24138</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-14T05:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939997#M24139</link>
      <description>As you mentioned that Packet-tracer is fine and hitting right NAT rule, moreover the IP configured on the outside interface along with the other subnets which are routed by the upstream router is working fine in NAT statement. As I mentioned earlier, I suspect proxy-arp issue. To confirm this, I would say check the ARP table of the upstream router, you will find arp entries for all your NATTED IPs (expecting that traffic is flowing constantly on those not flushing the arp before the timer expires). Even if you send traffic to the 1.2.3.35 from outside, you will see the ARP entry on the upstream router will show INCOMPLETE. because ASA is not proxy-arp for that IP.&lt;BR /&gt;&lt;BR /&gt;You can check that proxy-arp is not disabled on the OUTSIDE interface.&lt;BR /&gt;Can you post "sh run all | inc sysopt" output.&lt;BR /&gt;You can also try (for testing) putting host route on the upstream router. (ip route 1.2.3.35 255.255.255.255 1.2.3.34)&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Mon, 14 Oct 2019 07:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3939997#M24139</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-14T07:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3940376#M24140</link>
      <description>&lt;P&gt;I highly doubt the issue is with proxy arp as this is enabled by default in ASA and to turn it off you would need to manually add the no-proxy-arp statement at the end of the NAT statement, which is not present in the NAT statement posted.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Oct 2019 18:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3940376#M24140</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-10-14T18:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3940751#M24141</link>
      <description>With all due respect to Expert Marius Gunnerud, I saw that there is no argument of no-proxy-arp, hence i requested for the "Can you post "sh run all | inc sysopt" output." As per the user packet tracer is working, so i thought that Proxy-arp is disabled on the interface level.&lt;BR /&gt;&lt;BR /&gt;To check in the first place if ASA is receiving request for IP 1.2.3.35, Can you run packet capture on the outside interface and see if you are receiving packets for the host.&lt;BR /&gt;&lt;BR /&gt;capture CAP interface OUTSIDE match ip any host 1.2.3.35&lt;BR /&gt;show capture&lt;BR /&gt;show capture CAP&lt;BR /&gt;&lt;BR /&gt;I would request for full configuration (Remove public IPs and credentials) along with packet-tracer output.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;### RATE ALL HELPFUL RESPONSES ###</description>
      <pubDate>Tue, 15 Oct 2019 10:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3940751#M24141</guid>
      <dc:creator>bhargavdesai</dc:creator>
      <dc:date>2019-10-15T10:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic not passing through NAT</title>
      <link>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3941401#M24143</link>
      <description>&lt;P&gt;Thanks for your time everyone. Turns out it was a service policy/ICMP inspection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Had a Cisco engineer look at it and after 2 hours mind you, input a protocol fixup and that was it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should have toyed with that but sometimes you just need that second pair of eyes...&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 06:23:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-not-passing-through-nat/m-p/3941401#M24143</guid>
      <dc:creator>DaveJones24876</dc:creator>
      <dc:date>2019-10-16T06:23:38Z</dc:date>
    </item>
  </channel>
</rss>

