<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic cisco asa traffic flow with destination nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329295#M344452</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have checked some different documents from Cisco regarding this matter and it seems to me that the documents dont really match the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output with regards to the order of NAT/Routing or I am just missing something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to believe the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output blindly then I would say the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If we have a packet incoming to some ASA interface and there is no NAT for the destination IP address, the ASA will look at its routing table to determine the egress interface and then the first matching NAT configuration for this source address.&lt;/LI&gt;&lt;LI&gt;If we have a packet incoming to some ASA interface and there IS a NAT for the destination IP address, the ASA will use the destination interface in the NAT configuration as the egress interface and use that interfaces routes to determine the nexthop.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But yet looking at the packet flow charts, they only mention the L2/L3 lookups at the very end of the chart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Aug 2013 17:26:48 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-08-19T17:26:48Z</dc:date>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329290#M344447</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Can anybody comment on the below.&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; in source natting (inside users accessing internet), first the NAT will happen then the routing will happen. I agree with this..&lt;/P&gt;&lt;P&gt;2. in destination natting (outside users accessing inside server on public ip), what will happen first, NATTING or Routing. I am looking forward to hear an explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Rajesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:27:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329290#M344447</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2019-03-12T02:27:15Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329291#M344448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding when we look at a Dynamic PAT configuration for outbound traffic then the ASA will first check the routing table to determine what the egress interface is and where to forward the packet. And after that the NAT is applied according to the egress interface chosen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have an Static NAT configured for some host and a connection is coming inbound then the ASA performs UN-NAT first which shows the egress interface chosen according to the NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 06:35:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329291#M344448</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-19T06:35:57Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329292#M344449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hey Thanks Jouni for the quick reply..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--this says for outbound connection, NAT comes first and then Routing..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please have a detailed study and update me. This being in my mind and browsing thru diff articles (let it be cisco or juniper), it gives diff answers. So far, i am assuming that for destination nat traffic Routing happens first and source natting traffic NAT happes first. I dont know how it is really working ??? May be someone from Cisco Can also comment on this..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 06:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329292#M344449</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2013-08-19T06:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329293#M344450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have always used the &lt;STRONG&gt;"packec-tracer"&lt;/STRONG&gt; command to determine what is happening in a certain situation. And to my understanding there has been no change for the Source NAT between all the different software levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Route Lookup&lt;/LI&gt;&lt;LI&gt;ACL Check&lt;/LI&gt;&lt;LI&gt;Source NAT &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Destination NAT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;UN-NAT (NAT Chooses the egress interface)&lt;/LI&gt;&lt;LI&gt;ACL Check&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is ofcourse for software levels 8.3 and above. In 8.2 and below the ACL Check and UN-NAT change order for Destination NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure to what the Cisco document refers to (the one you linked) with the ordering or NAT and Route-Lookup. I am not sure how the ASA is supposed to choose the correct NAT to apply if it doesnt already know beforehand what the egress interface is for the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So lets say you have Dual ISP setup with ISP Failover. You have 2 Dynamic PAT configurations, one for each ISP. If the NAT was supposed to happen first, how does the ASA determine which Dynamic PAT configuration to use if it hasnt chosen the outbound interface for that packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Atleast this is how it seems to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 07:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329293#M344450</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-19T07:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329294#M344451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some links (not official Cisco ones) that seem to make more sense to me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Flow chart:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://ccie-or-null.net/2011/11/15/packet-flow-through-a-cisco-asa/" rel="nofollow"&gt;http://ccie-or-null.net/2011/11/15/packet-flow-through-a-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the NAT table later in this discussion:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://learningnetwork.cisco.com/thread/46543" rel="nofollow"&gt;https://learningnetwork.cisco.com/thread/46543&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 07:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329294#M344451</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-19T07:39:37Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329295#M344452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have checked some different documents from Cisco regarding this matter and it seems to me that the documents dont really match the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output with regards to the order of NAT/Routing or I am just missing something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I were to believe the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output blindly then I would say the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If we have a packet incoming to some ASA interface and there is no NAT for the destination IP address, the ASA will look at its routing table to determine the egress interface and then the first matching NAT configuration for this source address.&lt;/LI&gt;&lt;LI&gt;If we have a packet incoming to some ASA interface and there IS a NAT for the destination IP address, the ASA will use the destination interface in the NAT configuration as the egress interface and use that interfaces routes to determine the nexthop.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But yet looking at the packet flow charts, they only mention the L2/L3 lookups at the very end of the chart.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 17:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329295#M344452</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-19T17:26:48Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329296#M344453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes &lt;SPAN style="font-size: 10pt;"&gt;documents dont really match the &lt;/SPAN&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;"packet-tracer"&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt; output with regards to the order of NAT/Routing.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;So i will have to blindly believe the cisco document as given below.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Src NAT &amp;gt;- session - acl - NAT - routing&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Dst NAT &amp;gt;- session - acl - routing - NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml&lt;/A&gt;&lt;BR /&gt;Can you let me know the difference between step 5 &amp;amp; 7 == both looks like the same.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Rajesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329296#M344453</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2013-08-20T17:14:15Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329297#M344454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did send a PM through the Cisco Support Community to some Cisco employees about this discussion if they could clarify this issue with understanding the Cisco documentation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be very interested to hear the specific of this also. Even though I know how the ASA behaves with regards to choosing the NAT configuration that will be applied and the egress interface that will be chosen I am having a hard time fitting that logic to what I read on the documents you linked.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets see if there is any reply from them. Perhaps I will send messages to some other people also if there is no reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329297#M344454</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T17:20:46Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329298#M344455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you very much &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:26:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329298#M344455</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2013-08-20T17:26:52Z</dc:date>
    </item>
    <item>
      <title>Re:cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329299#M344456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;5 is matching the rule prior to inspection.&lt;BR /&gt;&lt;BR /&gt;6 is applying inspection&lt;BR /&gt;&lt;BR /&gt;7 is modifying ip addressing per Nat rule.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support Android App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 17:39:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329299#M344456</guid>
      <dc:creator>Anthony.Herman</dc:creator>
      <dc:date>2013-08-20T17:39:32Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329300#M344457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, is that 5 says, check the source and destination in NAT rules but dont apply&lt;/P&gt;&lt;P&gt;And 7 says, apply the nat translation for source/destination&lt;/P&gt;&lt;P&gt;Is that they are trying to convey ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 18:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329300#M344457</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2013-08-20T18:07:13Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329301#M344458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would seem logical to me atleast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though it still leaves me with a question about the L3 lookup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The document seems to state that the translation will determine the egress interface. Yet if I have configured Dynamic PAT from one LAN interface to 2x WAN interface then the active default route determines which Dynamic PAT is applied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this kind of confuses me still.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 18:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329301#M344458</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T18:15:59Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329302#M344459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;5 would be checking to see if a NAT rule exists in the config PRIOR to translation to reduce overhead I would assume. There is no point in performing inspection and afterwards dropping the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6 Is applying inspection engines (mpf)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7 is THEN applying the translation. (Rewriting IP headers)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure where the confusion is here, all connections should be understood from the Ingress &amp;gt; Egress standpoint. The picture under the heading ASA Packet Process Algorithm explains it beautifully on &lt;A href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080ba9d00.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 18:32:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329302#M344459</guid>
      <dc:creator>Anthony.Herman</dc:creator>
      <dc:date>2013-08-20T18:32:32Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329303#M344460</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am just wondering for example the following simple example (I ignored the typical &lt;STRONG&gt;"track"&lt;/STRONG&gt; and &lt;STRONG&gt;"sla"&lt;/STRONG&gt; configuration that would be normally used in this situation to have the automatic failover of the default route between the ISPs.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 1.1.1.2 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 2.2.2.2 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-1 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-2 0.0.0.0 0.0.0.0 2.2.2.1 254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (ISP-1) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (ISP-2) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if we look at the document, it makes no mention of any L3 lookup except after applying the NAT configurations. In the above situation I would imagine there is a NAT that could apply for the LAN network to the direction of either ISP-1 or ISP-2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So which ISP interfaces NAT configurations is applied if no decision egress interface has been made according to the routing table?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if no routing table affects the NAT chosen, how exactly is the NAT chosen on the basis of the above 2 possibilities?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 18:41:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329303#M344460</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-20T18:41:41Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329304#M344461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Anthony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We were discussing on Destination-NAT traffic flow Vs Source-NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In source-NAT, as per the link which you provided, NAT will happen before Routing. What about for Destination-NAT ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Rajesh. P&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 09:59:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329304#M344461</guid>
      <dc:creator>secureIT</dc:creator>
      <dc:date>2013-08-21T09:59:15Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329305#M344462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The topic being discussed here is one that sometimes causes confusion for ASA administrators. The general rule is that NAT translations will override the routing table when the ASA is determining the egress interface to forward the packet out of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've written a document that outlines this specific problem, as well as general NAT order of operations and some specific problems that we've seen customers hit with the NAT feature:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080c15911.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080c15911.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Specifically, check out the section "&lt;SPAN style="font-size: 10pt;"&gt;Problem: A NAT rule diverts traffic to an incorrect interface"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080c15911.shtml#anc11"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080c15911.shtml#anc11&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if you don't mind, please provide comments on how useful you've found the article and what you think I can do to improve it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 21:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329305#M344462</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2013-08-21T21:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329306#M344463</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay, thank you for replying to the discussion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do understand the point about a NAT configuration causing a inbound connection coming from one ASA interface to head out another interface on the basis of the interface configured in the NAT configuration (the UN-NAT phase)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN,WAN) source static LAN LAN destination static REMOTE REMOTE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We&amp;nbsp; could determine that incoming connection from the LAN to REMOTE would&amp;nbsp; have its egress interface decided by the NAT configuration. And to my&amp;nbsp; understanding after that decision the ASA would also do a L3 routelookup&amp;nbsp; to where to forward the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If we added &lt;STRONG&gt;"route-lookup"&lt;/STRONG&gt; keyword to the above NAT configuration, it would be ignored. (Provided the network REMOTE has a route on the ASA towards some other interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would like to get a clarification on is the below flow chart (click to enlarge)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/4/5/0/152054-CSC-NAT-ROUTING.jpg" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the above we can see a mention of NAT before anything related to L3 Routelookup or Egress interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now a situation where I cant match the logic in the above flow chart to the actual NAT operation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say we have the following interface: LAN, ISP-1 and ISP-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have the following configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 1.1.1.2 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif ISP-2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 2.2.2.2 255.255.255.248&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface GigabitEthernet0/2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nameif LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; security-level 100&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip add 10.10.10.1 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-1 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route ISP-2 0.0.0.0 0.0.0.0 2.2.2.1 254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN,ISP-1) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (LAN,ISP-2) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets say that there is a connection coming from behind LAN interface with the source IP address 10.10.10.10 destined for 8.8.8.8 on destination port TCP/80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The flow chart would seem to indicate (with the above information/configuration in mind) that a NAT would be done before L3 Route Lookup?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which for me raises a questin on how exactly does the ASA choose the NAT/PAT configuration to be used (if there are multiple that apply to it like above) if there is no decision on the destination interface yet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the operation seems more like (according to "packet-tracer") that the ASA first does a route lookup for the destination IP address and when this is found it applies the first matching NAT/PAT rule for those interfaces in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you elaborate a bit on the above situation? I can't help but think that I have just understood something horribly wrong even though I know how the actual traffic is forwarded in a live network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jouni Forss (reordered posted content and edited some mistakes)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 22:15:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329306#M344463</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-21T22:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329307#M344464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ASA will always apply NAT based on the order of the NAT table (which is directly derived from the running configuration), which can be viewed with 'show nat detail'. It takes the packet and walks down the table in order of the entries programmed into the table, looking for the first rule that has a matching interface(s) and matching IP subnets/ports that apply to the packet in question; at that point the NAT translation is applied and further processing stops. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT phase that you show highlighted reflects the stage where the packet's IP headers in an existing connection are re-written by NAT; it is not the exact phase where the egress interface selection is overridden by the translation table. &lt;/P&gt;&lt;P&gt;That order of operations slide is really quite simplified, and intentionally missing some steps because I just don't have time to go over the nuances of NAT during the general troubleshooting presentation that the picture was pulled from.&amp;nbsp; On the next slide titled "Egress Interface", I do explain that NAT can override the global routing table for egress interface selection. This order of operations is somewhat "rough", and there are corner cases that can make the order of operations confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The confusion here probably stems from the doubt about which comes first when selecting egress interfaces, routing or NAT. Hopefully with my explanation below, you'll have the missing pieces needed to fully explain why you see the seemingly inconsistent behavior. Please let me know what is unclear or contradictory about my explanation and I'll try and clear it up. I would also appreciate your suggestions on how to simply and clearly show these steps on a slide, so that I can improve how we deliver this information to our customers. Anyway, on to the explanation...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The short answer:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The NAT divert check (which is what overrides the routing table) is checking to see if there is any NAT rule that &lt;STRONG&gt;specifies destination address translation&lt;/STRONG&gt; for an inbound packet arriving on an interface.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If there is no rule that explicitly specifies how to translate that packet's destination IP address, then the global routing table is consulted to determine the egress interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If there is a rule that explicitly specifies how to translate the packets destination IP address, then the NAT rule "pulls" the packet to the other interface in the translation and the global routing table is effectively bypassed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The longer answer:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;For the moment, ignore the diagram above. &lt;SPAN style="font-size: 10pt;"&gt;For the first packet in the flow arriving inbound on an ASA's interface (TCP SYN packet for example):&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 1: un-translate the packet for the Security check&lt;/STRONG&gt;: Check the packet's headers for matching NAT rules in the NAT table. If the rules apply to the packet, virtually un-NAT the packet so we can check it against the access policies of the ASA (ACL check).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Step 1.A: ACL Check:&lt;/STRONG&gt; Check the un-translated packet against the interface ACL, if permitted proceed to step 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 2: Check NAT-divert table for global routing table override&lt;/STRONG&gt;: In this step the ASA checks the packet and determines if either of the following statements are true:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Step 2 check A&lt;/STRONG&gt;: Did the packet arrive inbound on an interface that is specified as the global (aka mapped) interface in a NAT translation (this is most common when a packet arrives inbound on the outside interface and matches a mapped ip address or range, and is forwarded to an inside interface)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; -or- &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Step 2 check B:&lt;/STRONG&gt;&amp;nbsp; Did the packet arrive inbound on an interface that is specified as the local (real) interface in a NAT translation &lt;STRONG&gt;that also has destination IP translation explicitly specified&lt;/STRONG&gt; (this is seen in your first example, the case with your NAT exempt configuration for traffic from LAN to WAN bypassing translation)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If either of these checks returns true, then the packet is virtually forwarded to the other interface specified in the matching NAT translation line, bypassing the global routing table egress interface lookup; Then, a subsequent interface-specific route lookup is done to determine the next-hop address to forward the packet to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Put another way, &lt;STRONG&gt;Step 2 check B&lt;/STRONG&gt; checks to see if the packet matches an entry in the &lt;/SPAN&gt;&lt;STRONG style="font-size: 10pt;"&gt;NAT divert-table&lt;/STRONG&gt;&lt;SPAN style="font-size: 10pt;"&gt;. If it does, then the global routing table is bypassed, and the packet is virtually forwarded to the other (local) interface specified in the nat translation. You can actually see the nat divert-table contents with the command 'show nat divert-table', but don't bother too much with it as it isn't very consumable and might be mis-leading.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets refer to the specific example you outlined in your post; you said:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;route ISP-1 0.0.0.0 0.0.0.0 1.1.1.1 1&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;route ISP-2 0.0.0.0 0.0.0.0 2.2.2.1 254&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (LAN,ISP-1) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (LAN,ISP-2) after-auto source dynamic any interface&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;EM&gt;&lt;STRONG&gt;Now lets say that there is a connection coming from behind LAN interface with the source IP address 10.10.10.10 destined for 8.8.8.8 on destination port TCP/80. &lt;/STRONG&gt;&lt;STRONG style="font-size: 10pt; font-family: arial, helvetica, sans-serif;"&gt;The flow chart would seem to indicate (with the above information/configuration in mind) that a NAT would be done before L3 Route Lookup?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet you describe will not match any nat-divert entries, and the egress interface selection will be performed based on the L3 routing table, which you have tested and confirmed. This is because the packet does not match Step 2 checks A or B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesn't match &lt;STRONG&gt;Step 2 Check A&lt;/STRONG&gt; because the packet did not arrive inbound on the mapped (aka global) interfaces ISP-1 or ISP-2 from the NAT config lines. It arrived inbound on the local (aka real) interface LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It doesn't match &lt;STRONG&gt;Step 2 Check B&lt;/STRONG&gt; because these NAT rules don't have destination IP address translation explicitly configured (unlike your LAN to WAN example)...therefore the ASA won't match a divert-table entry for the packet (actually you'll see a rule in the divert table, but it will have ignore=yes, so it is skipped).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jay Johnston&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 04:12:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329307#M344464</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2013-08-22T04:12:30Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329308#M344465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jay,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank your for the great explanation. I mainly wanted some peace of mind that I had not completely understood something wrong about this matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My main problem sometimes when going through either Configuration Guides or Command References is that while they provide valuable information it seems that its hard to find very specific documents explaining some area of the ASA operation thoroughly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though you mention that some of the NAT related things probably arent essential in everyday troubleshooting use, I wouldnt mind learning as much about the NAT operation as I can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is certainly something I will be planning to add to my NAT document when I have the time(which still requires a lot of additions/corrections/clarifications)&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As a final question, are there any publicly available documents/books that go through this process in depth? Or is there perhaps some certification related (CCNP or CCIE Security) books/material that go in depth to this subject? Or are all document of this sort internal Cisco documents/material?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for answering the questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Endorsing the reply as I think it would be very helpfull for many people possibly running to issues with NAT/Routing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 07:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329308#M344465</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-08-22T07:33:22Z</dc:date>
    </item>
    <item>
      <title>cisco asa traffic flow with destination nat</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329309#M344466</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some of these specifics are outlined in the configuration guide (see &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_overview.html#wp1245357"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_overview.html#wp1245357&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but most people learn best by viewing specific examples and use cases.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Aug 2013 20:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-traffic-flow-with-destination-nat/m-p/2329309#M344466</guid>
      <dc:creator>Jay Johnston</dc:creator>
      <dc:date>2013-08-22T20:52:52Z</dc:date>
    </item>
  </channel>
</rss>

