<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM ACL/NAT Issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187528#M361454</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read your PM and am still a bit confused as to the routing in this case. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On the core device which hosts the FWSM are we talking just about Global Routing Table or are there any VRFs involved?&lt;/LI&gt;&lt;LI&gt;Looking at the FWSM configuration, what is the interface behind which the remote network 192.168.1.0/24 is located?&lt;UL&gt;&lt;LI&gt;I see that in your PM you have added and removed some configurations so I just want to confirm&lt;/LI&gt;&lt;LI&gt;For example there was a "route inside 192.168.1.0 255.255.255.0 192.168.0.x" where the gateway IP address is not located on the "inside" interface at all but another interface on the FWSM.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have understood the situation correctly it almost seems like the situation is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FWSM interface "inside" is facing the remote network 192.168.1.0/24 &lt;UL&gt;&lt;LI&gt;This is also why it would answer to ICMP as its actually facing the remote network&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;ICMP Echo messages from the remote network 192.168.1.0/24 go as follows &lt;UL&gt;&lt;LI&gt;ICMP reaches the local Core and heads straight to host 10.15.25.x&lt;/LI&gt;&lt;LI&gt;ICMP reaches the 10.15.25.x host&lt;/LI&gt;&lt;LI&gt;Host 10.15.25.x sends the traffic to its default gateway = FWSM interface IP? (not the core so asymmetric routing)&lt;/LI&gt;&lt;LI&gt;FWSM blocks the traffic as its not allowed at the moment to pass traffic back through the same "inside" interface where the traffic came from&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution might be as simple as adding "same-security-traffic permit intra-interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am not sure if I got the whole setup right. Been handling so many things today that I might have just missed something. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Feb 2013 15:03:17 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-02-26T15:03:17Z</dc:date>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187510#M361436</link>
      <description>&lt;P&gt;We recently deployed a FWSM on our 6503-e boxes (w/ sup720).&amp;nbsp; NAT is working (PAT) but the issue I am seeing is private traffic from remote sites is not being allowed through the FW.&amp;nbsp;&amp;nbsp; I was able to get the remote site to ping the FWSM itself (inside address), but no hosts behind it.&amp;nbsp; Maybe an ACL issue? Also when I turn off NAT on the remote end, I can than access everything (We are NATng on both ends).&amp;nbsp;&amp;nbsp; Im a routing guy by nature so I will defer this to the security guys out there. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topology&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Hosts (inside/10.15.25.0/24) &amp;gt; FWSM&amp;nbsp; (outside/public IP) -&amp;gt; Core Router -&amp;gt; MPLS CLOUD -&amp;gt; Core Router (NATng) - &amp;gt; Hosts (192.168.1.0/24)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACLs applied to inside/outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show access-list ATX-ALLOW-IN&lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN; 15 elements&lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit tcp any any (hitcnt=222) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit icmp any any (hitcnt=101) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit udp any any (hitcnt=6)&lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit ip any any (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit tcp any any eq www (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit tcp any any eq https (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit ip any 192.168.1.0 255.255.255.0 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit icmp any 192.168.1.0 255.255.255.0 (hitcnt=0) &lt;/P&gt;&lt;P&gt;access-list ATX-ALLOW-IN extended permit tcp any 192.168.1.0 255.255.255.0 (hitcnt=0) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show access-group&lt;/P&gt;&lt;P&gt;access-group ATX-ALLOW-IN in interface outside&lt;/P&gt;&lt;P&gt;access-group ATX-ALLOW-IN out interface outside&lt;/P&gt;&lt;P&gt;access-group ATX-ALLOW-IN in interface inside&lt;/P&gt;&lt;P&gt;access-group ATX-ALLOW-IN out interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Ping Tests&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM Inside address (10.15.25.245)&lt;/P&gt;&lt;P&gt;Host behind the FWSM (10.15.25.89)&lt;/P&gt;&lt;P&gt;Remote Router Inside address (192.168.1.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FWSM to remote spoke site Router&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# ping 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 response received -- 10ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 response received -- 20ms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.1 response received -- 10ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote Router to FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ATX-CFW1#ping 10.15.25.245&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.15.25.245, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;!!!!!&lt;/P&gt;&lt;P&gt;Success rate is 100 percent (5/5), round-trip min/avg/max = 12/15/16 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote Router to a host behind the FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ATX-CFW1#ping 10.15.25.89 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type escape sequence to abort.&lt;/P&gt;&lt;P&gt;Sending 5, 100-byte ICMP Echos to 10.15.25.89, timeout is 2 seconds:&lt;/P&gt;&lt;P&gt;.....&lt;/P&gt;&lt;P&gt;Success rate is 0 percent (0/5)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:05:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187510#M361436</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2019-03-12T01:05:15Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187511#M361437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not 100% sure on your setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are the networks 10.15.25.0/24 and 192.168.1.0/24 LAN networks on each site?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because to my understanding you should only be able to PING an FWSM (or any Cisco firewall product) interface IP address from behind that said interface. And looking at the above post seems to point out that looking from the remote site the FWSM interface IP address is not the IP address facing the remote site but the LAN side of the FWSM?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You say also that you are NATing both ends. Are the above networks NATed networks or the real IP addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also on the FWSM side I dont see a benefit to having the same ACL attached to so many directions and to several interfaces. The most typical case is to use a separate ACL for each interface and only use them in the direction "in" controlling traffic entering each interface. You dont have to take into account the return traffic with a firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you clarify the setup abit with regards to the networks and their actual location related to the FWSM and remote router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 16:49:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187511#M361437</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T16:49:55Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187512#M361438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the quick response.&amp;nbsp; 10.15.25.0/24 is the LAN side behind the FWSM, and 192.168.1.0/24 is the LAN side behind the remote router.&amp;nbsp; So what is happening is we are natting the 10.15.25.0/24 network to a public IP (outside interface of FWSM), and on the remote end we are also natting the 192.168.1.0/24 address to a public IP.&amp;nbsp; I am using BGP inbteween the CORE routers to advertise both the 10.15.25.0/24 ; 192.168.1.0/24 private networks to each other.&amp;nbsp; From the remote site I can most def ping the inside IP of the FWSM, so now i just need to figure out how to ping hosts behind the 10.15.25.0/24 network.&amp;nbsp; Thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:05:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187512#M361438</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T17:05:47Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187513#M361439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't comment much on the router side when it comes to NAT. Last time I have configured NAT on a router must have been in school &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Though I configure our core routers regularly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now on the FWSM side though IF you have configured the PAT translation for the LAN network 10.15.25.0/24 towards the remote site this would mean that if you want that LAN network to reach some remote network with its original IP address and also be visible to it with the original IP address from the remote sites perspective, you would have to configure NAT0 that applies to the connections between the LAN networks of each site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason for the above is that all traffic from the FWSM LAN should be hitting to the PAT rule when the direction is FWSM LAN -&amp;gt; Any other network behind the "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure a simple NAT0 / NAT Exempt that applies when the source network is 10.15.25.0/24 and the destination network is 192.168.1.0/24 the configuration would be the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 remark NAT0 for FWSM LAN and Remote LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 10.15.25.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should enable the traffic between the 2 LANs (with regards to the FWSM configuration, I cant comment on the router side). Do take into account that I dont know the rest of your networks configurations so I dont know if this would have any effect on something in production.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What this should simply make it so that FWSM does no NAT between these 2 LAN networks BUT rest of the traffic from FWSM LAN 10.15.25.0/24 will still get PATed on the way through the FWSM "outside" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still kinda wondering how it is possible to ping an FWSM interface IP address that is NOT facing the remote site. Either I am missing something or its some software related thing. But to my understanding it should not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:21:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187513#M361439</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T17:21:59Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187514#M361440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also check that you have this configuration enabled&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should enable any ICMP Echo reply message to pass through the FWSM as long as the actual Echo message has been allowed through first. Though in your case since you have allowed all traffic I guess this might not be needed. In the even your make the rules a bit more specific this might be good to have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187514#M361440</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T17:29:07Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187515#M361441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thankfully I went ahead and moved production traffic to another firewall,&amp;nbsp; so I can make changes to the FWSM without my users yelling at me.&amp;nbsp; &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; I went ahead and applied the above rule, but still cannot ping from remote end to FWSM hosts.&amp;nbsp; Perhaps I need the same "NAT EXEMPT" rule on the remote side.&amp;nbsp; We are using a Cisco2851 on the remote end and we are NATng due to the users in that location requiring inet access.&amp;nbsp; Do you think I am able to ping the inside address remotley due to me allowing ICMP on the outside/inside address?&amp;nbsp; I am going to try and add a nat exempt rule on the remote end (cisco2851) and see if that does anything.&amp;nbsp; Thanks again Jouni!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187515#M361441</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T17:33:37Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187516#M361442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would this be done on the FWSM side, or the 6503 side?&amp;nbsp; Looks like i dont have an option on the FWSM to configure this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM(config)# policy-map ?&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Type help or '?' for a list of available commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show ver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM Firewall Version 2.3(4)8 &lt;/P&gt;&lt;P&gt;FWSM Device Manager Version 4.1(3)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:35:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187516#M361442</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T17:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187517#M361443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ouch &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never even seen such an old version of FWSM &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; I think it corresponds to having PIX on the 6.x software. Our FWSMs have been on 3.2 - 4.0 software which has different configuration format related to some configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess it uses the old format configuration then. The command might simply be "fixup protocol icmp" or something similiar.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With regards to the FWSM and Remote router NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding if you have an existing PAT configuration configured for the LAN network and the destination interface for that PAT&amp;nbsp; (where the PAT address is located) is the interface where the remote network is also located, you will always have to exempt traffic from NAT if you want to make it possible for the said LAN network to pass through without any form of NAT. (As otherwise all traffic hits the PAT rule when passing "inside" -&amp;gt; "outside")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully I am making sense. I am usually halfway through a sentence when I start thinking if I have explained the situation in a way too complex way compared to how it could be explained &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 17:42:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187517#M361443</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T17:42:30Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187518#M361444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Thats the version the card was shipped with, so I guess im stuck with it for now.&amp;nbsp; I do have the "fixup protocol icmp" applied.&amp;nbsp; The fact that if I turn off NAT on the remote end and i can ping, tells me it has to be some kind of NAT translation issue.&amp;nbsp; I have added a NAT exempt rule on the remote router, but I still cant seem to ping FWSM hosts. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Can you think of anything else I might be missing?&amp;nbsp; Thanks J!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;FWSM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0; 2 elements&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 remark NAT0 for FWSM LAN and Remote LAN&lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 extended permit ip 10.15.25.0 255.255.255.0 192.168.1.0 255.255.255.0 (hitcnt=10) &lt;/P&gt;&lt;P&gt;access-list INSIDE-NAT0 extended permit ip 10.15.25.0 255.255.255.0 host 198.205.5.82 (hitcnt=0) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show nat&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote Router&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip nat outside source list 100 interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 10.15.25.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.15.35.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 100 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;ip nat outside source list 100 interface GigabitEthernet0/0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 18:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187518#M361444</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T18:57:34Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187519#M361445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A quick look at a configuration guide for routers would make it seem like the only configurations on a very default Router NAT configuration would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 10.15.25.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 10.15.35.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 100 interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which should do PAT for the 2 mentioned LAN networks behind the routers while using the interface GigabitEthernet0/0 IP address as the PAT address. The first "deny" statement should to my understanding exempt the specified traffic from NAT alltogether.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I dont know what the purpose of the configurations are that are using the "ip nat outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187519#M361445</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T19:06:42Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187520#M361446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think once I get the nat exempt setup correctly on both ends, we will be in business.&amp;nbsp; Dont mind my ip nat outside command, I was just trying it to see if it had any impact.&amp;nbsp; I have also modified my ACL on the remote end.&amp;nbsp; I will have to wait until after 5pm central to make these changes (dont want to take down user traffic and get yelled at).&amp;nbsp; Here is the config I am planning on applying.&amp;nbsp; how does it look to you?&amp;nbsp; Thanks J.&amp;nbsp; Its nice to have someone to bounce these ideas off of.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list NO-NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip 10.15.25.0 0.0.0.255 192.168.1.0 0.0.0.255&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list NO-NAT interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:13:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187520#M361446</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T19:13:36Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187521#M361447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding you router NAT configuration should have the local network of 192.168.1.0/24 as the source and the FWSM LAN network 10.15.25.0/24 as the destination network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 19:25:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187521#M361447</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-25T19:25:29Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187522#M361448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good Catch.&amp;nbsp; I have altered the ACL to look like the following.&amp;nbsp; I think this just may work.&amp;nbsp; Thoughts?&amp;nbsp; Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Router:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended NAT-RULES&lt;/P&gt;&lt;P&gt; deny&amp;nbsp;&amp;nbsp; ip 192.168.1.0 0.0.0.255 10.15.25.0 0.0.0.255&lt;/P&gt;&lt;P&gt; permit ip 192.168.1.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list NAT-RULES interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Feb 2013 20:02:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187522#M361448</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-25T20:02:01Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187523#M361449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After applying the NAT exempt rules on each end, I can only ping one way.&amp;nbsp; From the Remote PC (PCB) I am not able to ping anything passed the FWSM.&amp;nbsp; As a test, I put a SVI on the MSFC, and I can succesfully ping that from PCB.&amp;nbsp; That tells me its still the fwsm somehow blocking it.&amp;nbsp; I will say this is some progress at least from not being able to ping anything.&amp;nbsp; Does anything in my configs look a little off?&amp;nbsp; Thx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Topology&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCA&amp;nbsp; - FWSM - MSFC - Core1 - MPLS - Core2 - CFW - PCB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCA: 10.15.25.89&lt;/P&gt;&lt;P&gt;FWSM: 10.15.25.245&lt;/P&gt;&lt;P&gt;MSCF: 10.15.25.57&lt;/P&gt;&lt;P&gt;CFW: 10.15.35.1&lt;/P&gt;&lt;P&gt;PCB: 10.15.35.222&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;PCA to PCB Ping Tests&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCA &amp;gt; ping 10.15.35.222&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pinging 10.15.35.222 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Reply from 10.15.35.222: bytes=32 time=15ms TTL=125&lt;/P&gt;&lt;P&gt;Reply from 10.15.35.222: bytes=32 time=14ms TTL=125&lt;/P&gt;&lt;P&gt;Reply from 10.15.35.222: bytes=32 time=14ms TTL=125&lt;/P&gt;&lt;P&gt;Reply from 10.15.35.222: bytes=32 time=14ms TTL=125&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping statistics for 10.15.35.222:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 14ms, Maximum = 15ms, Average = 14ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;PCB to PCA/MSFC Ping Tests&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCB &amp;gt; ping 10.15.25.89&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pinging 10.15.25.89 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;Request timed out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping statistics for 10.15.25.89:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 0, Lost = 4 (100% loss),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PCB &amp;gt;ping 10.15.25.57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pinging 10.15.25.57 with 32 bytes of data:&lt;/P&gt;&lt;P&gt;Reply from 10.15.25.57: bytes=32 time=15ms TTL=253&lt;/P&gt;&lt;P&gt;Reply from 10.15.25.57: bytes=32 time=15ms TTL=253&lt;/P&gt;&lt;P&gt;Reply from 10.15.25.57: bytes=32 time=14ms TTL=253&lt;/P&gt;&lt;P&gt;Reply from 10.15.25.57: bytes=32 time=14ms TTL=253&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping statistics for 10.15.25.57:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),&lt;/P&gt;&lt;P&gt;Approximate round trip times in milli-seconds:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Minimum = 14ms, Maximum = 15ms, Average = 14ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;FWSM Config:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# sh nat&amp;nbsp; &lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list LAN-NO-NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN-NO-NAT; 2 elements&lt;/P&gt;&lt;P&gt;access-list LAN-NO-NAT extended permit ip 10.15.25.0 255.255.255.0 10.15.35.0 255.255.255.0 (hitcnt=120) &lt;/P&gt;&lt;P&gt;access-list LAN-NO-NAT extended permit ip host X.X.X.X 10.15.35.0 255.255.255.0 (hitcnt=0) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;X.X.X.X = PUBLIC IP OF REMOTE ROUTER&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;CFW Config&lt;BR /&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extended IP access list nat_source&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10 deny ip any 10.15.25.0 0.0.0.255 (6304597 matches)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20 deny ip any host 198.205.5.66&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 30 permit ip 10.15.35.0 0.0.0.255 any (455 matches)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list nat_source interface GigabitEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Routing tables on both FWSM and Core2&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;FWSM&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM# show route&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;O&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.15.35.0 255.255.255.0 [110/12] via 198.205.5.65, 0:51:40, outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;CFW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#show ip route 10.15.25.0&lt;/P&gt;&lt;P&gt;Routing entry for 10.15.25.0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp; Known via "ospf 500", distance 110, metric 3, type intra area&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 08:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187523#M361449</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-26T08:22:02Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187524#M361450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are we talking about a FWSM in "mode transparent" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 08:28:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187524#M361450</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T08:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187525#M361451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jouni.&amp;nbsp; I set it to transparent disabled, so should be in routing mode.&amp;nbsp; Any other commands to confirm this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM#&amp;nbsp; show mode&lt;/P&gt;&lt;P&gt;Firewall mode: single &lt;/P&gt;&lt;P&gt;The flash mode is the SAME as the running mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 08:31:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187525#M361451</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-26T08:31:58Z</dc:date>
    </item>
    <item>
      <title>FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187526#M361452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im just wondering where this IP is actually located. Its part of the same network as the the segment behind the FWSM and PCA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MSCF: 10.15.25.57&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or is it between PCA and the FWSM interface for the network 10.15.25.0/24?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the easiest way would be just to see the FWSM configuration. Maybe you can post it (unless its too big or contains too much to parse through) or send it through private message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For some reason the forums are facing problems with attachement files at the moment so dont use that. I couldnt open them. (I think the problem is beeing looked into though)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 08:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187526#M361452</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T08:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187527#M361453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just sent you a PM.&amp;nbsp; Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 13:43:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187527#M361453</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-26T13:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187528#M361454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read your PM and am still a bit confused as to the routing in this case. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On the core device which hosts the FWSM are we talking just about Global Routing Table or are there any VRFs involved?&lt;/LI&gt;&lt;LI&gt;Looking at the FWSM configuration, what is the interface behind which the remote network 192.168.1.0/24 is located?&lt;UL&gt;&lt;LI&gt;I see that in your PM you have added and removed some configurations so I just want to confirm&lt;/LI&gt;&lt;LI&gt;For example there was a "route inside 192.168.1.0 255.255.255.0 192.168.0.x" where the gateway IP address is not located on the "inside" interface at all but another interface on the FWSM.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have understood the situation correctly it almost seems like the situation is as follows:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FWSM interface "inside" is facing the remote network 192.168.1.0/24 &lt;UL&gt;&lt;LI&gt;This is also why it would answer to ICMP as its actually facing the remote network&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;ICMP Echo messages from the remote network 192.168.1.0/24 go as follows &lt;UL&gt;&lt;LI&gt;ICMP reaches the local Core and heads straight to host 10.15.25.x&lt;/LI&gt;&lt;LI&gt;ICMP reaches the 10.15.25.x host&lt;/LI&gt;&lt;LI&gt;Host 10.15.25.x sends the traffic to its default gateway = FWSM interface IP? (not the core so asymmetric routing)&lt;/LI&gt;&lt;LI&gt;FWSM blocks the traffic as its not allowed at the moment to pass traffic back through the same "inside" interface where the traffic came from&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The solution might be as simple as adding "same-security-traffic permit intra-interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I am not sure if I got the whole setup right. Been handling so many things today that I might have just missed something. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 15:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187528#M361454</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-02-26T15:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM ACL/NAT Issue</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187529#M361455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Jouni.&amp;nbsp; I do not have any VRFs, and I am transporting these private subnets via OSPF from one side to another.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Physical Topology&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN - FWSM/MSFC - CORE ROUTER - MPLS CLOUD - REMOTE CORE ROUTER - CiscoFW - REMOTE LAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FWSM inside networks:&lt;/P&gt;&lt;P&gt;192.168.0.0/24&lt;/P&gt;&lt;P&gt;10.15.25.0/25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Router Inside Networks:&lt;/P&gt;&lt;P&gt;192.168.1.0&lt;/P&gt;&lt;P&gt;10.15.35.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Core routers have an IP in each LAN range, and I am injecting them into OSPF so they get propogated to the remote ends.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you look at my config you will see i have "same-security-traffic permit intra-interface" applied.&amp;nbsp; My FWSM NAT rules say for any traffic towards 192.168.1.0/10.15.35.0 do not NAT.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I can ping from the FWSM LAN (10.15.25.0) into the REMOTE LAN (10.15.35.0), but I cannot ping the other way around.&amp;nbsp;&amp;nbsp; I hope i make sense.&amp;nbsp; What do you think thus far?&amp;nbsp; Thx &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Feb 2013 18:17:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-acl-nat-issue/m-p/2187529#M361455</guid>
      <dc:creator>gignet200</dc:creator>
      <dc:date>2013-02-26T18:17:42Z</dc:date>
    </item>
  </channel>
</rss>

