<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Asymmetrical Nat issues with PAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343910#M343758</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually think that the above configuration contains more/different configurations than the ones you originally copy/pasted here from the original software? There is for example some configuration between &lt;STRONG&gt;"customer" &lt;/STRONG&gt;and &lt;STRONG&gt;"Internet" &lt;/STRONG&gt;interfaces that wasnt there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine most of the below configurations are just like the conversion did them, only with different &lt;STRONG&gt;"object" &lt;/STRONG&gt;name which dont have to be what they are below necesarily.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Dynamic PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Old&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (customer) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (Internet) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.222.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;New&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.222.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DMZ-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,Internet) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,customer) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,Internet) after-auto source dynamic DMZ-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,customer) after-auto source dynamic DMZ-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Static PAT (Port Forward)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Old&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface www 192.168.222.11 www netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface https 192.168.222.11 https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 104 192.168.222.47 104 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 11112 192.168.222.47 11112 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface ftp 192.168.222.22 ftp netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface ftp-data 192.168.222.22 ftp-data netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1491 192.168.222.161 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1492 192.168.222.162 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1493 192.168.222.163 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 citrix-ica 192.168.222.61 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 https 192.168.222.62 https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,customer) tcp 192.168.30.35 http 192.168.100.10 http netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;New&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP104&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.47&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 104 104&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP11112&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.47&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 11112 11112&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 21 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FTP-DATA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 20 20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1491&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.161&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1491&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1492&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.162&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1492&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1493&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.163&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1493&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network CITRIX-ICA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.61&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica citrix-ica&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.62&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WWW-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,customer) static 192.168.30.35 service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Configurations that I am not sure about&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,DMZ) 192.168.222.0 192.168.222.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 9100 192.168.30.100 9100 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,inside) 192.168.222.10 192.168.100.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First configuration I usually leave out from the configurations completely as there is no need to do Identity NAT between local interfaces (NAT the network to itself)&lt;/LI&gt;&lt;LI&gt;Second configuration seems to again have an IP address 192.168.30.100 that is NOT located behind the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface&lt;/LI&gt;&lt;LI&gt;Third configuration is a bit unusual but can be converted to the below format&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DMZ-192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,inside) static 192.168.222.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 31 Aug 2013 11:20:10 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-31T11:20:10Z</dc:date>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343903#M343727</link>
      <description>&lt;P&gt;Long story short, we converted an old firewall from ASA 7.2.4 to 9.0.2 recently and well...80% of the config carried over with all everything in the config functioning as intended....except NAT. I've been racking my mind around the nat rules and why almost all of them result in asymmetrical issues when I've doing pen tests with nmap and wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I've come to the collective hive mind, hoping to gain some further understanding on the issue at hand and possibly ways to correct the issues (because so far all the migration giudes haven't been of any use)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've included the &lt;STRONG&gt;show nat detail&lt;/STRONG&gt; command for reference&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;/P&gt;&lt;P&gt;1 (DMZ) to (customer) source static Static_IP G_PC&amp;nbsp;&amp;nbsp; service tcp www www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.30.35/32, Translated: 192.168.100.10/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: www Mapped: www&lt;/P&gt;&lt;P&gt;2 (DMZ) to (inside) source static G_PC G_NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.100.10/32, Translated: 192.168.222.10/32&lt;/P&gt;&lt;P&gt;3 (inside) to (customer) source static Web interface&amp;nbsp;&amp;nbsp; service tcp www www&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.11/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: www Mapped: www&lt;/P&gt;&lt;P&gt;4 (inside) to (customer) source static Web-01 interface&amp;nbsp;&amp;nbsp; service tcp https https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.11/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: https Mapped: https&lt;/P&gt;&lt;P&gt;5 (inside) to (customer) source static PS1 interface&amp;nbsp;&amp;nbsp; service tcp ftp ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.22/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: ftp Mapped: ftp&lt;/P&gt;&lt;P&gt;6 (inside) to (customer) source static PS1-01 interface&amp;nbsp;&amp;nbsp; service tcp ftp-data ftp-data&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.22/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: ftp-data Mapped: ftp-data&lt;/P&gt;&lt;P&gt;7 (inside) to (customer) source static DS interface&amp;nbsp;&amp;nbsp; service tcp 104 104&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.47/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: 104 Mapped: 104&lt;/P&gt;&lt;P&gt;8 (inside) to (customer) source static DS01 interface&amp;nbsp;&amp;nbsp; service tcp 11112 11112&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.47/32, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: 11112 Mapped: 11112&lt;/P&gt;&lt;P&gt;9 (inside) to (customer) source static RA S_R_P&amp;nbsp;&amp;nbsp; service tcp https https&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.62/32, Translated: 192.168.30.31/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: https Mapped: https&lt;/P&gt;&lt;P&gt;10 (inside) to (customer) source static RT S_R_P&amp;nbsp;&amp;nbsp; service tcp citrix-ica citrix-ica&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.63/32, Translated: 192.168.30.31/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: citrix-ica Mapped: citrix-ica&lt;/P&gt;&lt;P&gt;11 (inside) to (customer) source static RPS1 Static_Remote_Plan&amp;nbsp;&amp;nbsp; service tcp citrix-ica 1491&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.161/32, Translated: 192.168.30.31/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: citrix-ica Mapped: 1491&lt;/P&gt;&lt;P&gt;12 (inside) to (customer) source static RPS2 Static_Remote_Plan&amp;nbsp; service tcp citrix-ica 1492&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.162/32, Translated: 192.168.30.31/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: citrix-ica Mapped: 1492&lt;/P&gt;&lt;P&gt;13 (inside) to (customer) source static RPS3 Static_Remote_Plan&amp;nbsp;&amp;nbsp; service tcp citrix-ica 1493&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.163/32, Translated: 192.168.30.31/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Service - Protocol: tcp Real: citrix-ica Mapped: 1493&lt;/P&gt;&lt;P&gt;14 (inside) to (DMZ) source static obj-192.168.222.0 192.168.222.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.0/24, Translated: 192.168.222.0/24&lt;/P&gt;&lt;P&gt;15 (DMZ) to (customer) source dynamic obj-192.168.100.0 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.100.0/24, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;16 (DMZ) to (Internet) source dynamic obj-192.168.100.0-01 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.100.0/24, Translated: 1.2.3.4/24&lt;/P&gt;&lt;P&gt;17 (inside) to (customer) source dynamic obj-192.168.222.0-01 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.0/24, Translated: 192.168.30.1/24&lt;/P&gt;&lt;P&gt;18 (inside) to (Internet) source dynamic obj-192.168.222.0-02 interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Source - Origin: 192.168.222.0/24, Translated: 1.2.3.4/24&lt;/P&gt;&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:32:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343903#M343727</guid>
      <dc:creator>sorenson1e</dc:creator>
      <dc:date>2019-03-12T02:32:34Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343904#M343728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also provide the output of &lt;STRONG&gt;"show run nat"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the traffic that is generating the error messages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you perhaps provide &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output of this traffic? I mean simulate a packet entering the ASA through some interface that you have tested from an actual host that resulted in the logs about asymmetric NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input &lt;SOURCE interface=""&gt; tcp &lt;SOURCE ip=""&gt; &lt;SOURCE port=""&gt; &lt;DESTINATION ip=""&gt; &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/SOURCE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above all the NAT configurations on your firewall since I am only seeing Auto NAT. Though I dont know if you really need Manual NAT to build a basic configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One option would also be to see the old 7.2 software format NAT configuration which might make easier to provide you with a corresponding configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 06:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343904#M343728</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T06:23:32Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343905#M343729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Alright as requested the original 7.2 config is below:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;global (customer) 1 interface&lt;/P&gt;
&lt;P&gt;global (Internet) 1 interface&lt;/P&gt;
&lt;P&gt;nat (inside) 1 192.168.222.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;nat (DMZ) 1 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface www Web www netmask 255.255.255.255 &lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface https Web https netmask 255.255.255.255 &lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface 104 DS 104 netmask 255.255.255.255 &lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface 11112 DS 11112 netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface ftp PS1 ftp netmask 255.255.255.255 &lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface ftp-data PS1 ftp-data netmask 255.255.255.255 &lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp Static_Remote_Plan 1491 RPS1 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp Static_Remote_Plan 1492 RPS2 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp Static_Remote_Plan 1493 RPS3 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp Static_Remote_Plan citrix-ica RT citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp Static_Remote_Plan https RA https netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,DMZ) 192.168.222.0 192.168.222.0 netmask 255.255.255.0 &lt;/P&gt;
&lt;P&gt;static (DMZ,inside) G_NAT G_PC netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (DMZ,customer) tcp G_PC www Static_IP www netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;static (inside,customer) tcp interface 9100 PS_Printer 9100 netmask 255.255.255.255&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Odd thing is, every NAT rule here when tested fails on a Pen. Test and shows in the ASDM logs as a Asymmetrical NAT issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only connections that don't result in the asymmetric issues are traffic (with the exception of G_PC to Static_IP)&amp;nbsp; going from the DMZ interface to the inside or from the DMZ interface to the customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet Tracer from DMZ to Inside:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;# packet-tracer input DMZ tcp 192.168.100.10 1065 192.168.222.1 23&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;/P&gt;
&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Implicit Rule&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;/P&gt;
&lt;P&gt;Type: UN-NAT&lt;/P&gt;
&lt;P&gt;Subtype: static&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;object network obj-192.168.222.0&lt;/P&gt;
&lt;P&gt; nat (inside,DMZ) static 192.168.222.0&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;
&lt;P&gt;Untranslate DRS/23 to DRS/23&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;/P&gt;
&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;
&lt;P&gt;Subtype: log&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;access-group dmz_beam_off in interface DMZ&lt;/P&gt;
&lt;P&gt;access-list dmz_beam_off extended permit tcp object G_PC object DRS eq telnet&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;object network G_PC&lt;/P&gt;
&lt;P&gt; nat (DMZ,inside) static G_NAT&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Static translate G_PC/1065 to G_NAT/1065&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype: per-session&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;/P&gt;
&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;/P&gt;
&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype: rpf-check&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;object network obj-192.168.222.0&lt;/P&gt;
&lt;P&gt; nat (inside,DMZ) static 192.168.222.0&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype: per-session&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;/P&gt;
&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;/P&gt;
&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;New flow created with id 1068, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result:&lt;/P&gt;
&lt;P&gt;input-interface: DMZ&lt;/P&gt;
&lt;P&gt;input-status: up&lt;/P&gt;
&lt;P&gt;input-line-status: up&lt;/P&gt;
&lt;P&gt;output-interface: inside&lt;/P&gt;
&lt;P&gt;output-status: up&lt;/P&gt;
&lt;P&gt;output-line-status: up&lt;/P&gt;
&lt;P&gt;Action: allow&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Packet tracer from inside to DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;# packet-tracer input inside tcp 192.168.222.1 1065 192.168.100.10 20000&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 1&lt;/P&gt;
&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Implicit Rule&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;/P&gt;
&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;
&lt;P&gt;Subtype: input&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.100.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; DMZ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;/P&gt;
&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;
&lt;P&gt;Subtype: log&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;access-group inside_beam_off in interface inside&lt;/P&gt;
&lt;P&gt;access-list inside_beam_off extended permit tcp object DRS object G_PC object-group TGWAutoWin&lt;/P&gt;
&lt;P&gt;object-group service TGWAutoWin tcp&lt;/P&gt;
&lt;P&gt; description: ports required for the operation of the TGWAutoWin Service.&lt;/P&gt;
&lt;P&gt; port-object eq 20000&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;object network obj-192.168.222.0&lt;/P&gt;
&lt;P&gt; nat (inside,DMZ) static 192.168.222.0&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Static translate DRS/1065 to DRS/1065&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype: per-session&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;/P&gt;
&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;/P&gt;
&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;
&lt;P&gt;Subtype:&lt;/P&gt;
&lt;P&gt;Result: ALLOW&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;/P&gt;
&lt;P&gt;Type: NAT&lt;/P&gt;
&lt;P&gt;Subtype: rpf-check&lt;/P&gt;
&lt;P&gt;Result: DROP&lt;/P&gt;
&lt;P&gt;Config:&lt;/P&gt;
&lt;P&gt;object network G_PC&lt;/P&gt;
&lt;P&gt; nat (DMZ,inside) static G_NAT&lt;/P&gt;
&lt;P&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Result:&lt;/P&gt;
&lt;P&gt;input-interface: inside&lt;/P&gt;
&lt;P&gt;input-status: up&lt;/P&gt;
&lt;P&gt;input-line-status: up&lt;/P&gt;
&lt;P&gt;output-interface: DMZ&lt;/P&gt;
&lt;P&gt;output-status: up&lt;/P&gt;
&lt;P&gt;output-line-status: up&lt;/P&gt;
&lt;P&gt;Action: drop&lt;/P&gt;
&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 14:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343905#M343729</guid>
      <dc:creator>sorenson1e</dc:creator>
      <dc:date>2013-08-30T14:56:47Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343906#M343730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; seems to go through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; probably fails because the IP you have targeted is actually NATed to some other IP address between these interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you are probably targeting the real IP address of some server and the initial direction of this test goes through but&amp;nbsp; the reverse check for the NAT shows that there is actually a NAT configuration for this host and therefore there is a fail in the NAT phase. You are probably targeting IP &lt;STRONG&gt;"G_PC"&lt;/STRONG&gt; rather than the &lt;STRONG&gt;"G_NAT"&lt;/STRONG&gt; IP address that the test matches in the reverse direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The old NAT configuration would be a bit more helpfull if I could see the IP addresses instead of the names given with the &lt;STRONG&gt;"name"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice that if you actual situation is so that there is no need for NAT between your &lt;STRONG&gt;"inside" &lt;/STRONG&gt;and &lt;STRONG&gt;"DMZ"&lt;/STRONG&gt; interfaces then in the new software you dont have to configure anything between your local interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343906#M343730</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T15:12:06Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343907#M343734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ah, sorry about the names in the old config, here's the original with replacement IP's&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;global (customer) 1 interface&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;global (Internet) 1 interface&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside) 1 192.168.222.0 255.255.255.0&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (DMZ) 1 192.168.100.0 255.255.255.0&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface www 192.168.222.11 www netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface https 192.168.222.11 https netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface 104 192.168.222.47 104 netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface 11112 192.168.222.47 11112 netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface ftp 192.168.222.22 ftp netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface ftp-data 192.168.222.22 ftp-data netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp 192.168.30.31 1491 192.168.222.161 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp &lt;SPAN style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 10pt;"&gt;192.168.30.31 &lt;/SPAN&gt;1492 192.168.222.162 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp &lt;SPAN style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 10pt;"&gt;192.168.30.31 &lt;/SPAN&gt;1493 192.168.222.163 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp &lt;SPAN style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 10pt;"&gt;192.168.30.31 &lt;/SPAN&gt;citrix-ica 192.168.222.61 citrix-ica netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp &lt;SPAN style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 10pt;"&gt;192.168.30.31 &lt;/SPAN&gt;https 192.168.222.62 https netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,DMZ) 192.168.222.0 192.168.222.0 netmask 255.255.255.0&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (DMZ,inside) 192.168.222.10 192.168.100.10 netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (DMZ,customer) tcp 192.168.100.10 www 192.168.30.31 www netmask 255.255.255.255&lt;/P&gt;
&lt;P style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,customer) tcp interface 9100 192.168.30.100 9100 netmask 255.255.255.255&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 15:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343907#M343734</guid>
      <dc:creator>sorenson1e</dc:creator>
      <dc:date>2013-08-30T15:47:36Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343908#M343744</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of the configurations seem pretty straight forward but there are a couple of ones that I would like to clear up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below configuration essentially does a Static NAT for one DMZ host so that its translated to an IP address belonging to the INSIDE network. Is there a particular reason for this configuration? Is it really needed or could the users instead use the actual destination IP address of 192.168.100.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;static (DMZ,inside) 192.168.222.10 192.168.100.10 netmask 255.255.255.255&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The below configuration doesnt make sense on the basis of the other configurations you posted. According to the below configuration there is a host 192.168.30.31 behind the DMZ interface that is then NATed towards the CUSTOMER using a NAT IP address that belongs to the actual DMZ network 192.168.100.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;static (DMZ,customer) tcp 192.168.100.10 www 192.168.30.31 www netmask 255.255.255.255&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration are mainly the ones which purpose is not clear to me. The first one mentioned might be used in some situation but the second one doesnt make sense according to the rest of the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 17:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343908#M343744</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-30T17:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343909#M343751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The below configuration doesnt make sense on the basis of the other configurations you posted. According to the below configuration there is a host 192.168.30.31 behind the DMZ interface that is then NATed towards the CUSTOMER using a NAT IP address that belongs to the actual DMZ network 192.168.100.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt;static (DMZ,customer) tcp 192.168.100.10 www 192.168.30.31 www netmask 255.255.255.255&lt;/BLOCKQUOTE&gt;&lt;/PRE&gt;&lt;P&gt;Ah, looking back on that one it appears I manually rolled back (8.4 to 7.2) that one incorrectly and swapped the source with the destination, it should be:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;static (DMZ,customer) tcp &lt;STRONG&gt;192.168.30.35&lt;/STRONG&gt; http &lt;STRONG&gt;192.168.100.10&lt;/STRONG&gt; http netmask 255.255.255.255&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally here's the censored version of the current 8.4 NAT setup conversion has set us with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network obj-192.168.222.22&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp ftp ftp &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.161&lt;/P&gt;&lt;P&gt; nat (inside,customer) static obj-192.168.30.31 service tcp citrix-ica 1491 &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.162&lt;/P&gt;&lt;P&gt; nat (inside,customer) static obj-192.168.30.31 service tcp citrix-ica 1492 &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.163&lt;/P&gt;&lt;P&gt; nat (inside,customer) static obj-192.168.30.31 service tcp citrix-ica 1493 &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.62&lt;/P&gt;&lt;P&gt; nat (inside,customer) static obj-192.168.30.31 service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.63&lt;/P&gt;&lt;P&gt; nat (inside,customer) static obj-192.168.30.31 service tcp citrix-ica citrix-ica &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.11&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.11-01&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp https https &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.47&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp 104 104 &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.47-01&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp 11112 11112 &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.22-01&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp ftp-data ftp-data &lt;/P&gt;&lt;P&gt;object network obj-192.168.222.0&lt;/P&gt;&lt;P&gt; nat (inside,DMZ) static 192.168.222.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.222.0-01&lt;/P&gt;&lt;P&gt; nat (inside,customer) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.222.0-02&lt;/P&gt;&lt;P&gt; nat (inside,Internet) dynamic interface&lt;/P&gt;&lt;P&gt; nat (customer,Internet) dynamic obj-0.0.0.0&lt;/P&gt;&lt;P&gt;object network obj-192.168.100.0&lt;/P&gt;&lt;P&gt; nat (DMZ,customer) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.100.0-01&lt;/P&gt;&lt;P&gt; nat (DMZ,Internet) dynamic interface&lt;/P&gt;&lt;P&gt;object network obj-192.168.30.35&lt;/P&gt;&lt;P&gt; nat (DMZ,customer) static obj-192.168.100.0 service tcp www www &lt;/P&gt;&lt;P&gt;object network obj-192.168.30.100&lt;/P&gt;&lt;P&gt; nat (inside,customer) static interface service tcp 9100 9100 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 20:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343909#M343751</guid>
      <dc:creator>sorenson1e</dc:creator>
      <dc:date>2013-08-30T20:05:02Z</dc:date>
    </item>
    <item>
      <title>Asymmetrical Nat issues with PAT</title>
      <link>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343910#M343758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually think that the above configuration contains more/different configurations than the ones you originally copy/pasted here from the original software? There is for example some configuration between &lt;STRONG&gt;"customer" &lt;/STRONG&gt;and &lt;STRONG&gt;"Internet" &lt;/STRONG&gt;interfaces that wasnt there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine most of the below configurations are just like the conversion did them, only with different &lt;STRONG&gt;"object" &lt;/STRONG&gt;name which dont have to be what they are below necesarily.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Dynamic PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Old&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (customer) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (Internet) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.222.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ) 1 192.168.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;New&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network INSIDE-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.222.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DMZ-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,Internet) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,customer) after-auto source dynamic INSIDE-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,Internet) after-auto source dynamic DMZ-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (DMZ,customer) after-auto source dynamic DMZ-PAT-SOURCE interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Static PAT (Port Forward)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Old&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface www 192.168.222.11 www netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface https 192.168.222.11 https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 104 192.168.222.47 104 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 11112 192.168.222.47 11112 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface ftp 192.168.222.22 ftp netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface ftp-data 192.168.222.22 ftp-data netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1491 192.168.222.161 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1492 192.168.222.162 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 1493 192.168.222.163 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 citrix-ica 192.168.222.61 citrix-ica netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp 192.168.30.31 https 192.168.222.62 https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,customer) tcp 192.168.30.35 http 192.168.100.10 http netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;New&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP104&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.47&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 104 104&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP11112&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.47&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 11112 11112&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 21 21&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network FTP-DATA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static interface service tcp 20 20&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1491&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.161&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1491&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1492&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.162&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1492&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network TCP1493&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.163&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica 1493&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network CITRIX-ICA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.61&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp citrix-ica citrix-ica&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.222.62&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,customer) static 192.168.30.31 service tcp 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WWW-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,customer) static 192.168.30.35 service tcp 80 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Configurations that I am not sure about&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,DMZ) 192.168.222.0 192.168.222.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,customer) tcp interface 9100 192.168.30.100 9100 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,inside) 192.168.222.10 192.168.100.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First configuration I usually leave out from the configurations completely as there is no need to do Identity NAT between local interfaces (NAT the network to itself)&lt;/LI&gt;&lt;LI&gt;Second configuration seems to again have an IP address 192.168.30.100 that is NOT located behind the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface&lt;/LI&gt;&lt;LI&gt;Third configuration is a bit unusual but can be converted to the below format&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DMZ-192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.100.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (DMZ,inside) static 192.168.222.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 11:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asymmetrical-nat-issues-with-pat/m-p/2343910#M343758</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-31T11:20:10Z</dc:date>
    </item>
  </channel>
</rss>

