<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5512X NAT Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094545#M393383</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you see this NAT configuration line in the packet-tracer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Outside,Outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes could you alter this configuration in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Outside,Outside) &lt;STRONG&gt;after-auto&lt;/STRONG&gt; source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would move the rule to the end of the NAT configurations (which shouldnt cause problems for what this NAT is used for, to my understanding atleast). I guess this configuration is meant for VPN Client Internet usage through the ASA "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration to my eye would be the only configuration affecting that the source and destination interface chosen would be "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this shouldnt really affect regards to this problem either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Jan 2013 13:32:03 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-10T13:32:03Z</dc:date>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094537#M393375</link>
      <description>&lt;P&gt;Greetings all. Having an issue setting up a new ASA5512X, 9.0. Outside interface is a /30 to the ISP. Inside is /30 to a Cat4500 switch. Have a few web servers inside that need to be accessible from outside. Attempting to static NAT the servers to public addresses in a /28 pool but keep getting denied by firewall seeing traffic as a spoof attack. Have tried addressing a sub-interface on the outside with a pool address, also the inside. I'm missing something basic, like where does the pool get defined? Thanks in advance for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094537#M393375</guid>
      <dc:creator>leeswc</dc:creator>
      <dc:date>2019-03-12T00:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094538#M393376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you have a /30 link network to ISP and they have also provided you with a /28 public IP address range for Static NAT use?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please dont configure subinterface atleast towards the ISP/outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try enabling the following configuration (I think through 8.4 to 9.0 there has been changes regarding using nonconnected network as NAT addresses. Might have been changed at 8.4(3) and later added a workaround which to my understanding was in 9.x)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres quote from Command Refence&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; arp non-connected-subnet &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1815463"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; To allow population of the ARP cache for non-connected subnets, use the &lt;STRONG&gt;arp non-connected-subnet &lt;/STRONG&gt;command in global configuration mode. To restore the default setting, use the &lt;STRONG&gt;no&lt;/STRONG&gt; form of this command. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1815464"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;arp&lt;/STRONG&gt; &lt;STRONG&gt;non-connected-subnet&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;[&lt;STRONG&gt;enable&lt;/STRONG&gt;] &lt;/P&gt;&lt;P&gt;&lt;A name="wp1815465"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no arp&lt;/STRONG&gt; &lt;STRONG&gt;non-connected-subnet&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;[&lt;STRONG&gt;enable&lt;/STRONG&gt;] &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should also confirm that the ISP has routed the network towards your ASA outside interface IP address and not just the interface thats pointing towards your device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is one document about the issue you might be running into&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-24549" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-24549&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT should be configured in the following way for example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC&lt;/P&gt;&lt;P&gt; host 10.10.10.10&lt;/P&gt;&lt;P&gt; nat (inside,outside) static x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN permit tcp any object STATIC eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;STATIC = object name where you define the local IP address and the NAT configuration&lt;/LI&gt;&lt;LI&gt;OUTSIDE-IN = ACL that is attached to the "outside" interface in direction "in"&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information was helpfull and/or ask more if needed &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 16:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094538#M393376</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-06T16:58:19Z</dc:date>
    </item>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094539#M393377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ARP Non-connected subnets is enabled. The ISP is routing the traffic correctly as indicated by the requests hitting the outside interfrace of the ASA. Log indicates failure due to reverse path check. Not sure why the firewall thinks the address is being spoofed. Packet Tracer tool shows packet entering outside interface and ending up at outside interface. Odd, yes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 18:44:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094539#M393377</guid>
      <dc:creator>leeswc</dc:creator>
      <dc:date>2013-01-06T18:44:04Z</dc:date>
    </item>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094540#M393378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Might be some other issue regarding the firewall configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine that there is some NAT configuration thats causing it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post your configurations (minus any sensitive information)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 18:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094540#M393378</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-06T18:47:09Z</dc:date>
    </item>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094541#M393379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will post config when I get CLI access; only have ASDM from here.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 19:06:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094541#M393379</guid>
      <dc:creator>leeswc</dc:creator>
      <dc:date>2013-01-06T19:06:45Z</dc:date>
    </item>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094542#M393380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here goes. This should be all pertinent lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 9.0(1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif Outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address x.x.167.242 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.18.1.1 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;boot system disk0:/asa901-smp-k8.bin&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object network SSL_vCloudDirector_nat&lt;/P&gt;&lt;P&gt; host 10.100.1.41&lt;/P&gt;&lt;P&gt; object network SSL_vCloudDirector_ext&lt;/P&gt;&lt;P&gt; host y.y.9.195&lt;/P&gt;&lt;P&gt;object network NAT_Pool&lt;/P&gt;&lt;P&gt; subnet y.y.9.192 255.255.255.240&lt;/P&gt;&lt;P&gt; description NAT Pool&lt;/P&gt;&lt;P&gt;access-list Outside_access extended permit tcp any4 object SSL_vCloudDirector_nat eq https&lt;/P&gt;&lt;P&gt;access-list Outside_access extended permit tcp any4 object SSL_vCloudDirector_ext eq https&lt;/P&gt;&lt;P&gt;access-list DMZ_access extended permit tcp any4 object SSL_vCloudDirector_nat eq https&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any Inside&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;arp permit-nonconnected&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) source static any any destination static NETWORK_OBJ_172.18.1.32_28 NETWORK_OBJ_172.18.1.32_28 no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (Outside,Outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network SSL_vCloudDirector_nat&lt;/P&gt;&lt;P&gt; nat (Inside,Outside) static SSL_vCloudDirector_ext&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (Inside,Outside) after-auto source dynamic any interface&lt;/P&gt;&lt;P&gt;access-group Outside_access in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 209.234.167.241 1&lt;/P&gt;&lt;P&gt;route Inside 10.0.0.0 255.0.0.0 172.18.1.2 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 05:45:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094542#M393380</guid>
      <dc:creator>leeswc</dc:creator>
      <dc:date>2013-01-10T05:45:01Z</dc:date>
    </item>
    <item>
      <title>ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094543#M393381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try the packet-tracer command for the traffic attempt and see if there is anything special there. I dont see a problem on the basis of above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer intput Outside tcp 1.2.3.4 4056 y.y.9.195 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unless the format has changed in the 9.x software&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 06:24:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094543#M393381</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-10T06:24:31Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094544#M393382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I ran the Packet Tracer against it and the indication was that the traffic came in the outside interface and ended up at the outside interface. Watching the logs when attempting an actual connection yields "Deny TCP reverse path check". I think it may be time to admit defeat and open a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 13:16:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094544#M393382</guid>
      <dc:creator>leeswc</dc:creator>
      <dc:date>2013-01-10T13:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5512X NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094545#M393383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you see this NAT configuration line in the packet-tracer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Outside,Outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes could you alter this configuration in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Outside,Outside) &lt;STRONG&gt;after-auto&lt;/STRONG&gt; source dynamic any interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would move the rule to the end of the NAT configurations (which shouldnt cause problems for what this NAT is used for, to my understanding atleast). I guess this configuration is meant for VPN Client Internet usage through the ASA "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above configuration to my eye would be the only configuration affecting that the source and destination interface chosen would be "outside"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this shouldnt really affect regards to this problem either&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface Outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jan 2013 13:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5512x-nat-problem/m-p/2094545#M393383</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-10T13:32:03Z</dc:date>
    </item>
  </channel>
</rss>

