<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic nat (any,inside) source in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464164#M267647</link>
    <description>&lt;P&gt;nat (&lt;STRONG&gt;any&lt;/STRONG&gt;,inside) source static &lt;STRONG&gt;any &lt;/STRONG&gt;interface destination static PUBLIC-172 INTERNAL-53 service PORT-9000 PORT-9000&lt;/P&gt;&lt;P&gt;I was refering to both.&lt;/P&gt;&lt;P&gt;I thought that both the host PC and the server were located on the same network?&lt;/P&gt;&lt;P&gt;try changing the souce static to source dynamic...and test&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
    <pubDate>Fri, 11 Apr 2014 06:05:07 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-04-11T06:05:07Z</dc:date>
    <item>
      <title>Tricky Twice NAT scenario</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464160#M267628</link>
      <description>&lt;P&gt;I'm setting up my first ASA 5505 (Security Plus) and want to make sure I'm doing this correctly.&lt;/P&gt;&lt;P&gt;I have a web server on my inside network.&amp;nbsp; The web server's internal IP is 192.168.1.53.&amp;nbsp; The web server runs on port 9000.&amp;nbsp; I want this accessible from several internal VLANs.&amp;nbsp; I also want to expose this web server externally on one of my static public IP's, x.x.x.172, also on port 9000.&lt;/P&gt;&lt;P&gt;Here's the catch:&amp;nbsp; My internal users sometimes need to access the web server using the *external* hostname/IP, so I need to enable hairpinning.&lt;/P&gt;&lt;P&gt;I started using Network Object NAT but found that I had to use Twice NAT to get the hairpin scenario to work.&amp;nbsp; I experimented some more and found that if I adjusted my Twice NAT rule, I didn't need the Network Object NAT rules anymore.&lt;/P&gt;&lt;P&gt;I set this up and it seems to work great internally and externally.&amp;nbsp; Before I set up a few dozen more of these for different server/port combinations, I wanted to run this by you experts to see if there are any issues with this config that will bite me later down the road.&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network PUBLIC-172&lt;BR /&gt;&amp;nbsp;host x.x.x.172&lt;BR /&gt;object network INTERNAL-53&lt;BR /&gt;&amp;nbsp;host 192.168.1.53&lt;BR /&gt;object service PORT-9000&lt;BR /&gt;&amp;nbsp;service tcp destination eq 9000&lt;BR /&gt;access-list OutsideIn extended permit tcp any host 192.168.1.53 eq 9000&lt;BR /&gt;access-group OutsideIn in interface outside&lt;BR /&gt;nat (any,inside) source static any interface destination static PUBLIC-172 INTERNAL-53 service PORT-9000 PORT-9000&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:03:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464160#M267628</guid>
      <dc:creator>lunadesign</dc:creator>
      <dc:date>2019-03-12T04:03:46Z</dc:date>
    </item>
    <item>
      <title>I would be careful using the</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464161#M267633</link>
      <description>&lt;P&gt;I would be careful using the any keyword.&amp;nbsp; In this case you would be allowing every one access to the server using the external IP (given that access lists permit the connection also.)&amp;nbsp; It is always a best practice to be very specific with what you configure on the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course if you don't have a very strict security policy and are allowed to do this, then there is nothing wrong with doing it.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 05:10:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464161#M267633</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-11T05:10:43Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464162#M267636</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;Thanks for the quick reply.&lt;/P&gt;&lt;P&gt;Which "any" were you referring to?&amp;nbsp; The one in parens representing the "real" interface or the one after the keyword "static"?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 05:29:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464162#M267636</guid>
      <dc:creator>lunadesign</dc:creator>
      <dc:date>2014-04-11T05:29:40Z</dc:date>
    </item>
    <item>
      <title>And sure enough, I've found a</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464163#M267641</link>
      <description>&lt;P&gt;And sure enough, I've found a hole.&lt;/P&gt;&lt;P&gt;It appears this NAT rule is being triggered if an internal user tries to go to the internal server URL from one of the VLANs.&amp;nbsp; The web page doesn't come up and the ASA syslog has this:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#FF0000;"&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src vlan10:192.168.10.12/3952 dst inside:192.168.1.53/9000 denied due to NAT reverse path failure&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I really only want the NAT rules to trigger when a user is accessing the external URL not the internal one so I'm definitely doing something wrong here.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 05:38:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464163#M267641</guid>
      <dc:creator>lunadesign</dc:creator>
      <dc:date>2014-04-11T05:38:29Z</dc:date>
    </item>
    <item>
      <title>nat (any,inside) source</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464164#M267647</link>
      <description>&lt;P&gt;nat (&lt;STRONG&gt;any&lt;/STRONG&gt;,inside) source static &lt;STRONG&gt;any &lt;/STRONG&gt;interface destination static PUBLIC-172 INTERNAL-53 service PORT-9000 PORT-9000&lt;/P&gt;&lt;P&gt;I was refering to both.&lt;/P&gt;&lt;P&gt;I thought that both the host PC and the server were located on the same network?&lt;/P&gt;&lt;P&gt;try changing the souce static to source dynamic...and test&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 06:05:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464164#M267647</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-11T06:05:07Z</dc:date>
    </item>
    <item>
      <title>Thanks again for your help!To</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464165#M267650</link>
      <description>&lt;P&gt;Thanks again for your help!&lt;/P&gt;&lt;P&gt;To be clear, I have two client PC's I'm testing with.&amp;nbsp; One on the "inside" VLAN and one on the "work" VLAN.&lt;/P&gt;&lt;P&gt;If I take out the first "any", I have to reproduce the rule N times for each of my VLANs.&amp;nbsp; However, even after doing this I'm seeing the same issue -- works if client PC is on "inside" VLAN, fails with "reverse path failure" if client PC is on another other internal VLAN.&lt;/P&gt;&lt;P&gt;I tried replacing the second "any" with INTERNAL-53.and the requests to the internal URL now work from the other VLANs but now the requests to the external URL from those same PCs now doesn't work.&amp;nbsp; I'm not seeing anything in the syslog though.&lt;/P&gt;&lt;P&gt;Changing from "source static" to "source dynamic" didn't change anything either.&lt;/P&gt;&lt;P&gt;I think I'm being stumped by the tricky syntax of this NAT command.&amp;nbsp; In essence, I want something that implements "if internal or external user requests this external URL, translate to this instead".&amp;nbsp; NAT shouldn't be getting involved if an internal user requests and internal URL.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2014 06:25:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464165#M267650</guid>
      <dc:creator>lunadesign</dc:creator>
      <dc:date>2014-04-11T06:25:19Z</dc:date>
    </item>
    <item>
      <title>Sorry for late reply as I</title>
      <link>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464166#M267654</link>
      <description>&lt;P&gt;Sorry for late reply as I have been away for a few weeks.&lt;/P&gt;&lt;P&gt;Do you require further assistance with this issue?&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Pease remember to select a correct answer and rate&lt;/P&gt;</description>
      <pubDate>Tue, 29 Apr 2014 09:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tricky-twice-nat-scenario/m-p/2464166#M267654</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-04-29T09:59:54Z</dc:date>
    </item>
  </channel>
</rss>

