<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple NAT to network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400894#M306255</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, there is a order within the NAT on 8.3 and higher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Manual Nat or Twice Nat&lt;/P&gt;&lt;P&gt;2) Object Nat (the one being used here)&lt;/P&gt;&lt;P&gt;3) After-Auto Nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside the Object-Nat the order will be done automatically by the firewall taking place the static entries and more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you enter that command you will be translating only the subnet within the obj_any 5 from the inside5 to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I was clear hehe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 07 Jan 2014 01:14:08 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2014-01-07T01:14:08Z</dc:date>
    <item>
      <title>Multiple NAT to network</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400891#M306249</link>
      <description>&lt;P&gt;I am trying to do the following on an ASA 5505 with Security Plus licensing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;public IP ASA&amp;nbsp; private IP ASA&lt;/P&gt;&lt;P&gt;199.185.3.25 &amp;lt;-------192.168.1.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |--------192.168.2.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ^&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |-------- 192.168.3.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the 192.168.1.0/24 and 192.168.2.0/24 to NAT to the internet.&amp;nbsp; &lt;/P&gt;&lt;P&gt;I can get the first subnet to work.&amp;nbsp; I can get hosts on each of the two subnets ping each other.&amp;nbsp; However, if I try to ping an external site 4.2.2.2., the first subnet works, the second one does not.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am enclosing the running-configuration from IOS 8.4.&amp;nbsp; Any insights as to what I'm missing to get the second network to be able to send and receive packets to an internet connection?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2014.01.05 21:03:36 =~=~=~=~=~=~=~=~=~=~=~=&lt;/P&gt;&lt;P&gt;sh run&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(6) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname INFOASA01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 25&lt;/P&gt;&lt;P&gt; pppoe client vpdn group PPP&lt;/P&gt;&lt;P&gt; ip address pppoe setroute &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.1.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; description Wireless&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan4&lt;/P&gt;&lt;P&gt; description home-network&lt;/P&gt;&lt;P&gt; nameif inside-46&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.3.224 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan5&lt;/P&gt;&lt;P&gt; nameif inside5&lt;/P&gt;&lt;P&gt; security-level 75&lt;/P&gt;&lt;P&gt; ip address 192.168.2.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan98&lt;/P&gt;&lt;P&gt; description VPN client&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 90&lt;/P&gt;&lt;P&gt; ip address 192.168.98.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan99&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj_25&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_143&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_1677&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_444&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_443&lt;/P&gt;&lt;P&gt; host 192.168.1.246&lt;/P&gt;&lt;P&gt;object network obj_22&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_21&lt;/P&gt;&lt;P&gt; host 192.168.1.247&lt;/P&gt;&lt;P&gt;object network obj_8009&lt;/P&gt;&lt;P&gt; host 192.168.1.249&lt;/P&gt;&lt;P&gt;object network obj_39833&lt;/P&gt;&lt;P&gt; host 192.168.1.88&lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 66.18.210.142 eq smtp &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq smtp &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq imap4 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq 1677 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.246 eq https &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.247 eq ftp &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq ssh &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.249 eq 8009 &lt;/P&gt;&lt;P&gt;access-list smtp extended permit tcp any host 192.168.1.88 eq 3389 &lt;/P&gt;&lt;P&gt;no pager&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1460&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu inside-46 1500&lt;/P&gt;&lt;P&gt;mtu inside5 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;no arp permit-nonconnected&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj_25&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp &lt;/P&gt;&lt;P&gt;object network obj_143&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp imap4 imap4 &lt;/P&gt;&lt;P&gt;object network obj_1677&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 1677 1677 &lt;/P&gt;&lt;P&gt;object network obj_444&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp https 444 &lt;/P&gt;&lt;P&gt;object network obj_443&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp https https &lt;/P&gt;&lt;P&gt;object network obj_22&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ssh 40022 &lt;/P&gt;&lt;P&gt;object network obj_21&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp ftp &lt;/P&gt;&lt;P&gt;object network obj_8009&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 8009 8009 &lt;/P&gt;&lt;P&gt;object network obj_39833&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 3389 39833 &lt;/P&gt;&lt;P&gt;access-group smtp in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;snmp-server location Home1&lt;/P&gt;&lt;P&gt;snmp-server contact network admin&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;/P&gt;&lt;P&gt;telnet timeout 3&lt;/P&gt;&lt;P&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 15&lt;/P&gt;&lt;P&gt;ssh key-exchange group dh-group1-sha1&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;vpdn group PPP request dialout pppoe&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;vpdn group PPP localname &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:9918@pppoe.nucleus.com" target="_blank"&gt;**********************&lt;/A&gt;&lt;/P&gt;&lt;P&gt;vpdn group PPP ppp authentication chap&lt;/P&gt;&lt;P&gt;vpdn username *********.com password ***** store-local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;username ***** password ******* encrypted privilege 15&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum client auto&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225 &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ip-options &lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context &lt;/P&gt;&lt;P&gt;no call-home reporting anonymous&lt;/P&gt;&lt;P&gt;Cryptochecksum:d2e31f51f0af551900f9fb8b5dd3ea72&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INFOASA01(config)# packet-tracer input inside5 tcp 192.168.2.200 12345 4.2.2.2 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 5605, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside5&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INFOASA01(config)#packet-tracer input inside5 tcp 192.168.1.200 12345 4.2.2.2 12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate 192.168.1.200/12345 to 199.185.3.25/12345&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 5633, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INFOASA01(config)# icmp&amp;nbsp;&amp;nbsp;&amp;nbsp; debug icmp tra&lt;/P&gt;&lt;P&gt;debug icmp trace enabled at level 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INFOASA01(config)# ICMP echo request from inside5:192.168.2.200 to outside:4.2.2.2 ID=46593 seq=0 len=56&lt;/P&gt;&lt;P&gt;ICMP echo request from inside5:192.168.2.200 to outside:4.2.2.2 ID=46593 seq=1 len=56&lt;/P&gt;&lt;P&gt;ICMP echo request from inside5:192.168.2.200 to outside:4.2.2.2 ID=46593 seq=2 len=56&lt;/P&gt;&lt;P&gt;ICMP echo request from inside5:192.168.2.200 to outside:4.2.2.2 ID=46593 seq=3 len=56&lt;/P&gt;&lt;P&gt;ICMP echo request from inside5:192.168.2.200 to outside:4.2.2.2 ID=46593 seq=4 len=56&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b ICMP echo request from inside:192.168.1.88 to outside:4.2.2.2 ID=1 seq=140 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.88 to outside:199.185.3.25&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:199.185.3.25 ID=1 seq=140 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:199.185.3.25 to inside:192.168.1.88&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.88 to outside:4.2.2.2 ID=1 seq=141 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.88 to outside:199.185.3.25&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:199.185.3.25 ID=1 seq=141 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:199.185.3.25 to inside:192.168.1.88&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.88 to outside:4.2.2.2 ID=1 seq=142 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.88 to outside:199.185.3.25&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:199.185.3.25 ID=1 seq=142 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:199.185.3.25 to inside:192.168.1.88&lt;/P&gt;&lt;P&gt;ICMP echo request from inside:192.168.1.88 to outside:4.2.2.2 ID=1 seq=143 len=32&lt;/P&gt;&lt;P&gt;ICMP echo request translating inside:192.168.1.88 to outside:199.185.3.25&lt;/P&gt;&lt;P&gt;ICMP echo reply from outside:4.2.2.2 to inside:199.185.3.25 ID=1 seq=143 len=32&lt;/P&gt;&lt;P&gt;ICMP echo reply untranslating outside:199.185.3.25 to inside:192.168.1.88&lt;/P&gt;&lt;P&gt;no debug icmp tra&lt;/P&gt;&lt;P&gt;debug icmp trace disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INFOASA01(config)# &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400891#M306249</guid>
      <dc:creator>apmcomp</dc:creator>
      <dc:date>2019-03-12T03:25:29Z</dc:date>
    </item>
    <item>
      <title>Multiple NAT to network</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400892#M306251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to add dynamic NAT statements for the other two networks.&amp;nbsp; Currently you only have a dynamic NAT statement for the network connected to the inside interface (192.168.1.0/24). &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try to change this statement to the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (&lt;STRONG&gt;any&lt;/STRONG&gt;,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise you would need to create separate NAT statements for each network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 11:12:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400892#M306251</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-01-06T11:12:49Z</dc:date>
    </item>
    <item>
      <title>Multiple NAT to network</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400893#M306253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I wanted to limit to just a second network, then something like:&lt;/P&gt;&lt;P&gt;object network obj_any5&lt;/P&gt;&lt;P&gt;nat(inside5,outside) dynamic interface&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does it need to be in a particular order in the list of network objects?&amp;nbsp; Lastly, is there a way to print the running configuration with the lines numbered?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the suggestion and any follow up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jan 2014 19:39:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400893#M306253</guid>
      <dc:creator>apmcomp</dc:creator>
      <dc:date>2014-01-06T19:39:29Z</dc:date>
    </item>
    <item>
      <title>Multiple NAT to network</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400894#M306255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, there is a order within the NAT on 8.3 and higher&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Manual Nat or Twice Nat&lt;/P&gt;&lt;P&gt;2) Object Nat (the one being used here)&lt;/P&gt;&lt;P&gt;3) After-Auto Nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside the Object-Nat the order will be done automatically by the firewall taking place the static entries and more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you enter that command you will be translating only the subnet within the obj_any 5 from the inside5 to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I was clear hehe&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking for some Networking Assistance?&amp;nbsp; &lt;BR /&gt;&lt;SPAN&gt;Contact me directly at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;I will fix your problem ASAP. &lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Jan 2014 01:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-to-network/m-p/2400894#M306255</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2014-01-07T01:14:08Z</dc:date>
    </item>
  </channel>
</rss>

