<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 8.3+ NAT Configuration questions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154872#M359208</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also to clarify your other issues above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the above quoted text just states&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Users will get their NAT IP address from the first Pool until its exhausted&lt;/LI&gt;&lt;LI&gt;Users will get their NAT IP address from the second Pool if first Pool is exhausted&lt;/LI&gt;&lt;LI&gt;When both of the Pools are exhausted the single PAT IP address is shared by all of the hosts&lt;/LI&gt;&lt;LI&gt;If the PAT IP addresses ports run out then the interface IP address is used as a PAT IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it first uses the NAT Pools 1 IP per users then falls back to the PAT IP until its exhausted and finally falls back to the "interface" IP address as the last PAT IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 Mar 2013 23:37:59 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-03-30T23:37:59Z</dc:date>
    <item>
      <title>8.3+ NAT Configuration questions</title>
      <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154870#M359206</link>
      <description>&lt;P&gt;object network OUTSIDE_NAT_POOL&lt;BR /&gt;&amp;nbsp; range 209.165.200.235 209.165.200.254&lt;/P&gt;&lt;P&gt;object network OUTSIDE_NAT_POOL2&lt;BR /&gt;&amp;nbsp; range 209.165.201.10 209.165.201.29&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network OUTSIDE_PAT&lt;BR /&gt;&amp;nbsp; host 209.165.201.30&lt;/P&gt;&lt;P&gt;object-group network OUTSIDE_NAT_GROUP&lt;BR /&gt;&amp;nbsp; network object object OUTSIDE_NAT_POOL&lt;BR /&gt;&amp;nbsp; network object object OUTSIDE_NAT_POOL2&lt;BR /&gt;&amp;nbsp; network object object OUTSIDE_PAT&lt;/P&gt;&lt;P&gt;object network INSIDE_SEGMENT&lt;BR /&gt;&amp;nbsp; nat (any,outside) dynamic OUTSIDE_NAT_GROUP interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been practicing NAT configurations with 8.3+ and I had a question about the above configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I thought , the above configuration should use Port Address Translation on the first pool, and then PAT on all of the IPs in the second pool, and then on the OUTSIDE_PAT address, and then the interface. This is an example from the official text book, by the way.&amp;nbsp; However, by the sounds of it, when you use &lt;EM&gt;range &lt;/EM&gt;and establish a range of IP's, you can't PAT the range, and it always issues them statically until the range is used up?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The book explains the above configuration like this (word for word):&lt;/P&gt;&lt;P&gt;===============================================================&lt;/P&gt;&lt;P&gt;1. Hosts in the INSIDE-SEGMENT object will first use the NAT pool addresses of 209.165.200.235-254. These will be assigned in a seemingly random manner, based on an internal ASA algorithm, until all are in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. You want hosts in the INSIDE-SEGMENT object to use addresses in a new range, 209.165.201.10-29, assigned in the same manner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. If both these pools are fully utilized, you want further connections from INSIDE-SEGMENT hosts to use PAT, utilizing the address 209.165.201.30.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. In the unlikely scenario that the previous PAT address has all ports utilized, you want remaining connections from INSIDE-SEGMENT hosts to use PAT, utilizing the ASA's interface address.&lt;/P&gt;&lt;P&gt;===============================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So , why is it PATing the PAT address, but not the range addresses with the "dynamic" established in the nat command? How would you configure it if you wanted to use PAT on a range of addresses or is that possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for any clarity on this!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:21:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154870#M359206</guid>
      <dc:creator>Mike Bowers</dc:creator>
      <dc:date>2019-03-12T01:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3+ NAT Configuration questions</title>
      <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154871#M359207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think to be able to use a "range" of addresses as single PAT IP addresses&amp;nbsp; each for translation you need to use the parameter "pat-pool"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network &lt;NAME&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt; subnet &lt;NETWORK&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/P&gt;&lt;P&gt; nat (source,destination) dynamic pat-pool &lt;PAT pool="" object=""&gt;&lt;/PAT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is something I have had no need to use in the environments I manage so its not that common to me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For other 8.3+ NAT configurations and operation, check the documentation I made on the Document section &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154871#M359207</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T23:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3+ NAT Configuration questions</title>
      <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154872#M359208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also to clarify your other issues above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me the above quoted text just states&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Users will get their NAT IP address from the first Pool until its exhausted&lt;/LI&gt;&lt;LI&gt;Users will get their NAT IP address from the second Pool if first Pool is exhausted&lt;/LI&gt;&lt;LI&gt;When both of the Pools are exhausted the single PAT IP address is shared by all of the hosts&lt;/LI&gt;&lt;LI&gt;If the PAT IP addresses ports run out then the interface IP address is used as a PAT IP address&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it first uses the NAT Pools 1 IP per users then falls back to the PAT IP until its exhausted and finally falls back to the "interface" IP address as the last PAT IP address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154872#M359208</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T23:37:59Z</dc:date>
    </item>
    <item>
      <title>8.3+ NAT Configuration questions</title>
      <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154873#M359209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks alot for that. I've read through this FIREWALL official guide already and no where is there a pat-pool parameter mentioned. I just consoled in and seen it there with the question mark. Thanks a lot for the info and that 8.3+ NAT document looks really helpful!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:40:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154873#M359209</guid>
      <dc:creator>Mike Bowers</dc:creator>
      <dc:date>2013-03-30T23:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3+ NAT Configuration questions</title>
      <link>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154874#M359210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And finally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "pat-pool" configuration parameter was made available in 8.4(1.11) or more commonly 8.4(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;8.4(2) Release Notes&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html#wp535067"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/asarn84.html#wp535067&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp622838table622833" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; PAT pool and round robin address assignment &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp622881"&gt;&lt;/A&gt;&lt;P&gt; You can now specify a pool of PAT addresses instead of a single address.&amp;nbsp; You can also optionally enable round-robin assignment of PAT addresses&amp;nbsp; instead of first using all ports on a PAT address before using the next&amp;nbsp; address in the pool. These features help prevent a large number of&amp;nbsp; connections from a single PAT address from appearing to be part of a DoS&amp;nbsp; attack and makes configuration of large numbers of PAT addresses easy. &lt;/P&gt;&lt;A name="wp622882"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;Currently&amp;nbsp; in 8.4(2), the PAT pool feature is not available as a fallback method&amp;nbsp; for dynamic NAT or PAT. You can only configure the PAT pool as the&amp;nbsp; primary method for dynamic PAT (CSCtq20634). &lt;/P&gt;&lt;A name="wp622883"&gt;&lt;/A&gt;&lt;P&gt; We modifed the following commands: &lt;STRONG&gt;nat dynamic&lt;/STRONG&gt; [&lt;STRONG style="font-weight: bold;"&gt;pat-pool &lt;/STRONG&gt;mapped_object [&lt;STRONG&gt;round-robin&lt;/STRONG&gt;]] (object network) and &lt;STRONG&gt;nat source dynamic&lt;/STRONG&gt; [&lt;STRONG style="font-weight: bold;"&gt;pat-pool &lt;/STRONG&gt;mapped_object [&lt;STRONG&gt;round-robin&lt;/STRONG&gt;]] (global). &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Mar 2013 23:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-nat-configuration-questions/m-p/2154874#M359210</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-03-30T23:42:30Z</dc:date>
    </item>
  </channel>
</rss>

