<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT setup in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247729#M347806</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its just that you dont mention the VPN networks and there is no visible VPN configuration so we cant confirm that the NAT configuration is correct &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I have to say that your NAT0 ACL looks a bit off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip any 192.168.16.128 255.255.255.128 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip 192.168.16.0 255.255.255.0 192.168.16.128 255.255.255.128 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First off I would suggest not using &lt;STRONG&gt;"any"&lt;/STRONG&gt; in the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the second thing is the fact that your source network is 192.168.16.0/24 and your destination network 192.168.16.0/25. These obviously overlap and any traffic destined from network 192.168.16.0/24 will NEVER reach 192.168.16.0/25 since the source network will thiks its connecting to a host directly on its own network. In other words traffic will never reach the ASA from the source LAN but the source host will rather ARP and try to determine the MAC address of the destination host and connection will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the remote network is truly 192.168.16.0/25 then both sites have to do NAT to mask your actual LAN networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Jun 2013 06:24:54 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-19T06:24:54Z</dc:date>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247726#M347803</link>
      <description>&lt;P&gt;I have setup the NAT to run site-to-site IPsec tunnel, but it seem my NAT is not working properly. Would you give me some help on troubleshoot this please. I could not find any hits on my NAT. Thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.2(1) &lt;BR /&gt;!&lt;BR /&gt;hostname xxxxxxxxxxx&lt;BR /&gt;domain-name xxxxxxxxxxxx&lt;BR /&gt;enable password xaFrdhoWkLR6XPWW encrypted&lt;BR /&gt;passwd w15Y7V2V.K5Fe5eB encrypted&lt;BR /&gt;names&lt;BR /&gt;dns-guard&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 172.16.0.1 255.255.0.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.16.10 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;shutdown&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone PST -8&lt;BR /&gt;clock summer-time PDT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name tensorcom.tw&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any 192.168.16.128 255.255.255.128 &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.16.0 255.255.255.0 192.168.16.128 &lt;/P&gt;&lt;P&gt;255.255.255.128 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-621.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat (outside) 0 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 172.16.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.16.0 255.255.255.0 inside&lt;BR /&gt;http 0.0.0.0 0.0.0.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 5&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd lease 3000&lt;BR /&gt;dhcpd ping_timeout 20&lt;BR /&gt;dhcpd domain tensorcom.tw&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.16.50-192.168.16.100 inside&lt;BR /&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;dhcpd address 192.168.1.2-192.168.1.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;username admin password lGrKKX6TeYxVhF3a encrypted&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:c772cce72d0ad56e21ae5963cb8218eb&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:00:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247726#M347803</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2019-03-12T02:00:08Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247727#M347804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant see any VPN connection configurations in the above configuration you posted?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247727#M347804</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T06:10:09Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247728#M347805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for response. I am doing the NAT first before I can setup the VPN. I think I am doing something wrong with NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:13:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247728#M347805</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-19T06:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247729#M347806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its just that you dont mention the VPN networks and there is no visible VPN configuration so we cant confirm that the NAT configuration is correct &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I have to say that your NAT0 ACL looks a bit off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip any 192.168.16.128 255.255.255.128 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside_nat0_outbound extended permit ip 192.168.16.0 255.255.255.0 192.168.16.128 255.255.255.128 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First off I would suggest not using &lt;STRONG&gt;"any"&lt;/STRONG&gt; in the ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the second thing is the fact that your source network is 192.168.16.0/24 and your destination network 192.168.16.0/25. These obviously overlap and any traffic destined from network 192.168.16.0/24 will NEVER reach 192.168.16.0/25 since the source network will thiks its connecting to a host directly on its own network. In other words traffic will never reach the ASA from the source LAN but the source host will rather ARP and try to determine the MAC address of the destination host and connection will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the remote network is truly 192.168.16.0/25 then both sites have to do NAT to mask your actual LAN networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:24:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247729#M347806</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T06:24:54Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247730#M347807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just learned more about this NAT setup. Should my NAT should be this simple: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside-net&lt;/P&gt;&lt;P&gt;subnet 192.168.16.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside, outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will remove all the access list. &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list inside_nat0_outbound extended permit ip any 192.168.16.128 255.255.255.128&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;access-list inside_nat0_outbound extended permit ip 192.168.16.0 255.255.255.0 192.168.16.128 255.255.255.128&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247730#M347807</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-19T06:32:40Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247731#M347808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you mean that you want to configure basic Dynamic PAT for your LAN users then you need these&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.16.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above should handle the basic Dynamic PAT for Internet traffic..&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can remove this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (outside) 0 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247731#M347808</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T06:39:17Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247732#M347809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is something wrong with your default route configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 172.16.0.1 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The route is pointing to the ASA itself. It should be pointing towards the upstream routers gateway interface IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 06:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247732#M347809</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T06:40:32Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247733#M347810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jouni&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have made the change and add VPN. can I send my config to you to take a look please?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 16:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247733#M347810</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-19T16:31:38Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247734#M347811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess I can take a look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But have you tested your configurations?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How are you setting up the VPN when you seem to have a private IP address on the "outside" of the ASA? Are you doing NAT on a device infront of the ASA to give the ASA an public IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 16:34:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247734#M347811</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T16:34:57Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247735#M347812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configurations seem fine to me on first glance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration and the ACL used for the L2L VPN seem to match so it looks fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the L2L VPN configurations are done on the other end too then you can actually test on the ASA itself if the L2L VPN connection comes up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.16.100 12345 192.168.25.100 3389&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dont care about the IP addresses and ports used in the command. They dont really matter. The important thing is just that we generate a packet that matches the L2L VPN configurations and we can see what the result is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Issue the above command TWICE on the ASA CLI. Then copy/paste the SECOND output here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 16:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247735#M347812</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T16:39:37Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247736#M347813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I am still testing locally until I setup in production. Therefore It is still private IP. &lt;/P&gt;&lt;P&gt;I ran the packet-tracer &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: FLOW-LOOKUP&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: inside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Drop-reason: (no-route) No route to host&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 17:16:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247736#M347813</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-19T17:16:41Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247737#M347814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems you are still missing the route from your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need a default route configured on the ASA that points to a gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have not connected this device to Internet at all then we cant really confirm if the L2L VPN configuration works as the ASA cant negotiate the VPN connection up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 17:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247737#M347814</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-19T17:20:42Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247738#M347815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I agreed. I think I need the route. Let me double check. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jun 2013 17:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247738#M347815</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-19T17:26:41Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247739#M347816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I just add my route inside to gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 255.255.255.0 67.111.118.156 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 19:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247739#M347816</guid>
      <dc:creator>Chieu Dinh</dc:creator>
      <dc:date>2013-06-20T19:11:16Z</dc:date>
    </item>
    <item>
      <title>NAT setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247740#M347817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what route that is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are going to configure default route then it needs to be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 &lt;ISP gateway="" ip=""&gt;&lt;/ISP&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Jun 2013 19:20:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-setup/m-p/2247740#M347817</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-20T19:20:34Z</dc:date>
    </item>
  </channel>
</rss>

