<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Configuration Suggestion and Help on NAT'ing and Routing multi i in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403045#M270599</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well after researching, I saw on a blog where this might have changed in 9.1 so backed down to 8.4.1 but no results.&amp;nbsp; One suggestion was sysopt noproxyarp on the interface, nothing.&amp;nbsp; I don't see any info in sh nat details, it's not even hitting it a nat since there isn't one built for VIP-VENDOR to Outside-Cable.&amp;nbsp; So obviously it's just skipping the nat statements that are there all together.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 31 Jan 2014 16:16:05 GMT</pubDate>
    <dc:creator>raun.williams</dc:creator>
    <dc:date>2014-01-31T16:16:05Z</dc:date>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi interafaces</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403034#M270588</link>
      <description>&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;Can you tell me if this is possible with a 5510 on 9.1x code and the best approach?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;I need a way to setup the ASA so it has an Interface e0/0.1 (Outside-Cable, 10.100.255.5), Interface e0/0.2 (Outside, T-1, 10.100.255.4), and Interface e0/1, (Outside-Corp).&amp;nbsp;&amp;nbsp; All e0 interfaces will go to a single router, and each e0 interface will be ip’d seperately so that the rotuer can distinquish the traffic and policy route to it’s appropriate outside interface (cable or t1).&amp;nbsp; E0/1 will be ip’d with the corporate public ip so that specific traffic can be routed to the corporate router and use it’s links and policy routes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;Internally on the ASA,&amp;nbsp; E0/2.1 through .5 will have individual subnets (10.100.33 through 10.100.37.0) for guest network access and should go out e0/0.1.&amp;nbsp; Meanwhile, E0/2.6, 10.100.100.38, should go out e0/0.2.&amp;nbsp;&amp;nbsp; E0/2.7 or E0/3, 10.100.38.0 should go out E0/1 for corporate internet access.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;I wouldn’t think this would be to hard, but there seems to be quite a bit of confusion on the forums as to exactly the limitations of the ASA with multiple outside interfaces.&amp;nbsp; And/or if this can just been done with NAT, but perhaps version dependent? &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;SPAN style="font-family: &amp;amp;quot;Times New Roman&amp;amp;quot;,&amp;amp;quot;serif&amp;amp;quot;; color: black;"&gt;Raun&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403034#M270588</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2019-03-12T03:38:15Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403035#M270589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT can be used in the new software (8.4 -&amp;gt;) to manipulate the interface through which the traffic of certain source networks is forwarded. The NAT configurations together with multiple default routes can achieve this. Each interface will have a default route of which only one is naturally active but the NAT configuration used will first divert traffic from some networks to a second or third ISP and will after use that interfaces default route (even though normally it wouldnt be used by the ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The downside of this is naturally a NAT configuration that is not very typical. Its naturally not also something that Cisco would probably suggest but its the only alternative to PBR like operation on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on the current ASA environment and especially the requirements for traffic between the local interfaces this might create a NAT configuration that is very dependant on the "nat" commands always being in the correct order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give a simple example a basic configuration could look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-CALBE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 1.1.1.2 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-T1 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 2.2.2.2 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-CORP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 3.3.3.2 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/3.100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vlan 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/3.200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vlan 200&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.10.20.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/3.300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; vlan 300&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN-3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 10.10.30.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-CORP 0.0.0.0 0.0.0.0 3.3.3.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-CABLE 0.0.0.0 0.0.0. 1.1.1.1 253&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-T1 0.0.0.0 0.0.0.0 2.2.2.1 254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network ANY-0.0.0.0-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 0.0.0.0 128.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network ANY-128.0.0.0-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 128.0.0.0 128.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network ALL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object ANY-0.0.0.0-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object object ANY-128.0.0.0-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN-3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.30.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN-1,ISP-CABLE) source dynamic LAN-1 interface destination static ALL ALL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN-2,ISP-T1) source dynamic LAN-2 interface destination static ALL ALL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN-3,ISP-CORP) source dynamic LAN-3 interface destination static ALL ALL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the different LAN/DMZ networks needed to be able to reach eachother then we would have to configure NAT0 / Identity NAT configurations at the top of the Manual NAT / Twice NAT configurations (above) so that internal traffic would match those rules and rest of the traffic from the said source networks would be forced out through their set ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configurations could also use &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; to define multiple source networks and also use Dynamic NAT+PAT instead of the Dynamic PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 18:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403035#M270589</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-30T18:14:49Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403036#M270590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raun, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some questions to ask if you will.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;You want sub-interface configured on your OUTSIDE interface going to your Corp router, which i believe that holds of your connection from ISPs? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Truth be told, I have never see that happen on the OUTSIDE interface, but logically thinking it! I suppose it can be done giving that you can assign different security levels to the sub-interface for your OUTSIDE connection. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The best practice I have seen in my few years of working with Cisco ASA's most sub-interface are configured on the INSIDE or DMZ interface. Execpt your ISP requires a dot1q trunk from their side to your physical interface in most cases I have seen that is usually with routers. But again anything is possible these days. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the fact that you want a sub-interfaced scenario and looking at different different subnet reaching different OUTSIDE sub-interface connections, I suggest you use&amp;nbsp; TWICE NAT style for your different natting of those subnets on your INSIDE. Basically creating object and embedding them into your nat statements. &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;You can look up the following document for guide on the NATTING, it's was put together by one of the guys I have respect for in this community Jouni! He explains things simple. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Tedd. &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 18:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403036#M270590</guid>
      <dc:creator>Azubuike Obiora</dc:creator>
      <dc:date>2014-01-30T18:37:02Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403037#M270591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see Jouni you beat me to it! &lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just made a ref to a documentation you wrote which has helped me in getting to understand different nat with ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There you have it Raun! Jouni in e-flesh and e-blood!&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 18:40:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403037#M270591</guid>
      <dc:creator>Azubuike Obiora</dc:creator>
      <dc:date>2014-01-30T18:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Suggestion and Help on NAT'ing and Routing mul</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403038#M270592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you to both of you!&amp;nbsp; I've never got my head wrapped around the new nat since it changed in 8.3.&amp;nbsp; I'm gong to study the link you gave me and the config makes sense, in some aspects.&amp;nbsp; I'll have to give it a shot and will let you know.&amp;nbsp; More then likely, I'll be back wtih questions &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teddy, I agree with you the outside subinterfaces and it is certainly unusual from my standpoint.&amp;nbsp; However, in reality, although they are 'outside' their still on my network.&amp;nbsp; I have a OUTSIDE switch that I can provide a trunk to for the ASA, and break out the vlans to the appropriate routers, guest and corporate, which i own.&amp;nbsp;&amp;nbsp; So from that aspect, I don't see a big issue in doing it that way to conserve physical ports.&amp;nbsp; Although, i was going to set the security level teh same on all of them since they still can't talk to one another by default.&amp;nbsp; Do you see an issue with this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Raun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 18:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403038#M270592</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-30T18:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Suggestion and Help on NAT'ing and Routing mul</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403039#M270593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raun, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Definitely not a problem with that!!! I mean with the version 8.3+ of the ASA a code, there's just way too much of flexibility to do nat with it! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good enough Cisco had to wake up to the call.&amp;nbsp; I mean Juoni poured it out for you in a black int and white canvas for you! just copy his config and edit to your suiting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Believe me I went thru same phase of getting my head around the nat in ver 8.3+ i felt it was difficult at first, but once it down well with me....i feel it's the best thing ever since slice bread!!!! mmmhmmmm....&lt;SPAN __jive_emoticon_name="laugh" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/laugh.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also don't forget to rate Jouni's and I reply if it does answer your question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Tedd&lt;SPAN __jive_emoticon_name="cool" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/cool.gif"&gt;&lt;/SPAN&gt; ( in reality i gat ma glasses on hehe!)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I never appreciated the idea of drawing out your problem, not untill recently I had to help troubleshoot and saw the importance of having drawing to explain problems. So If you can next time just put up a drawing no matter how it is! It helps to understand your problem easily and solution would be provided ASAP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 18:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403039#M270593</guid>
      <dc:creator>Azubuike Obiora</dc:creator>
      <dc:date>2014-01-30T18:54:23Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403040#M270594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration is just a really simple example of how to get traffic forwarded through different external interfaces of the ASA based on the source network. Even though you could do the same even if the source networks were behind a single LAN interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would stress that the above configuration doesnt take into account at all possible VPN related NAT0 configurations, possible Static NAT configurations that you might need for servers or traffic between the LAN interfaces. All of those would require additional configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So trying out something like this would be good if you can lab it or atleast plan the change before trying it and having a plan to revert back to the old if you are doing it in production environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is something I have not added to my document that I wrote. I am not sure when I will add more information to the document. I do know that there is a lot of things that could be added there. Hopefully I get myself around to it at some point &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give a short summary what the above &lt;STRONG&gt;"nat"&lt;/STRONG&gt; commands are supposed to do is the following:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We first define the source and destination interface of the traffic. Where is the source network located and where do we want to forward it?&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;nat (LAN-1,ISP-CABLE)&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;We define the source network(s) in object and PAT it to the external interface specified in the command&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;source dynamic LAN-1 interface&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;We use an &lt;STRONG&gt;"object-group"&lt;/STRONG&gt; that contains all the possible destination networks.&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;destination static ALL ALL&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;When traffic from the defined source network from the defined source interface comes to the ASA towards any destination IP address, that destination IP address will get matched to the destination object-group&lt;STRONG&gt; "ALL"&lt;/STRONG&gt; and therefore get forced out through the destination interface which we have used in the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not necesarily the clearest explanation but feel free to ask more questions and I'll try to answer those.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 19:08:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403040#M270594</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-30T19:08:04Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Suggestion and Help on NAT'ing and Routing mul</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403041#M270595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, you guys obviously know your stuff so I went ahead and put it as the correct answer, i'll just have to implement in toy with it.&amp;nbsp;&amp;nbsp; Originally, I saw this as step 1.&amp;nbsp; Since your quite good at this, I'll through the other catch at you now to think about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So all of these 'DMZs" are wireless networks.&amp;nbsp; On the other side is a wireless controller and the wireless controller has the option of 'proxying' the dhcp request for the client basically turn it into a unicast request. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that request needs to be able to get through say LAN-1 to INSIDE-1 for the DHCP server as well as DNS lookups, at 10.100.90.x.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But that is the ONLY access they should have to that INSIDE-1.&amp;nbsp; Anything else is a big no no.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Optionally, I could tell the controller to let the clients on LAN-1 make their own request and setup dhcp relays on the ASA to INSIDE-1 if that would be easier... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm actually doing the unicast way through an old PIX 515E right now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 21:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403041#M270595</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-30T21:47:16Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403042#M270596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if there is traffic that needs to pass between local interface then the above configuration is not enough to achieve that as the current NAT configuration would forward ALL destination traffic to the ISP interface of choice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means we need to determine the LAN networks between which connections are required and between which interface this traffic is supposed to flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I use my own previous example and for example say that I need that traffic can flow between LAN-1 and LAN-2 wihtout getting forwarded to the ISP interfaces then I would configure this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN-1,LAN-2) 1 source static LAN-1 LAN-1 destination static LAN-2 LAN-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Key things to notice in the above configuration&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;We add the rule to the top of these Section 1 Manual NAT rules as we mentioned the line/order/priority number &lt;STRONG&gt;"1"&lt;/STRONG&gt; in the command. So it will be first to be matched before the special &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configurations we have for the ISP traffic.&lt;/LI&gt;&lt;LI&gt;This &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command is bidirectional. If LAN-1 initiates connection towards LAN-2 then this traffic will get matched to this rule. If LAN-2 initiates connection to LAN-1 then this traffic will get matched to this rule. Though if we didnt move this rule to the top in the previously mentioned way this rule would never be matched.&lt;/LI&gt;&lt;LI&gt;As we use the same &lt;STRONG&gt;"object"&lt;/STRONG&gt; for both the real and mapped source/destination it essentially means we are doing NAT0 / Static Identity NAT. This means the networks can communicate with their original IP addresses.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to use the interface ACLs to control what traffic is allowed. Naturally you could only configure the same NAT above for only certain hosts between the networks but I guess thats up to you. I personally prefer to do traffic control purely in the ACL and not use NAT for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 22:03:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403042#M270596</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-30T22:03:08Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403043#M270597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Raun!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jouni is absolutely correct. Using ACL in my opinion gives you more dexterity in controlling your traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For you ACL remember that going from Higher interface level to a Lower one no bueno to it(no problems)!&amp;nbsp; But from the Lower to the higher you need the ACL to go with it! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you thinking about allowing your request from your DMZ to your LAN1, you need the ACL to match the traffic. I personally like creating my ACL in this order:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FROM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TO&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SERVICE&lt;/P&gt;&lt;P&gt;SOURCE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DESTINATION&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SERVICE&lt;/P&gt;&lt;P&gt;DMZ&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; LAN1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; udp/dhcp &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Makes the flow easy to understand and implement. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tedd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 22:18:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403043#M270597</guid>
      <dc:creator>Azubuike Obiora</dc:creator>
      <dc:date>2014-01-30T22:18:41Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403044#M270598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm.. I don't seem to be selecting the appropriate route.&amp;nbsp; If i remove the other default route statements, it works fine.. add the others back and it doesn't.&amp;nbsp; So I built the config and started messing with teh 10.100.39.0 or VIP-VENDOR network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;object network VIP-VENDOR&lt;/EM&gt;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;EM&gt; subnet 10.100.39.0 255.255.255.0&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network ANY-0.0.0.0-1&lt;BR /&gt; subnet 0.0.0.0 128.0.0.0&lt;BR /&gt;object network ANY-128.0.0.0-1&lt;BR /&gt; subnet 128.0.0.0 128.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network ALL&lt;/P&gt;&lt;P&gt; network-object object ANY-0.0.0.0-1&lt;/P&gt;&lt;P&gt; network-object object ANY-128.0.0.0-1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Guest-1,Outside-Cable) source dynamic Guest-1 interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;nat (Guest-2,Outside-Cable) source dynamic Guest-2 interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;nat (Guest-3,Outside-Cable) source dynamic Guest-3 interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;nat (Guest-4,Outside-Cable) source dynamic Guest-4 interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;nat (Guest-5,Outside-Cable) source dynamic Guest-5 interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;nat (VIP-DOC,Outside-t1) source dynamic VIP-DOC interface destination static ALL ALL&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;nat (VIP-VENDOR,Outside-Corp) source dynamic VIP-VENDOR interface destination static ALL ALL&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group acl-vip-vendor in interface VIP-VENDOR&lt;/P&gt;&lt;P&gt;route Outside-Cable 0.0.0.0 0.0.0.0 10.100.255.254 1&lt;/P&gt;&lt;P&gt;route Outside-t1 0.0.0.0 0.0.0.0 10.100.254.254 253&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;route Outside-Corp 0.0.0.0 0.0.0.0 PUBLICIP 254&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the packet trace:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: CAPTURE&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside-Cable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group acl-vip-vendor in interface VIP-VENDOR&lt;/P&gt;&lt;P&gt;access-list acl-vip-vendor extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: per-session&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 900, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;input-interface: VIP-VENDOR&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;output-interface: Outside-Cable&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Jan 2014 23:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403044#M270598</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-30T23:34:00Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403045#M270599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well after researching, I saw on a blog where this might have changed in 9.1 so backed down to 8.4.1 but no results.&amp;nbsp; One suggestion was sysopt noproxyarp on the interface, nothing.&amp;nbsp; I don't see any info in sh nat details, it's not even hitting it a nat since there isn't one built for VIP-VENDOR to Outside-Cable.&amp;nbsp; So obviously it's just skipping the nat statements that are there all together.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:16:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403045#M270599</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-31T16:16:05Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403046#M270600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to try some 8.4 code I would suggest trying 8.4(5) or 8.4(6). To my understanding 8.4(1) still did not follow the NAT configurations but actually the routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I am not sure what the problem is with the 9.1 since I have tested this on that software version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your earlier post where you mentioned the configurations that didnt seem to match at all, what was the exact software level used? I might try to lab that up again myself as I am currently trying something out on an ASA. Could perhaps test this after I done with the previous test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:24:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403046#M270600</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-31T16:24:14Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403047#M270601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okie, will try 8.4(6).&amp;nbsp; Not sure what you mean by 'configurations that didnt seem to match at all', but I started out on 9.1.4.&lt;/P&gt;&lt;P&gt;Sure, if you have time to lab it, I would greatly appreciate it.&amp;nbsp; If you want my config, let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:30:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403047#M270601</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-31T16:30:21Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403048#M270602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just meant the &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command that should all forward the traffic from the specified LAN networks to specific ISP link. Just wondered what software was used when if they werent work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as you mentioned its 9.1(4). Will see if I can try that out a bit later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403048#M270602</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-31T16:32:23Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403049#M270603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so... i loaded up 8.4(6) and a packet tracer shows it to be working.&amp;nbsp; very interesting.&amp;nbsp; I'm not on site, so i have some one going to physically test it.&amp;nbsp; hmm.. i'm curious if this is a bug or a feature removal or what the deal is.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 16:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403049#M270603</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-31T16:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Suggestion and Help on NAT'ing and Routing mul</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403050#M270605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just spend some time testing some of the software levels supported by the new ASA5500-X Series (as they dont support 8.4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems that 8.6(1) , 9.0(4) and 9.1(4) all completely ingnore the NAT configuration when determining the egress interface. The ASA simply performs a Route Lookup even though the document states that it should not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remember trying this with 9.1(1) even on the original ASA5500 Series and booted up that software and it worked just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So Cisco must have changed something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really getting fed up these changes to the ASA operation especially when they are undocumented changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either I am missing something or there are simply softwares that act totally different compared to the documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is example from the very latest documentation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H3&gt; Determining the Egress Interface &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1304861"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;When the ASA receives traffic for a mapped address, the ASA&amp;nbsp; unstranslates the destination address according to the NAT rule, and&amp;nbsp; then it sends the packet on to the real address.&lt;/STRONG&gt; The ASA determines the&amp;nbsp; egress interface for the packet in the following ways: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1167380"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;Transparent&amp;nbsp; mode—The ASA determines the egress interface for the real address by&amp;nbsp; using the NAT rule; you must specify the source and destination&amp;nbsp; interfaces as part of the NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1167247"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;&lt;STRONG&gt;Routed mode—The ASA determines the egress interface in one of the following ways: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;A name="wp1167222"&gt;&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; –&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;You&amp;nbsp; configure the interface in the NAT rule—The ASA uses the NAT rule to&amp;nbsp; determine the egress interface. However, you have the option to always&amp;nbsp; use a route lookup instead. In certain scenarios, a route lookup&amp;nbsp; override is required; for example, see the &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/nat_overview.html#wp1286039" rel="nofollow"&gt;"NAT and VPN Management Access" section&lt;/A&gt;. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1167223"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; –&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;You do not configure the interface in the NAT rule—The ASA uses a route lookup to determine the egress interface. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above section bolded above to my understanding states that if you have a translation for the destination address and if you specify the interface in the "nat" command then NAT should determine the egress interface NOT the routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Obviously this seems to be dependant on the software level for some reason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Command Reference also states this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;If you specify an optional interface, then the ASA uses the NAT configuration to determine the egress interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 17:16:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403050#M270605</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-31T17:16:58Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403051#M270607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I agree, that's completely rediculous.&amp;nbsp; I'm hitting up my Cisco Security SE on this to see if I can get a comment.&amp;nbsp; I appreciate your help.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now, when doing a software upgrade, it looks like additional testing will be required prior to a go live to determine if the code variant behaves as documented&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jan 2014 17:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403051#M270607</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-01-31T17:26:56Z</dc:date>
    </item>
    <item>
      <title>Configuration Suggestion and Help on NAT'ing and Routing multi i</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403052#M270608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;What level of code were you able to get this to work on the X line?&amp;nbsp; I'm on a 5512-x with 9.1(1) code and i'm getting the route lookup phase first.&amp;nbsp; I just don't get the logic behind this.&amp;nbsp; I spoke with TAC several times, and they refer to the NAT lookup method over route as a 'bug' and only support 'pbr' behavior in clusters. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, i'm actually replacing the 5510 that the above configuration was applied to with the 12-x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Raun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 15:51:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403052#M270608</guid>
      <dc:creator>raun.williams</dc:creator>
      <dc:date>2014-02-25T15:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: Configuration Suggestion and Help on NAT'ing and Routing mul</title>
      <link>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403053#M270609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only tested with 9.1(1) so far with my ASA5515-X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the Cisco TAC engineer meant in your case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally what we are doing with the NAT is something that probably was not the first idea on Ciscos mind when they were implementing the new NAT but what we are doing is essentially nothing new even compared to 8.2 (and older) Static NAT or Static Identity NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have a NAT configuration for a destination IP address of a connection it has always resulted on the ASA following the NAT configurations rather than the routing table. Its a very common problem in some older customer setups where it starts to cause problems when for example Static Identity NAT has been configured with large enough network mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To give you an example &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A customer originally planned its network so that the address space 10.10.0.0/16 would be used only behind a single interface on the ASA therefore they configured a route for that network and also configured the following Static Identity NAT between&lt;STRONG&gt; "inside"&lt;/STRONG&gt; and&lt;STRONG&gt; "dmz"&lt;/STRONG&gt; (to avoid matching Dynamic PAT configuration and traffic getting dropped between these interfaces)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,inside) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What the above essentially does is that a connection coming from behind &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface towards any destination IP address matching 10.10.0.0/16 would get diverted towards &lt;STRONG&gt;"dmz" &lt;/STRONG&gt;whatever the routing table said.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Later the customer merged with another network which had a network 10.10.150.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This essentially caused problems as the customer &lt;STRONG&gt;"inside"&lt;/STRONG&gt; was not able to connect towards this network as all of the 10.10.0.0/16 connections were forwarded still to the &lt;STRONG&gt;"dmz"&lt;/STRONG&gt; interface. The solution to avoid this was to essentially configure another more specific Static Identity NAT, remove the existing one and finally add it again which resulted in the new rule being before the original rule and therefore getting applied first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So essentially&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (newint,inside) 10.10.150.0 10.10.150.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no static (dmz,inside) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (dmz,inside) 10.10.0.0 10.10.0.0 netmask 255.255.0.0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the exact answers you have gotten from TAC were (though I would be interested in seeing them) but I don't buy that explanation. This is because they are essentially telling that they have had that "bug" for several years (since the old software levels!) and they have also redone the NAT and decided to keep that "bug" in the new NAT format too. I just don't buy it. It would also mean that they decided to give wrong information in the configuration guide which also mentions the behaviour I described above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The most common situation where you can confirm this behaviour is if you have Static NAT configured for some server you have towards the external/public network. If you would now use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command and simulate a packet incoming from external/public network towards this public IP address on a specified port/service you would initially see a UN-NAT phase where the packets destination IP address it matched against an existing NAT configuration and this destination IP address would be untranslated to the local IP address of the server and the traffic would be diverted towards the local interface specified in the NAT configurations. So if they are telling me that this behaviour is some sort of bug then I dont understand what they mean. What we are doing with the destination 0.0.0.0/0 NAT or 0.0.0.0/1 and 128.0.0.0/1 NAT is essentially creating a NAT for ANY destination IP address so connections could be diverted to the correct interface no matter what the routing table says.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will get be getting some new X-Series ASAs next month and I will need to get an answer to this question myself from Cisco. I think you might need to push to get the TAC case handled further up the chain because the initial TAC engineer might not be able to give an satisfactory explanation on the situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Feb 2014 17:38:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuration-suggestion-and-help-on-nat-ing-and-routing-multi/m-p/2403053#M270609</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-25T17:38:59Z</dc:date>
    </item>
  </channel>
</rss>

