<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nat doubts in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272364#M346539</link>
    <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I come across this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd5d03.shtml?referring_site=smartnavRD" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd5d03.shtml?referring_site=smartnavRD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the scenario 1, it mentions the nat configuration is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source dynamic IPS-management IPS-management interface
 
nat (inside,outside) static IPS-management ASA-outside service tcp 443 65432&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder why it should be configured like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first configuration seems very confusing, it's a source dynamic nat, but the real and map source ip are the same, then it also has a PAT interface fallback, why it's needed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second configuration make sense, it just nat the IPS interface to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your advice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Xie Yao&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:11:15 GMT</pubDate>
    <dc:creator>XIE YAO</dc:creator>
    <dc:date>2019-03-12T02:11:15Z</dc:date>
    <item>
      <title>Nat doubts</title>
      <link>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272364#M346539</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I come across this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd5d03.shtml?referring_site=smartnavRD" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2113/products_tech_note09186a0080bd5d03.shtml?referring_site=smartnavRD&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the scenario 1, it mentions the nat configuration is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;nat (inside,outside) source dynamic IPS-management IPS-management interface
 
nat (inside,outside) static IPS-management ASA-outside service tcp 443 65432&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder why it should be configured like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first configuration seems very confusing, it's a source dynamic nat, but the real and map source ip are the same, then it also has a PAT interface fallback, why it's needed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second configuration make sense, it just nat the IPS interface to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your advice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Xie Yao&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272364#M346539</guid>
      <dc:creator>XIE YAO</dc:creator>
      <dc:date>2019-03-12T02:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: Nat doubts</title>
      <link>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272365#M346542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Havent had to setup an ASA5500-X series IPS myself. So there are some new things there for me too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It seems to me that the Scenario 1 has a setup where both the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;management&lt;/STRONG&gt; interfaces have been connected to the same L2 switch. Management is used for IPS and "inside" as a normal Data interface. Both are in the same subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont quite grasp the idea of the NAT configurations either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets see the first one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic IPS-management IPS-management interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding in this command the keyword &lt;STRONG&gt;"interface"&lt;/STRONG&gt; is useless. We have one real source address and one mapped source address. To my understanding the translation will always use the mapped address object for translation as we have only specified single source address for the translation. So I dont really know what the &lt;STRONG&gt;"interface"&lt;/STRONG&gt; is used there for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine though that this command should enable Internet access for the actual IPS module that is connected to the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;network also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would probably try to configure it as&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source dynamic IPS-management interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the second command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) static IPS-management ASA-outside service tcp 443 65432&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I can understand the purposes of this command it seems to me to have 2 major flaws. First, its missing the &lt;STRONG&gt;"source"&lt;/STRONG&gt; parameter from the command start. Second, you can use the &lt;STRONG&gt;"outside"&lt;/STRONG&gt; interface IP address inside an &lt;STRONG&gt;"object network"&lt;/STRONG&gt; and then use that &lt;STRONG&gt;"object"&lt;/STRONG&gt; in the NAT configuration. The ASA wont accept that NAT policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command is supposed to enable managing the IPS from &lt;STRONG&gt;"outside"&lt;/STRONG&gt; using the IP address of the&lt;STRONG&gt; "outside" &lt;/STRONG&gt;interface. The public facing port is TCP/65432 and the actual real port is TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems that this configuration should be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static IPS-management interface service tcp 443 65432&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also wonder what the purpose of the ACL configurations in the Scenario 1 are.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other ACL suggest that its a global ACL and allows management connections. The other ACL also suggest that its global ACL but allows EVERYTHING. Yet we are not given any &lt;STRONG&gt;"access-group" &lt;/STRONG&gt;command to determine which is used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless I am missing something essential, the document seems to be handing quite wrong or faulty information&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Jul 2013 08:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272365#M346542</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-12T08:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Nat doubts</title>
      <link>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272366#M346547</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks a lot Jouni for your time, I agree with you that this Cisco should review this document, there are too many points missing and confusing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've already clicked "No" in the feedback of this article, hope someone will look into it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Xie Yao&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 02:57:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-doubts/m-p/2272366#M346547</guid>
      <dc:creator>XIE YAO</dc:creator>
      <dc:date>2013-07-13T02:57:57Z</dc:date>
    </item>
  </channel>
</rss>

