<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Basic ASA question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089378#M392580</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the correct way to do it. Spot on..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 19 Jan 2013 14:01:56 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2013-01-19T14:01:56Z</dc:date>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089370#M392547</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got what is probably a very basic question - but i can't figure it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet (ADSL) -&amp;gt; 2851 (ADSL wic) -&amp;gt; 5520 -&amp;gt; internal LAN (192.168.1.x/24)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The asa has just replaced a Checkpoint firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've set up the ASA to the point where all hosts on the internal LAN have internet access (using a dynamic PAT on that network).&amp;nbsp; This all works well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem i have is i am trying to allow access from the internet to an internal host on a specifc TCP port (as i had done on the Checkpoint) but i'm getting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src outside:111.111.111.11/52135 dst inside:192.168.1.252/5555 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what i have read i need to add a NAT exemption for this particular use case - to avoid the dynamic NAT i have setup, but im not sure how to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm running 9.1 on the ASA, no VPNs yet.&amp;nbsp; Just this basic setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could someone help me out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scotty&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:49:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089370#M392547</guid>
      <dc:creator>mrskater99</dc:creator>
      <dc:date>2019-03-12T00:49:08Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089371#M392554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you "clear xlate" after the changes or addition to the new static rule that you have configured?&lt;/P&gt;&lt;P&gt;Also, can you share what you have configured for both the dynamic and the static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 07:42:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089371#M392554</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-01-19T07:42:27Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089372#M392559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA only contains the single dynamic NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static NAT is on the 2851 in front of the ASA (on the outside interface):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 192.168.1.252 5555 interface Dialer1 5555&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what the NATexemption on the ASA should look like to make this work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scotty&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 08:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089372#M392559</guid>
      <dc:creator>mrskater99</dc:creator>
      <dc:date>2013-01-19T08:27:05Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089373#M392562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ahhh, yes, you would need nat exemption on the ASA and also the router should have route for 192.168.1.252 pointing towards the ASA outside interface IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT exemption will be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.252&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; host 192.168.1.252&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-192.168.1.252 obj-192.168.1.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then "clear xlate"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 08:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089373#M392562</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-01-19T08:40:53Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089374#M392567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks so much!&amp;nbsp; Works perfectly!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 08:45:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089374#M392567</guid>
      <dc:creator>mrskater99</dc:creator>
      <dc:date>2013-01-19T08:45:59Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089375#M392569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Excellent, thanks for the update.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 08:49:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089375#M392569</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-01-19T08:49:44Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089376#M392572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Jennifer - that allows connections into 192.168.1.252 from the internet - but .252 has now lost access to the internet (ie the dynamic NAT for the internal Network).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to achieve both?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 08:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089376#M392572</guid>
      <dc:creator>mrskater99</dc:creator>
      <dc:date>2013-01-19T08:52:27Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089377#M392576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok so i got this working by doing the following to narrow down the NAT exemption to only be the traffic on 5555:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static xbmc-lounge xbmc-lounge service xxx-custom-out xxx-custom-out&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where xxx-custom-out is src 5555 dest any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the correct way of doing this though???&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 11:00:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089377#M392576</guid>
      <dc:creator>mrskater99</dc:creator>
      <dc:date>2013-01-19T11:00:26Z</dc:date>
    </item>
    <item>
      <title>Basic ASA question</title>
      <link>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089378#M392580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the correct way to do it. Spot on..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Jan 2013 14:01:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-asa-question/m-p/2089378#M392580</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2013-01-19T14:01:56Z</dc:date>
    </item>
  </channel>
</rss>

