<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source NAT on ASA 9.1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232748#M346309</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood you correctly you want to do the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure 2 Static PAT configurations for SMTP and HTTPS&lt;/LI&gt;&lt;LI&gt;Configure a Dynamic PAT for outbound traffic for the 2 Static PAT hosts&lt;/LI&gt;&lt;LI&gt;Configure a default Dynamic PAT rule for all other outbound traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the following should accomplish this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;STATIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-HTTPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 172.16.1.1 service tcp https https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-SMTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 172.16.1.1 service tcp smtp smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;SERVER DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SERVERS-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 172.16.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto 1 source dynamic SERVERS-PAT-SOURCE SERVER-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;DEFAULT DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DEFAULT-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 172.16.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE DEFAULT-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the above presumes you have no other conflicting NAT configurations that might interfere with the operation of these configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the Dynamic PAT configuration for the 2 server IP addresses has an added order/line number &lt;STRONG&gt;"1"&lt;/STRONG&gt;. This makes sure that the rule is hit first in the Section 3 of NAT rules. Naturally there is still possibility that the NAT could be overriden depending on your existing configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that we dont add any such order/line number in the other Dynamic PAT configurations that is meant for all the other outbound traffic. This means that the NAT rule is added at the bottom of the existing NAT rules in Section 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Jul 2013 07:08:32 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-07-17T07:08:32Z</dc:date>
    <item>
      <title>Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232747#M346308</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to configure NAT on an ASA in the folowing way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN 192.168.1.1:443 &amp;lt;- 172.16.1.1:443 OUT - static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN 192.168.1.13:25 &amp;lt;- 172.16.1.1:25 OUT - static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN 192.168.1.1, 1.13 -&amp;gt; 172.16.1.1 OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IN 192.168.1.0/24 -&amp;gt; 172.16.1.2 OUT - dynamic PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can I map only the 192.168.1.1 and 1.13 to the external ip 172.16.1.1 when they send traffic out?&lt;/P&gt;&lt;P&gt;everything else should go out with 172.16.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:13:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232747#M346308</guid>
      <dc:creator>Cristian Iconaru</dc:creator>
      <dc:date>2019-03-12T02:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232748#M346309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understood you correctly you want to do the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure 2 Static PAT configurations for SMTP and HTTPS&lt;/LI&gt;&lt;LI&gt;Configure a Dynamic PAT for outbound traffic for the 2 Static PAT hosts&lt;/LI&gt;&lt;LI&gt;Configure a default Dynamic PAT rule for all other outbound traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the following should accomplish this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;STATIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-HTTPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 172.16.1.1 service tcp https https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network STATIC-PAT-SMTP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 172.16.1.1 service tcp smtp smtp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;SERVER DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SERVERS-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 172.16.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto 1 source dynamic SERVERS-PAT-SOURCE SERVER-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;DEFAULT DYNAMIC PAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network DEFAULT-PAT-SOURCE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network DEFAULT-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 172.16.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE DEFAULT-PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally the above presumes you have no other conflicting NAT configurations that might interfere with the operation of these configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that the Dynamic PAT configuration for the 2 server IP addresses has an added order/line number &lt;STRONG&gt;"1"&lt;/STRONG&gt;. This makes sure that the rule is hit first in the Section 3 of NAT rules. Naturally there is still possibility that the NAT could be overriden depending on your existing configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice also that we dont add any such order/line number in the other Dynamic PAT configurations that is meant for all the other outbound traffic. This means that the NAT rule is added at the bottom of the existing NAT rules in Section 3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 07:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232748#M346309</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T07:08:32Z</dc:date>
    </item>
    <item>
      <title>Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232749#M346310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;thanks for the reply.&lt;/P&gt;&lt;P&gt;it works great.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 07:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232749#M346310</guid>
      <dc:creator>Cristian Iconaru</dc:creator>
      <dc:date>2013-07-17T07:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232750#M346313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;short question.&lt;/P&gt;&lt;P&gt;how can I integrate the NAT exemption rules for VPN traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if I run a packet tracer, with the regular NAT exemption and the section 3 rules, the packet will be dropped.&lt;/P&gt;&lt;P&gt;eg: nat (inside,outside) source static LAN LAN destination static VPN VPN -&amp;gt; this will end up in Section 1/Manual NAT and will not be matched.&lt;/P&gt;&lt;P&gt;LAN: 192.168.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 08:30:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232750#M346313</guid>
      <dc:creator>Cristian Iconaru</dc:creator>
      <dc:date>2013-07-17T08:30:30Z</dc:date>
    </item>
    <item>
      <title>Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232751#M346316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not quite sure I follow you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you saying that you have some NAT Exempt rule for VPN traffic and its not getting matched at all?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the "packet-tracer" command you used and the NAT Exempt configuration with the object configurations included.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 08:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232751#M346316</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-17T08:33:35Z</dc:date>
    </item>
    <item>
      <title>Source NAT on ASA 9.1</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232752#M346320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my bad &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;previously I modified the object to another range.&lt;/P&gt;&lt;P&gt;it works as expected.&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 08:45:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-on-asa-9-1/m-p/2232752#M346320</guid>
      <dc:creator>Cristian Iconaru</dc:creator>
      <dc:date>2013-07-17T08:45:55Z</dc:date>
    </item>
  </channel>
</rss>

