<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT statement question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103641#M393316</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And to further clarify the meaning of the syntax refer to the below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-LOCAL LAN-NATTED destination static REMOTE-NATTED REMOTE-LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;LAN-LOCAL would be an object/object-group containing the IP addresses that are local and in other words NOT NAT addresses&lt;/LI&gt;&lt;LI&gt;LAN-NATTED would be an object/object-group containing the IP addresses that LAN-LOCAL are NATed to&lt;/LI&gt;&lt;LI&gt;REMOTE-NATTED would be an object/object-group containing NATed IP addresses for the real IP addresses contained in REMOTE-LOCAL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now as you can see the above has a "source static" start instead of your above "source dynamic". In the case of "source static" the host/network address contained in LAN-LOCAL would be NATed to a another NAT host/network address 1:1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While in the case of "source dynamic" your source object LAN-LOCAL addresses would probably be NATed to either interface IP address using the "interface" parameter or you might aswell use an object to define the IP address or even IP address pool/range to which the source addresses are PATed / NATed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Jan 2013 21:44:07 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-07T21:44:07Z</dc:date>
    <item>
      <title>NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103637#M393310</link>
      <description>&lt;P&gt;Hi all.&amp;nbsp; I have a nat question for everyone to help me understand some syntax.&amp;nbsp; I have the following example and then my question:&lt;/P&gt;&lt;P&gt;Example:&amp;nbsp; nat (outside,outside) source dynamic obj-10.10.10.0 interface destination static obj-2.2.2.0 obj-2.2.2.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im trying to understand this statement.&amp;nbsp; I cant seem to find an explanation in laymans terms that I fully understand, and Im not loving the new command for a NAT translation.&amp;nbsp; In this example, I have a vpn client that needs access to a public IP address.&amp;nbsp; I used 2.2.2.0 as an example network.&amp;nbsp; I used 10.10.10.0 as the remote-access clients.&amp;nbsp; Can someone explain to me this syntax?&amp;nbsp; It used to be two objects and now its four.&amp;nbsp; I get the 'nat' and '(outside,outside)' commands, but if someone could explain the rest of the commands I would appreciate it very much.&amp;nbsp; Thank you in advance for your help.&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:44:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103637#M393310</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2019-03-12T00:44:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103638#M393312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By the way, as Im sure you all know, this is the ASA 8.3 code oand later.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 20:46:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103638#M393312</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2013-01-07T20:46:36Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103639#M393314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above NAT configuration would achieve the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It would do NAT for traffic entering and leaving the "outside" interface &lt;UL&gt;&lt;LI&gt;It would also require the configuration "same-security-traffic permit intra-interface" for the traffic to go out the same interface it arrived from.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;It will PAT the traffic for source addresses in "obj-10.10.10.0" to the "outside" interface IP address&lt;/LI&gt;&lt;LI&gt;It will do the above ONLY WHEN the destination address is "obj-2.2.2.0"&amp;nbsp; &lt;UL&gt;&lt;LI&gt;The "obj-2.0.0.0" is listed twice because you could NAT the destination also. In this case because its the same object twice, no NAT will be done for the destination. It stayst the same&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would seem like a NAT for VPN Client users to be able to access the Internet through the Firewall/VPN device they are connected to. Which would probably also mean that the VPN Client type is Full Tunnel instead of Split tunnel. (EDIT: Now that I think of it this wouldnt necesarily be the case &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull and/or ask more questions &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 20:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103639#M393314</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T20:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103640#M393315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Awesome answer, and I fully understand it now.&amp;nbsp; Thank you.&amp;nbsp; So, I have another two questions concerning this.&amp;nbsp; &lt;/P&gt;&lt;P&gt;1. Is this called "twice NAT" or "network object NAT"?&amp;nbsp; &lt;/P&gt;&lt;P&gt;2. If the destinationA is different than destinationB, is that what "twice NAT" is?&lt;/P&gt;&lt;P&gt;3. If its destinationA is the same as destinationB, is that what "network object NAT" is?&lt;/P&gt;&lt;P&gt;Thanks again for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 21:38:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103640#M393315</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2013-01-07T21:38:15Z</dc:date>
    </item>
    <item>
      <title>NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103641#M393316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And to further clarify the meaning of the syntax refer to the below configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-LOCAL LAN-NATTED destination static REMOTE-NATTED REMOTE-LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;LAN-LOCAL would be an object/object-group containing the IP addresses that are local and in other words NOT NAT addresses&lt;/LI&gt;&lt;LI&gt;LAN-NATTED would be an object/object-group containing the IP addresses that LAN-LOCAL are NATed to&lt;/LI&gt;&lt;LI&gt;REMOTE-NATTED would be an object/object-group containing NATed IP addresses for the real IP addresses contained in REMOTE-LOCAL&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now as you can see the above has a "source static" start instead of your above "source dynamic". In the case of "source static" the host/network address contained in LAN-LOCAL would be NATed to a another NAT host/network address 1:1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While in the case of "source dynamic" your source object LAN-LOCAL addresses would probably be NATed to either interface IP address using the "interface" parameter or you might aswell use an object to define the IP address or even IP address pool/range to which the source addresses are PATed / NATed to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 21:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103641#M393316</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T21:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103642#M393317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And the actual answer to your second question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the above NAT is Twice NAT. Is belongs to the NAT rules that are gone through first by the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And Example of Object NAT could be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DEFAULT-PAT&lt;/P&gt;&lt;P&gt; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DEFAULT-PAT is a descriptive name of the objects purpose&lt;/LI&gt;&lt;LI&gt;"subnet"&amp;nbsp; defines the network under object and also in this case the source address for the NAT&lt;/LI&gt;&lt;LI&gt;"nat" defines the actual NAT &lt;UL&gt;&lt;LI&gt;source interrface&lt;/LI&gt;&lt;LI&gt;destination interface&lt;/LI&gt;&lt;LI&gt;NAT type (static/dynamic)&lt;/LI&gt;&lt;LI&gt;IP address (or "interface" if used)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;objec network STATIC&lt;/P&gt;&lt;P&gt; host 10.10.10.100&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 1.2.3.4 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DEFAULT-PAT is a descriptive name of the objects purpose&lt;/LI&gt;&lt;LI&gt;"host"&amp;nbsp; defines the host IP address under object and also in this case the source address for the NAT&lt;/LI&gt;&lt;LI&gt;"nat" defines the actual NAT &lt;UL&gt;&lt;LI&gt;source interrface&lt;/LI&gt;&lt;LI&gt;destination interface&lt;/LI&gt;&lt;LI&gt;NAT type (static/dynamic)&lt;/LI&gt;&lt;LI&gt;IP address (or "interface" if used)&lt;/LI&gt;&lt;LI&gt;"dns" enabled the users from the local LAN (10.10.10.x/yy) to connect to the this local host using the public DNS name provided the ASA can see their DNS query.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Notice that "object network" can only contain ONE host/subnet/range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would therefore suggest using "object-group" while configuring Default PAT for your LAN networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source Networks for PAT&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;DEFAULT-PAT-SOURCE "object-group" defines the source addresses for the PAT configuration. If you configure a new LAN network you can just add the network under the "object-group" and it will be set for Default PAT.&lt;/LI&gt;&lt;LI&gt;"after-auto" moves the NAT rule to Section 3 which in other words means the last rules to be gone through by the ASA when checking for suitable translation for the traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully the above clarified the situation a bit. The new NAT format can be pain in the start. I got to admit while its easier now for me personally I still miss the simplicity of the old NAT in certain cases/enviroments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't be afraid to rate if the information was helpfull &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must have consumed too much coffee again when I look how much I wrote again &lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 21:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103642#M393317</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T21:53:57Z</dc:date>
    </item>
    <item>
      <title>NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103643#M393318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh and forgot to copy/past this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It describes the order of NAT rules in the new software 8.3 and above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; NAT Rule Order &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090468"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Network object NAT rules and twice NAT rules are stored in a single&amp;nbsp; table that is divided into three sections. Section 1 rules are applied&amp;nbsp; first, then section 2, and finally section 3. &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1124475"&gt;Table 27-1&lt;/A&gt; shows the order of rules within each section. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1124464"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV align="left"&gt;
&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1124475table1124473" width="80%"&gt;
&lt;CAPTION&gt;&lt;A name="wp1124475"&gt;&lt;/A&gt;&lt;A name="wpxref87472"&gt;&lt;/A&gt;
&lt;P&gt; Table 27-1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;NAT Rule Table &lt;/P&gt;
&lt;/CAPTION&gt; 
&lt;TBODY&gt;
&lt;TR align="left" valign="bottom"&gt;
&lt;TH scope="col"&gt;&lt;A name="wp1124479"&gt;&lt;/A&gt;
&lt;DIV&gt; Table Section &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1124705"&gt;&lt;/A&gt;
&lt;DIV&gt; Rule Type &lt;/DIV&gt;
&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1124481"&gt;&lt;/A&gt;
&lt;DIV&gt; Order of Rules within the Section &lt;/DIV&gt;
&lt;/TH&gt; 
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1124483"&gt;&lt;/A&gt;
&lt;P&gt; Section 1 &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124707"&gt;&lt;/A&gt;
&lt;P&gt; Twice NAT &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124485"&gt;&lt;/A&gt;
&lt;P&gt; Applied on a first match basis, in the order they appear in the&amp;nbsp; configuration. By default, twice NAT rules are added to section 1. &lt;/P&gt;
&lt;A name="wp1133597"&gt;&lt;/A&gt;&lt;A name="wpmkr1133791"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;If&amp;nbsp; you configure VPN, the client dynamically adds invisible NAT rules to&amp;nbsp; the end of this section. Be sure that you do not configure a twice NAT&amp;nbsp; rule in this section that might match your VPN traffic, instead of&amp;nbsp; matching the invisible rule. If VPN does not work due to NAT failure,&amp;nbsp; consider adding twice NAT rules to section 3 instead. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1124487"&gt;&lt;/A&gt;
&lt;P&gt; Section 2 &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124709"&gt;&lt;/A&gt;
&lt;P&gt; Network object NAT &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124571"&gt;&lt;/A&gt;
&lt;P&gt; Section 2 rules are applied in the following order, as automatically determined by the adaptive security appliance: &lt;/P&gt;
&lt;A name="wp1124575"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt; 1. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Static rules. &lt;/P&gt;
&lt;A name="wp1124576"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt; 2. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Dynamic rules. &lt;/P&gt;
&lt;A name="wp1124577"&gt;&lt;/A&gt;
&lt;P&gt; Within each rule type, the following ordering guidelines are used: &lt;/P&gt;
&lt;A name="wp1124578"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt; a. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Quantity&amp;nbsp; of real IP addresses—From smallest to largest. For example, an object&amp;nbsp; with one address will be assessed before an object with 10 addresses. &lt;/P&gt;
&lt;A name="wp1124579"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt; b. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;For&amp;nbsp; quantities that are the same, then the IP address number is used, from&amp;nbsp; lowest to highest. For example, 10.1.1.0 is assessed before 11.1.1.0. &lt;/P&gt;
&lt;A name="wp1124580"&gt;&lt;/A&gt;
&lt;P&gt; &lt;STRONG&gt; c. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If&amp;nbsp; the same IP address is used, then the name of the network object is&amp;nbsp; used, in alphabetical order. For example, abracadabra is assessed before&amp;nbsp; catwoman. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR align="left" valign="top"&gt;
&lt;TD&gt;&lt;A name="wp1124547"&gt;&lt;/A&gt;
&lt;P&gt; Section 3 &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124711"&gt;&lt;/A&gt;
&lt;P&gt; Twice NAT &lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&lt;A name="wp1124549"&gt;&lt;/A&gt;
&lt;P&gt; Section 3 rules are applied on a first match basis, in the order they&amp;nbsp; appear in the configuration. You can specify whether to add a twice NAT&amp;nbsp; rule to section 3 when you add the rule. &lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090505"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; For section 2 rules for example, you have the following IP addresses defined within network objects: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090507"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.0/24 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090508"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.0/24 (dynamic) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090509"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 10.1.1.0/24 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090510"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.1/32 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090511"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 172.16.1.0/24 (dynamic) (object def) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090512"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 172.16.1.0/24 (dynamic) (object abc) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090514"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The resultant ordering would be: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090515"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.1/32 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090516"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 10.1.1.0/24 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090517"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.0/24 (static) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090518"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 172.16.1.0/24 (dynamic) (object abc) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090519"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 172.16.1.0/24 (dynamic) (object def) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1090520"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; 192.168.1.0/24 (dynamic) &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Link to ths ource document (Configuration Guide for software 8.3)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1118157"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html#wp1118157&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 22:08:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103643#M393318</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T22:08:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103644#M393319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, quick question on that.&amp;nbsp; I like this example: &lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN-LOCAL LAN-NATTED destination static REMOTE-NATTED REMOTE-LOCAL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But one last question here.&amp;nbsp; On the REMOTE-NATTED REMOTE-LOCAL, Im guessing that is not backwards but really the syntax.&amp;nbsp; I just notice that on the LAN-LOCAL LAN-NATTED, its vice versa.&amp;nbsp; Is that correct?&amp;nbsp; Thats a little confusing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 22:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103644#M393319</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2013-01-07T22:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103645#M393320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes that is the order always&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check this by simply starting to write the command on your ASA command line interface and using "?" after each parameter and the ASA will give a little description of the available configurations possibilities&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if I try to enter that NAT configuration to my own ASA in and check the "?" help in between the parameters&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First Object/Object-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# nat (LAN,WAN) source static ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; WORD&amp;nbsp; Specify object or object-group name for &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;real source&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second Object/Object-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# nat (LAN,WAN) source static LAN-LOCAL ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; WORD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify object or object-group name for &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;mapped source&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Third Object/Object-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# nat (LAN,WAN) source static LAN-LOCAL LAN-NATTED destination static ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; WORD&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Specify object or object-group name for &lt;STRONG style="color: #ff0000;"&gt;mapped destination&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Fourth Object/Object-group&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# nat (LAN,WAN) source static LAN-LOCAL LAN-NATTED destination static REMOTE-NATTED ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;/P&gt;&lt;P&gt;&amp;nbsp; WORD&amp;nbsp; Specify object or object-group name for &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;real destination&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got to admit that I VERY RARELY use NAT for the destination networks. Usually there is only need to define NAT for the source address/addresses in the first object/object-group and in that case the identical objects/object-groups in the destination just tell for what destination networks the NAT should be performed. In that case it behaves pretty much like the 8.2 and below softwares Policy NAT (defines source and destination network pairs for which the NAT/PAT in question needs to be performed)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 22:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103645#M393320</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-07T22:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT statement question</title>
      <link>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103646#M393321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Jouni.&amp;nbsp; Excellent info you have given.&amp;nbsp; I have certainly learned something today.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2013 05:38:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-statement-question/m-p/2103646#M393321</guid>
      <dc:creator>jjoseph01</dc:creator>
      <dc:date>2013-01-08T05:38:55Z</dc:date>
    </item>
  </channel>
</rss>

