<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 9.x NAT issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371848#M271252</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration is OK even though you are using Static PAT (Port Forward). I would suggest using Static NAT if you can spare the public IP address for this single host. You can then use the ACL to control which ports you allow to this host/server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem is in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The big change in ASA NAT configuration format an operation happened when the 8.3 Software came. From that software upwards the ASA performs the NAT operations first and then checks the ACLs for a destination host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in the new software levels this essentially means you will be allowing the traffic to the actual local/real IP address even if this traffic is to be allowed from the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can actually use the &lt;STRONG&gt;"object"&lt;/STRONG&gt; you created for the NAT in the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any object host-192.168.4.44 eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally tend to name the &lt;STRONG&gt;"object"&lt;/STRONG&gt; a bit differently so it clearly mentions the servers role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 18 Jan 2014 17:22:55 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-18T17:22:55Z</dc:date>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371847#M271250</link>
      <description>&lt;P&gt;So I'm trying to do a simple test in a lab environment but can't seem to understand why the syntax for NAT statements is not working in 9.x. Here is an example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA: outside ip 99.99.99.99/29&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inside ip 192.168.4.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT outside ip 99.99.99.100 to inside ip 192.168.4.44 and allow ports https only?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network host-192.168.4.44&lt;/P&gt;&lt;P&gt; host 192.168.4.44&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.100 service tcp https https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any host 99.99.99.100 eq https&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet tracer result: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa(config)# packet-tracer input outside tcp 213.23.23.2 https 99.99.99.1$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network host-192.168.4.44&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.100 service tcp https https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 99.99.99.100/443 to 192.168.4.44/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt;Auto NAT Policies (Section 2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;1 (inside) to (outside) source static host-192.168.4.44 99.99.99.100&amp;nbsp;&amp;nbsp; service tcp https https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show xlate&lt;/P&gt;&lt;P&gt;1 in use, 1 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice&lt;/P&gt;&lt;P&gt;TCP PAT from inside:192.168.4.44 443-443 to outside:99.99.99.100 443-443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; flags sr idle 0:03:46 timeout 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if I can try any other syntax or if I put something incorrectly? Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:32:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371847#M271250</guid>
      <dc:creator>Saad Mohammad</dc:creator>
      <dc:date>2019-03-12T03:32:20Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371848#M271252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration is OK even though you are using Static PAT (Port Forward). I would suggest using Static NAT if you can spare the public IP address for this single host. You can then use the ACL to control which ports you allow to this host/server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your problem is in the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The big change in ASA NAT configuration format an operation happened when the 8.3 Software came. From that software upwards the ASA performs the NAT operations first and then checks the ACLs for a destination host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in the new software levels this essentially means you will be allowing the traffic to the actual local/real IP address even if this traffic is to be allowed from the external network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can actually use the &lt;STRONG&gt;"object"&lt;/STRONG&gt; you created for the NAT in the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in extended permit tcp any object host-192.168.4.44 eq 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally tend to name the &lt;STRONG&gt;"object"&lt;/STRONG&gt; a bit differently so it clearly mentions the servers role&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 17:22:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371848#M271252</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-18T17:22:55Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371849#M271254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply Jouni. I have removed the initial ACL and added the one you provided but am still getting the same drop result. The NAT is taking place, but it's not matching the ACL. Can you lab it up quickly and see the same issue I am seeing? The only way I got forward was when using source static nat ACL. But not sure if I should use that?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 17:40:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371849#M271254</guid>
      <dc:creator>Saad Mohammad</dc:creator>
      <dc:date>2014-01-18T17:40:54Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371850#M271256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have to see the actual configuration to determine what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; with the following format&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp &lt;SOURCE ip=""&gt; &lt;SOURCE port=""&gt; &lt;NAT ip=""&gt; 443&lt;/NAT&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most typical reasons a &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; would fail in a situation where you are configuring a NAT for a server are&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The values used in the command dont match the actual configuration even though the configuration might be completely fine&lt;/LI&gt;&lt;LI&gt;The traffic is not allowed to the correct IP address (change in the new NAT operation)&lt;/LI&gt;&lt;LI&gt;The interfaces have been configure at the same &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; for some reason and this produces an ACL Drop even though no ACL is stopping the traffic.&lt;/LI&gt;&lt;LI&gt;There is an overriding NAT configuration that uses the same public IP address as the new Static NAT or Static PAT. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can share the configuration (without actual public IP addresses) then I could take a look at it and see what the problem is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 17:48:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371850#M271256</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-18T17:48:29Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371851#M271259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I verified the config and the ACL you provided above did show a positive packet tracer result. So does it matter if I use the object for NAT in the ACL or can it be just the IP address of the actual host? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here was the packet tracer result:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# packet-tracer input outside tcp 213.23.23.2 https 99.99.99.100 https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network host-192.168.4.44&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.100 service tcp https https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 99.99.99.100/443 to 192.168.4.44/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp any object host-192.168.4.44 eq https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network host-192.168.4.44&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 99.99.99.100 service tcp https https&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 2, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 18:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371851#M271259</guid>
      <dc:creator>Saad Mohammad</dc:creator>
      <dc:date>2014-01-18T18:23:30Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371852#M271261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whether you use the actual IP address in the ACL with the command &lt;STRONG&gt;"host &lt;IP address=""&gt;"&lt;/IP&gt;&lt;/STRONG&gt; or the object with the command &lt;STRONG&gt;"object &lt;/STRONG&gt;&lt;OBJECT name=""&gt;&lt;STRONG&gt;"&lt;/STRONG&gt; doesnt really matter. Both allow the traffic so its up to you which way you allow the traffic and what suites you the best.&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I guess the main thing is if you configure your Static NAT and Static PAT as Auto NAT / Network Object NAT then you have the ability to use the&lt;STRONG&gt; "object"&lt;/STRONG&gt; in the ACL configurations also. The added benefit is if you were to change the local IP address of your server in the&lt;STRONG&gt; "object" &lt;/STRONG&gt;configuration used for NAT then naturally this change would update to your ACL with the &lt;STRONG&gt;"object"&lt;/STRONG&gt; is referenced. So would no need to confirm the ACL rules in that situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the above situation doesnt happen that often so its has not been that import for me personally atleast so far.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 18:29:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371852#M271261</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-18T18:29:25Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371853#M271262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks I tested both with the object and just the ip and it works for both. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more thing, the configuration that I was using was from an 8.2 code and using the same ASA migrated it to 8.3 which migrated these NAT rules. I know a lot of people have said not to rely on the internal migration syntax that ASA does when you upgrade to version 8.3+ but why would the ACLs keep the NATTED host as destination instead of the ACTUAL IP?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 18:36:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371853#M271262</guid>
      <dc:creator>Saad Mohammad</dc:creator>
      <dc:date>2014-01-18T18:36:47Z</dc:date>
    </item>
    <item>
      <title>ASA 9.x NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371854#M271264</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding it should convert them&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to a Cisco document here on the CSC that seems to indicate that too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/docs/DOC-12690"&gt;https://supportforums.cisco.com/docs/DOC-12690#ACL_Changes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Personally I have never let the ASA do the migration automatically. I have always done it manually so I know exactly what is configured on the ASA so I can't really tell you any past expiriences about the ASA behaviour when migrating from 8.2 -&amp;gt; 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a document I wrote about the new NAT format if you want to have a look&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a link to another great document comparing the old and new formats with examples&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-9129"&gt;https://supportforums.cisco.com/docs/DOC-9129&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you can always post a question here on the forums if there is some questions about the configuration format and operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Jan 2014 19:13:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-x-nat-issue/m-p/2371854#M271264</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-18T19:13:16Z</dc:date>
    </item>
  </channel>
</rss>

