<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT question (ASA 8.2) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214505#M348605</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the "packet-tracer" output seems to state that the Dynamic Policy NAT is not applied at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: host-limits&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (if001) 4 access-list if001_nat_outbound&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip if001 10.0.0.0 255.0.0.0 Outside a.b.c.128 255.255.255.192&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 4 (a.b.c.88)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 477883, untranslate_hits = 22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding, if the above Dynamic Policy PAT was applied you would see the actual translation information on the &lt;STRONG&gt;"Additional Information"&lt;/STRONG&gt; section of the output. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example of one of our 8.2 ASA firewalls when the "packet-tracer" test matches a Dynamic Policy NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (int) 21 access-list &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip int&lt;/STRONG&gt;&lt;STRONG&gt; any outside host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 21 (y.y.y.y)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Dynamic translate a.a.a.a/12345 to y.y.y.y/13091 using netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the logic with the output of "packet-tracer" is sometimes BUT it seems to list the NAT configurations that match the source address even if they are NOT applied in this very case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though in this case you say that you are still seing the traffic coming with the Dynamic Policy PAT. I am not 100% sure how the ASA reacts when you configure different type of NAT configurations in different order. It was not that uncommon a few years back when I didnt remember to clear the xlate for some device and wondered why some NAT didnt work how it was supposed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, Just to make sure, are your NAT0 and Dynamic Policy PAT&amp;nbsp; ACLs identical? And if they are is there really use for the other one of them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Jun 2013 06:42:23 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-06-06T06:42:23Z</dc:date>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214502#M348601</link>
      <description>&lt;P&gt;Hi everyone&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hoping someone can clear this up for me, as it's working but I have no idea why.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have a nat exemption rule for 10.0.0.0/8 to w.x.y.z&lt;/P&gt;&lt;P&gt;followed by some static nat rules&lt;/P&gt;&lt;P&gt;and then&lt;/P&gt;&lt;P&gt;dynamic policy nat rule for 10.0.0.0/8 to w.x.y.z natting to IP a.b.c.d&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I do a packet trace from 10.10.10.10 to w.x.y.z, it shows the packet first matching against the nat exemption rule, and then immediately afterwards it matches the dynamic policy NAT rule. The static nat rules are being successfully bypassed (which is what I want), but why does the dynamic policy nat rule apply if an exempt rule has been hit already? Is this by design?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An actual test between the IPs above reflects the result of the packet tracer as well (IP a.b.c.d is seen on server w.x.y.z).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running the following software on an ASA5520:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.2(5)&lt;/P&gt;&lt;P&gt;Device Manager Version 6.4(7)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:53:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214502#M348601</guid>
      <dc:creator>osiristrading</dc:creator>
      <dc:date>2019-03-12T01:53:31Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214503#M348603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be interested to seeing the &lt;STRONG&gt;"packet-tracer"&lt;/STRONG&gt; output and the actual command used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT0 configurations should always come before any other NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you also share the 2 NAT configurations you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Jun 2013 20:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214503#M348603</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-05T20:34:23Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214504#M348604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;[sensitive information redacted in the below output]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (if001) 0 access-list if001_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (if001) 4 access-list if001_nat_outbound&lt;/P&gt;&lt;P&gt;nat (if001) 3 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;global (Outside) 3 e.f.g.h netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (Outside) 4 a.b.c.d netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;---------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;asa001# packet-tracer input if001 tcp 10.10.10.10 1099 w.x.y.z http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group if001_access_in in interface if001&lt;/P&gt;&lt;P&gt;access-list if001_access_in extended permit object-group DM_INLINE_SERVICE_1 10.0.0.0 255.0.0.0 any&lt;/P&gt;&lt;P&gt;object-group service DM_INLINE_SERVICE_1&lt;/P&gt;&lt;P&gt; service-object icmp&lt;/P&gt;&lt;P&gt; service-object tcp eq www&lt;/P&gt;&lt;P&gt; service-object tcp eq https&lt;/P&gt;&lt;P&gt; service-object tcp eq ftp&lt;/P&gt;&lt;P&gt; service-object tcp eq ftp-data&lt;/P&gt;&lt;P&gt; service-object udp eq ntp&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: CONN-SETTINGS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map global-class&lt;/P&gt;&lt;P&gt; match any&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; description Limit_Conn&lt;/P&gt;&lt;P&gt; class global-class&lt;/P&gt;&lt;P&gt;&amp;nbsp; set connection advanced-options TCPOPT&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: FOVER&lt;/P&gt;&lt;P&gt;Subtype: standby-update&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip if001 10.0.0.0 255.0.0.0 Outside host w.x.y.z&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 320, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (if001) 4 access-list if001_nat_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip if001 10.0.0.0 255.0.0.0 Outside a.b.c.128 255.255.255.192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 4 (a.b.c.88)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 477883, untranslate_hits = 22&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (if001) 4 access-list if001_nat_outbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip if001 10.0.0.0 255.0.0.0 Outside a.b.c.128 255.255.255.192&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 4 (a.b.c.88)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 477883, untranslate_hits = 22&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: IDS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;/P&gt;&lt;P&gt;Type: CONN-SETTINGS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 12&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 13&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 2056717033, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: if001&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: Outside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 04:45:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214504#M348604</guid>
      <dc:creator>osiristrading</dc:creator>
      <dc:date>2013-06-06T04:45:36Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214505#M348605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the "packet-tracer" output seems to state that the Dynamic Policy NAT is not applied at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: host-limits&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (if001) 4 access-list if001_nat_outbound&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip if001 10.0.0.0 255.0.0.0 Outside a.b.c.128 255.255.255.192&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 4 (a.b.c.88)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 477883, untranslate_hits = 22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding, if the above Dynamic Policy PAT was applied you would see the actual translation information on the &lt;STRONG&gt;"Additional Information"&lt;/STRONG&gt; section of the output. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is an example of one of our 8.2 ASA firewalls when the "packet-tracer" test matches a Dynamic Policy NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (int) 21 access-list &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; match ip int&lt;/STRONG&gt;&lt;STRONG&gt; any outside host x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 21 (y.y.y.y)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Dynamic translate a.a.a.a/12345 to y.y.y.y/13091 using netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what the logic with the output of "packet-tracer" is sometimes BUT it seems to list the NAT configurations that match the source address even if they are NOT applied in this very case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though in this case you say that you are still seing the traffic coming with the Dynamic Policy PAT. I am not 100% sure how the ASA reacts when you configure different type of NAT configurations in different order. It was not that uncommon a few years back when I didnt remember to clear the xlate for some device and wondered why some NAT didnt work how it was supposed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, Just to make sure, are your NAT0 and Dynamic Policy PAT&amp;nbsp; ACLs identical? And if they are is there really use for the other one of them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 06:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214505#M348605</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-06T06:42:23Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214506#M348606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, it isn't actually getting natted. I did a packet capture on an intermediate device after the firewall, and saw the non-natted address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only working due to some funky routing we have between the load balancers and web farm, and the packet tracer output was throwing me off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now this brings me to another question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have a static NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.1.1.1&amp;nbsp;&amp;nbsp; ----&amp;nbsp;&amp;nbsp; 2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I want 1.1.1.1 to NAT to a specific IP (3.3.3.3) when connecting to 3.3.0.0 (instead of using 2.2.2.2) - how do I get the dynamic policy NAT rule to nat to 3.3.3.3? It seems as if static always take preference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 07:03:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214506#M348606</guid>
      <dc:creator>osiristrading</dc:creator>
      <dc:date>2013-06-06T07:03:35Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214507#M348607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The decision which translation is used when we have both Static NAT and Static Policy NAT between the same interfaces comes down to the order of the &lt;STRONG&gt;"static"&lt;/STRONG&gt; commands. And the old software doesnt really give you much chances to change this without causing atleast a minor distruption to the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you would need to do is the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure the Static Policy NAT like usual&lt;/LI&gt;&lt;LI&gt;Remove the Static NAT&lt;/LI&gt;&lt;LI&gt;Add the Static NAT again&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The purpose of the above is to simply reorder the NAT configuration which you see in CLI format. We first configure the Static Policy NAT which will add it to the very bottom of &lt;STRONG&gt;"static"&lt;/STRONG&gt; configurations. When we consider that you probably already had the normal Static NAT configured before this then that means its overriding the Static Policy NAT always since its first in the CLI configuration. We then remove the Static NAT and reinsert the Static NAT which again moves it to the very bottom of the&lt;STRONG&gt; "static"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After this the Static Policy NAT should be matches first and then rest of the traffic that is NOT defined in the Static Policy NAT ACL fall to the Static NAT at the bottom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 07:12:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214507#M348607</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-06T07:12:22Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214508#M348608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, that is very helpful. I see later versions (8.3+) allow reordering of these rules. We will be upgrading sometime in the not-too-distant future and then we will have this functionality. Right now, the config is working so I won't risk deleting/readding the rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 07:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214508#M348608</guid>
      <dc:creator>osiristrading</dc:creator>
      <dc:date>2013-06-06T07:30:58Z</dc:date>
    </item>
    <item>
      <title>NAT question (ASA 8.2)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214509#M348609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the new software gives changes to insert the NAT to a certain spot in the configuration without removing anything. But there are 2 different types of NAT configurations. Manual NAT / Twice NAT is something that you can order manually. Network Object NAT however doesnt give this option but rather changes the order depending on the inserted configuration. Though it still gives you a change to affect the order a bit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are interested in having looking some basic information about the new 8.3+ NAT format, then have a look at a document I made on the CSC about it&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 07:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-asa-8-2/m-p/2214509#M348609</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-06-06T07:40:57Z</dc:date>
    </item>
  </channel>
</rss>

