<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nat'ing Lan subnet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418967#M309636</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the the NAT rule is bidirectional as long as it matches the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from LAN 192.168.1.0/24 towards host 2.2.2.2 will be NATed to 172.31.196.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from host 2.2.2.2 towards 172.31.196.0/24 will be UN-NATed to 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Nov 2013 14:04:00 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-11-05T14:04:00Z</dc:date>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418960#M309629</link>
      <description>&lt;P&gt; I have a tunnel created and I need to NAT the local network 192.168.1.0/24 to 172.31.196.0/24 to the destination IP, let's say (2.2.2.2)&lt;/P&gt;&lt;P&gt;code version is 821&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;name 2.2.2.2 External_IP&lt;/P&gt;&lt;P&gt;name 172.31.196.0 Local_xlated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought the statement would look like nat (inside,outside) inside-network Local_xlated static destination External_IP&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418960#M309629</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2019-03-12T03:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418961#M309630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean that your software level is 8.2(1)? You should see the mentioned information with the &lt;STRONG&gt;"show version" &lt;/STRONG&gt;command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is your software level then you would be using the older NAT configuration format and not the one you have mentioned in the post. The above configuration seems to be of the new format that came in the 8.3+ software versions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would essentially be configuring a Static Policy NAT with the help of &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; and &lt;STRONG&gt;"static" &lt;/STRONG&gt;command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list L2LVPN-POLICYNAT remark Static Policy NAT for L2L VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list L2LVPN-POLICYNAT permit ip 192.168.1.0 255.255.255.0 host 2.2.2.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 172.31.196.0 access-list L2LVPN-POLICYNAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should achieve what you are attempting.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words, when the source network is 192.168.1.0/24 and the destination for the connection is host 2.2.2.2 then translate the source network 192.168.1.0/24 to NAT network 172.31.196.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since this is the older NAT configuration format there might be one thing you should consider. If any host on the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;network of 192.168.1.0/24 has a Static NAT configured to the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; then you might have to remove that Static NAT and re-enter if after you have added the above configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for the above suggestion is the fact that if you have an existing Static NAT for a host on 192.168.1.0/24 network towards &lt;STRONG&gt;"outside"&lt;/STRONG&gt; then that Static NAT will keep overriding the Static Policy NAT. This is because the Static NAT is configured before the Static Policy NAT. Removing and re-entering the Static NAT would essentially enter it after the new Static Policy NAT and everything should be ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if this works for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 22:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418961#M309630</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-04T22:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418962#M309631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So any static statements only with (inside,outside) should be removed and rentered?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if there's a static statement with (inside, backup), that doesn't need to be?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yes,&amp;nbsp; i did mean 8.2(1).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:10:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418962#M309631</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T00:10:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418963#M309632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If u are using dual Outside Interfaces, then you must assigned it to that backup interface in case the primary goes down!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all of the helpful posts!!! &lt;BR /&gt; &lt;BR /&gt;Regards, &lt;BR /&gt; &lt;BR /&gt;Jcarvaja &lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Follow me on &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 00:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418963#M309632</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-11-05T00:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418964#M309633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe the remote end is only pointing to the primary IP though in the site to site.&amp;nbsp; But I can add the backup NATing as well in case that is changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe the client did not want to pay for more memory in order to update the code, which is why it's still at that version.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 01:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418964#M309633</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T01:41:20Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418965#M309634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your L2L VPN are built only through the primary &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface then you only need to configure the Static Policy NAT for the primary &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont necesarily have to do anything more than configure the above Static Policy NAT. Though you might find that hosts/servers with their own Static NAT to a public IP address might not be able to access the remote network because of that existing Static NAT. For those you would then have to make the change in the order of the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as a correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 07:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418965#M309634</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T07:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418966#M309635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just to clarify, the NAT'ing will be both directions? The remote network will see the 192.168.1.0 network as &lt;/P&gt;&lt;P&gt;172.31.196.0?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 14:00:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418966#M309635</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T14:00:18Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418967#M309636</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the the NAT rule is bidirectional as long as it matches the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from LAN 192.168.1.0/24 towards host 2.2.2.2 will be NATed to 172.31.196.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from host 2.2.2.2 towards 172.31.196.0/24 will be UN-NATed to 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 14:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418967#M309636</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T14:04:00Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418968#M309637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I received an error when i removed the static statements and reentered them.&amp;nbsp; stating the local lan was already NAT'ed to the 172.31.196.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did as you said.&amp;nbsp; entered, the access-list and static.&amp;nbsp; removed the static statements and tried to re-add them.&amp;nbsp;&amp;nbsp; I reverted back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am going to see if we can update the code.&amp;nbsp;&amp;nbsp;&amp;nbsp; Where do I find the memory requirements for asa913-k8?&amp;nbsp;&amp;nbsp; This asa currently has 256MB&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 14:47:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418968#M309637</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T14:47:06Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418969#M309638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, it will probably give you an error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you check if both &lt;STRONG&gt;"static"&lt;/STRONG&gt; configurations were there after the removing and adding the normal Static NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work since I have used it even in our own network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have both of them configured you can use &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; to confirm that the rule works as it should&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.1.100 12345 2.2.2.2 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.1.100 1.1.1.1 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These should provide 2 different translations. You can share the output with us if you want us to chech through them. It should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 14:50:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418969#M309638</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418970#M309639</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am trying to ping from asa and every result is ?????&lt;/P&gt;&lt;P&gt;i tried specifying the interface.&amp;nbsp;&amp;nbsp; I have the tunnel enabled through asdm but don't see it up in monitoring.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This ping issue was prior to any changes from what we are working on.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 15:19:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418970#M309639</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T15:19:13Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418971#M309640</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I doubt the ASA will apply any translation to any traffic you generate from it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; commands I provided should tell us exactly what translation is applied to the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To actually test the traffic you will have to use an actual host in the network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 15:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418971#M309640</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T15:22:02Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418972#M309641</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, i was just wondering why i couldn't ping anything from asa like even an internal IP.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;packet-tracer input inside tcp 192.168.1.6 53 8.8.8.8 53&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;packet-tracer input inside tcp 192.168.1.6 53 173.220.117.20 53&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;is this a valid test?&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 12px; font-family: Arial, verdana, sans-serif; "&gt;&lt;STRONG&gt;there's a static nat for 1.6 inside,outside for 53 so this two statements should have different results correct?&amp;nbsp; if this is a valid test, i'll perform and show you the results. &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 15:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418972#M309641</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T15:34:22Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418973#M309642</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the IP address 173.220.117.20 is an IP address used in the Static Policy NAT ACL as the destination IP address then these should be the correct commands to simulate and test the NAT behaviour&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 15:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418973#M309642</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T15:39:21Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418974#M309643</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;eluciasa(config)# packet-tracer input inside tcp 192.168.1.6 53 8.8.8.8 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) MC_Local_xlated&amp;nbsp; access-list L2LVPN-POLICYNAT&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 outside host External_IP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to MC_Local_xlated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (External_IP [Interface PAT])&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 24686918, untranslate_hits = 1904674&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Dynamic translate EluciMX01/53 to External_IP/356 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 32668832, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eluciasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 16:26:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418974#M309643</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T16:26:56Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418975#M309644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;eluciasa(config)# packet-tracer input inside tcp 192.168.1.6 53 173.220.117.20$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; External_IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.255 identity&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: NP Identity Ifc&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eluciasa(config)#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 16:27:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418975#M309644</guid>
      <dc:creator>gtorresjr77</dc:creator>
      <dc:date>2013-11-05T16:27:29Z</dc:date>
    </item>
    <item>
      <title>Nat'ing Lan subnet</title>
      <link>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418976#M309645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; that is supposed to hit the Static Policy NAT is targeting your actual interface IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we are talking about a Static Policy NAT for a L2L VPN connection then you would naturally need to be targetting any IP address that is at the remote end. That same target IP address (all of them) should also be mentioned in the Static Policy NAT configurations &lt;STRONG&gt;"access-list"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems that you are either targetting the wrong IP address or there has been some greater missunderstanding what you are trying to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are trying to confirm that when traffic from your LAN 192.168.1.0/24 goes towards the remote host 2.2.2.2 behind L2L VPN connection then its source address will be translated to the NAT IP address from network 172.31.196.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems the first &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; matches your usualy Dynamic PAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Nov 2013 16:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-ing-lan-subnet/m-p/2418976#M309645</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-11-05T16:32:51Z</dc:date>
    </item>
  </channel>
</rss>

