<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks John, I won't be able in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463342#M268290</link>
    <description>&lt;P&gt;Thanks John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I won't be able to look at this until Thursday now as I am at another customer for the next few days, &amp;nbsp;I have turn on ICMP via ASDL so assume it should work. &amp;nbsp;I did notice on my "sh xlate" results this.....&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-size: 14px;"&gt;NAT from outside:0.0.0.0/0 to any:0.0.0.0/0&lt;/SPAN&gt;&lt;BR style="font-size: 14px;" /&gt;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; flags sIT idle 0:11:24 timeout 0:00:00"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;though I don't remember adding that rule, I wonder if this is masking my rule?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Plan of attack for Thursday is to remove my rule and start again as an outbound rule but with the "both ways" enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Tim&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Mar 2014 10:21:36 GMT</pubDate>
    <dc:creator>timdeadman1</dc:creator>
    <dc:date>2014-03-18T10:21:36Z</dc:date>
    <item>
      <title>another blooming NAT question</title>
      <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463338#M268273</link>
      <description>&lt;P&gt;So the scenario is that we have an exchange server with one leg on the Inside interface (my DMZ) and I want to NAT that to one of my public range of addresses. &amp;nbsp;These are nnn.nn.n.232/29. &amp;nbsp;The ISP has .233, the ASA outside interface is .234 and I want to use .235 as the static NAT to xxx.xx.199.10 (out inside DMZ network).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have put the following config on:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;ASA Version 9.1(1)&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;hostname MAIN-ASA&lt;BR /&gt;domain-name nnnnnnn.lllll&lt;BR /&gt;enable password jjjjjjjjjj&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;speed 100&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address nnn.nn.5.234 255.255.255.248&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address xxx.xx.199.1 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;nameif management&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address xxx.xx.140.223 255.255.255.0&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;boot system disk0:/asa911-smp-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup outside&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;name-server 8.8.8.8&lt;BR /&gt;&amp;nbsp;domain-name jjjjjjjjj.lllllll&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object network servers&lt;BR /&gt;&amp;nbsp;subnet yyy.yyy.0.0 255.255.255.0&lt;BR /&gt;object network IT-PC&lt;BR /&gt;&amp;nbsp;host yyy.yyy.1.22&lt;BR /&gt;&amp;nbsp;description IT dept PC&lt;BR /&gt;&amp;nbsp;host xxx.xx.199.128&lt;BR /&gt;object network Exchange-NAT&lt;BR /&gt;&amp;nbsp;host nnn.nn.5.235&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;description Outside exchange NAT&lt;BR /&gt;object network Exchange-internal-NAT&lt;BR /&gt;&amp;nbsp;host xxx.xx.199.11&lt;BR /&gt;&amp;nbsp;description Inside Exchange NAT&lt;BR /&gt;object-group network users&lt;BR /&gt;&amp;nbsp;network-object yyy.yyy.1.0 255.255.255.0&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;&amp;nbsp;network-object xxx.xx.199.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object object servers&lt;BR /&gt;object-group network DM_INLINE_NETWORK_3&lt;BR /&gt;&amp;nbsp;network-object object Exchange-NAT&lt;BR /&gt;&amp;nbsp;network-object object Exchange-internal-NAT&lt;BR /&gt;object-group service DM_INLINE_TCP_1 tcp&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;&amp;nbsp;port-object eq echo&lt;BR /&gt;object-group network exchange-external&lt;BR /&gt;&amp;nbsp;network-object&amp;nbsp;&lt;BR /&gt;&amp;nbsp;network-object&amp;nbsp;&lt;BR /&gt;&amp;nbsp;network-object&amp;nbsp;&lt;BR /&gt;&amp;nbsp;object-group network DM_INLINE_NETWORK_4&lt;BR /&gt;&amp;nbsp;network-object object Exchange-NAT&lt;BR /&gt;&amp;nbsp;network-object object Exchange-internal-NAT&lt;BR /&gt;object-group service DM_INLINE_TCP_2 tcp&lt;BR /&gt;&amp;nbsp;port-object eq https&lt;BR /&gt;&amp;nbsp;port-object eq smtp&lt;BR /&gt;access-list inside_access_in extended permit ip object-group DM_INLINE_NETWORK_1 any log debugging&amp;nbsp;&lt;BR /&gt;access-list inside_access_in extended permit ip object IT-PC any log debugging&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group DM_INLINE_NETWORK_3 object-group DM_INLINE_TCP_1 log debugging&amp;nbsp;&lt;BR /&gt;access-list outside_access_in extended permit tcp object-group exchange-external object-group DM_INLINE_NETWORK_4 object-group DM_INLINE_TCP_2 log debugging&amp;nbsp;&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;icmp permit any outside&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-66114.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;nat (outside,any) source static any any destination static Exchange-NAT Exchange-internal-NAT&lt;BR /&gt;nat (inside,outside) source dynamic any interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 nnn.nn.5.233 1&lt;BR /&gt;route inside yyy.yyy.0.0 255.255.255.0 xxx.xx.199.254 1&lt;BR /&gt;route inside yyy.yyy.1.0 255.255.255.0 xxx.xx.199.254 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;http server enable&lt;BR /&gt;http xxx.xx.1.0 255.255.255.0 management&lt;BR /&gt;http xxx.xx.140.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;sysopt noproxyarp inside&lt;BR /&gt;sysopt noproxyarp management&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet xxx.xx.140.0 255.255.255.0 management&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh xxx.xx.140.0 255.255.255.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;management-access management&lt;BR /&gt;vpdn group SRH-Group request dialout pppoe&lt;BR /&gt;vpdn group SRH-Group localname zen258800@zen&lt;BR /&gt;vpdn group SRH-Group ppp authentication chap&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;username admin password e8gq2.ujS/CECBVS encrypted&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 h225&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect h323 ras&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rsh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect rtsp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect esmtp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect skinny &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sunrpc&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect xdmcp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect sip &amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect netbios&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect tftp&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp; inspect ip-options&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&amp;nbsp;&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:2005faa8a0512f111117f8a6cb654888&lt;BR /&gt;: end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't seem to get it working even though the packet tracer says it should work. &amp;nbsp;Here is the "sh xlate" output.&lt;/P&gt;&lt;P&gt;MAIN-ASA# sh xlate&lt;BR /&gt;6 in use, 200 most used&lt;BR /&gt;Flags: D - DNS, e - extended, I - identity, i - dynamic, r - portmap,&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;s - static, T - twice, N - net-to-net&lt;BR /&gt;NAT from outside:0.0.0.0/0 to any:0.0.0.0/0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags sIT idle 0:11:24 timeout 0:00:00&lt;BR /&gt;NAT from any:192.168.199.11 to outside:194.12.5.235&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags sT idle 0:11:24 timeout 0:00:00&lt;BR /&gt;NAT from outside:0.0.0.0/0 to inside:0.0.0.0/0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; flags sIT idle 0:55:57 timeout 0:00:00&lt;BR /&gt;TCP PAT from inside:yyy.yyy.0.215/63102 to outside:nn.nn.5.234/63102 flags ri idle 0:54:45 timeout 0:00:30&lt;BR /&gt;UDP PAT from inside:yyy.yyy.0.40/6881 to outside:nn.nn.5.234/6881 flags ri idle 0:00:01 timeout 0:00:30&lt;BR /&gt;TCP PAT from inside:yyy.yyy.0.95/50020 to outside:nn.nn.5.234/50020 flags ri idle 0:00:48 timeout 0:00:30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any ideas really really appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:57:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463338#M268273</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2019-03-12T03:57:18Z</dc:date>
    </item>
    <item>
      <title>TimDo you just want to</title>
      <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463339#M268276</link>
      <description>&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;Do you just want to present your internal address as a public IP to the outside ?&lt;/P&gt;&lt;P&gt;If so -&lt;/P&gt;&lt;P&gt;object network &amp;lt;name&amp;gt;&lt;/P&gt;&lt;P&gt;host &amp;lt;private IP&amp;gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) static &amp;lt;public IP&amp;gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2014 18:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463339#M268276</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-03-17T18:46:52Z</dc:date>
    </item>
    <item>
      <title>Thanks for looking Jon,</title>
      <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463340#M268278</link>
      <description>&lt;P&gt;Thanks for looking Jon, &amp;nbsp;actually, I built it using ASDM (I know, call myself an engineer) and I just set up a static NAT from an address on the inside interface to an address in the range that the ISP assigned to us. &amp;nbsp;The outside (public) address is not pingable but I changed my outside interface to the address I want to NAT just to see if it was a routing issue and then I can ping the public address from the WWW. &amp;nbsp;I had to change it back to allow outgoing access from my other users (they PAT to the interface address (.234) and that side all works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do I need to NAT to a physical interface address? I thought I could just create a network object and NAT to that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2014 19:10:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463340#M268278</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2014-03-17T19:10:52Z</dc:date>
    </item>
    <item>
      <title>TimDo I need to NAT to a</title>
      <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463341#M268281</link>
      <description>&lt;P&gt;Tim&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Do I need to NAT to a physical interface address? I thought I could just create a network object and NAT to that?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;No, you should be able to use an IP from the public range that is not actually assigned to the interface.&lt;/P&gt;&lt;P&gt;When you changed to the interface i suspect you were actually just pinging the outside interface ie. not the actual server.&lt;/P&gt;&lt;P&gt;You have acls applied to both the inside and outside interfaces. So you need to -&lt;/P&gt;&lt;P&gt;1) allow ICMP to the real IP in the acl applied to the outside interface&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;2) you can either -&lt;/P&gt;&lt;P&gt;a) allow the ICMP replies in your inside acl&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;b) turn on ICMP inspection. Note ICMP inspection generally is done for returning packets from&amp;nbsp;a ping that was started from the inside but i suspect it should also work the other way as well.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 17 Mar 2014 19:55:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463341#M268281</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2014-03-17T19:55:24Z</dc:date>
    </item>
    <item>
      <title>Thanks John, I won't be able</title>
      <link>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463342#M268290</link>
      <description>&lt;P&gt;Thanks John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I won't be able to look at this until Thursday now as I am at another customer for the next few days, &amp;nbsp;I have turn on ICMP via ASDL so assume it should work. &amp;nbsp;I did notice on my "sh xlate" results this.....&lt;/P&gt;&lt;P&gt;"&lt;SPAN style="font-size: 14px;"&gt;NAT from outside:0.0.0.0/0 to any:0.0.0.0/0&lt;/SPAN&gt;&lt;BR style="font-size: 14px;" /&gt;&lt;SPAN style="font-size: 14px;"&gt;&amp;nbsp; &amp;nbsp; flags sIT idle 0:11:24 timeout 0:00:00"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;though I don't remember adding that rule, I wonder if this is masking my rule?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Plan of attack for Thursday is to remove my rule and start again as an outbound rule but with the "both ways" enabled.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;Tim&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2014 10:21:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/another-blooming-nat-question/m-p/2463342#M268290</guid>
      <dc:creator>timdeadman1</dc:creator>
      <dc:date>2014-03-18T10:21:36Z</dc:date>
    </item>
  </channel>
</rss>

