<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT issue across interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131367#M393496</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow.&amp;nbsp; I mean WOW!&amp;nbsp; I was expecting a quick description and I got the motherload!&amp;nbsp; I wasn't even coming close this, you're on such a higher level than me.&amp;nbsp; Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ripped out the config from earlier and I'm going to have at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm starting to wonder if changing security levels wasn't the way to go to fix my earlier problems and I should have configured access lists on the interfaces instead.&amp;nbsp; It seems logical now.&amp;nbsp; But I inherited this config so I just keep plugging along with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANK YOU!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Jan 2013 21:13:00 GMT</pubDate>
    <dc:creator>WStoffel1</dc:creator>
    <dc:date>2013-01-04T21:13:00Z</dc:date>
    <item>
      <title>NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131356#M393485</link>
      <description>&lt;P&gt;First off, Thanks everyone for all the advice all the time!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I keep finding small NAT/ACL issues with the attached config I'm having great difficulty overcoming.&amp;nbsp; More importantly it seems one fix you all help me out with, doesn't, in my mind anyway, translate to the next issue...so here goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an Exchange server that sits behind sub-int 180.&amp;nbsp; There's another Exchange server that sits behind sub-int 133 and I need to be able to send email from 192.168.180.26 to 192.168.133.6.&amp;nbsp; And likewise, back in the other direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To start with all of these interfaces had a sec level of 90.&amp;nbsp; The reason 133 is now 95 was to pass traffic from higher to lower and access a web server behind sub-int 146, along with this NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (AUD,Franklin) 192.168.133.0 192.168.133.0 netmask 255.255.255.0 (and the AUD dns server is configured to use the local address of the web server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only mention this in case there's something with the 133 interface that should be changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The packet trace from 180 to 133 follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input Exchange tcp 192.168.180.26 32000 192.168.133.6 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.133.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; AUD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Exchange&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: audubon&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clearly I'm trying to access a higher security level interface.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have done a few things to troubleshoot, namely lowering int 133, 146, 180 security level's by 5 and I end up with a NATing problem, I'm thinking I don't want to muddy up this discussion with TOO much info...Just say the word and I'll throw those changes and the resulting packet trace &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:42:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131356#M393485</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-12T00:42:37Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131357#M393486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the only 2 options would be to either change security-levels (with the risk of causing problems with something else) or just by configuring Exchange interface an ACL so it can connect to networks behind a more secure interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configure an ACL, you will have to make sure to allow all the traffic needed since "security-level" will no more determine the allowed connections but instead it will be decided by the ACL you have just configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do seem to have a huge NAT configuration and its pretty hard to go through without having the help of actually going through it through the ASA CLI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 17:56:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131357#M393486</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T17:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131358#M393487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you happen to make an ACL and still want to apply rules that follow the logic of the security-levels I guess you could try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure an "object-group network &lt;NAME&gt;"&amp;nbsp; &lt;UL&gt;&lt;LI&gt;include all the destination networks under this object-group which are located behind interface with higher security-level than the interface you are gonna make the ACL for&lt;/LI&gt;&lt;/UL&gt;&lt;/NAME&gt;&lt;/LI&gt;&lt;LI&gt;Configure the ACL configuration with the following lines&amp;nbsp; &lt;UL&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Deny all Connections to Higher Security Level networks&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; deny ip any object-group &lt;NAME&gt;&lt;/NAME&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Allow all other traffic&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; permit ip &lt;NETWORK&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above ACL coupled with the object-group&amp;nbsp; created would still block traffic to higher security-level networks but allow all other traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its a totally different matter how bloated the configuration will become unless you come up with a plan to make the network setup simpler.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have personally not used "security-level" value that much to determine what traffic can be initiated. I have usually just configured ACL for each interface to avoid playing around with the "security-levels"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration is otherwise pretty simple other than for the Static NATs that you use to NAT local addresses to public IP addresses towards other LAN networks. This is I guess to avoid doing changes to DNS configurations? Then again as long as everyone behind the ASA uses public DNS, you can let the ASA rewrite the DNS reply messages by adding the "dns" parateter to the LAN -&amp;gt; OUTSIDE Static NAT configuration for the servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 18:09:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131358#M393487</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T18:09:10Z</dc:date>
    </item>
    <item>
      <title>NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131359#M393488</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To answer a few of your questions first, these interfaces are all customers. With their own unique LAN behind each interface.&amp;nbsp; The static nats are those clients public facing web servers...which is public address provided by us, natted to their own local address.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Most of the time the LAN behind an interface is a Microsoft AD domain, so it's using the local domain controller for DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence the dns parameter doesn't really buy me much.&amp;nbsp; With few exceptions they are rarely using a public DNS server so the reqeust doesn't cross the ASA.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The AUD interface is a client that access a Franklin web server.&amp;nbsp; AUD has the Franklin zone on their Microsoft DNS server, with the local addressing and that nat mentioned above.&amp;nbsp; The only way I could get the combination to work was raise the interface to 95.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will attempt the ACL route after hours and post my results &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 21:39:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131359#M393488</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-02T21:39:01Z</dc:date>
    </item>
    <item>
      <title>NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131360#M393489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can make simply enough basic ACL for every customer interface I guess you could go with the ACL route and simply attach every interface their own ACL. After this you wont have to worry about security-levels anymore. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to modify the ACLs abit but I'd imagine the bulk of the work would be making the initial configurations and modifying the configurations as needed would still be a small problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Each customer interface ACL would probably have to start out with a Deny statement that blocks all traffic to other networks which could be grouped under object-group. (Same object-group for all interface ACLs) If there is traffic between customer interfaces you would naturally just add permitting statements for the wanted service (IP/TCP/UDP and port if TCP or UDP) at the very top of the ACL before the Deny statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 21:45:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131360#M393489</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T21:45:47Z</dc:date>
    </item>
    <item>
      <title>NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131361#M393490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, so I need traffic to go from 192.168.180.0/24 to 192.168.133.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to follow this:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Configure an "object-group network &lt;NAME&gt;"&amp;nbsp; &lt;UL style="border-collapse: collapse; list-style: disc; padding: 0px 0px 0px 2.25em;"&gt;&lt;LI style="border-collapse: collapse; list-style: disc;"&gt;include all the destination networks under this object-group which are located behind interface with higher security-level than the interface you are gonna make the ACL for&lt;/LI&gt;&lt;/UL&gt;&lt;/NAME&gt;&lt;/LI&gt;&lt;LI&gt;Configure the ACL configuration with the following lines&amp;nbsp; &lt;UL&gt;&lt;LI style="border-collapse: collapse; list-style: disc;"&gt;access-list &lt;ACL name=""&gt; remark Deny all Connections to Higher Security Level networks&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; deny ip any object-group &lt;NAME&gt;&lt;/NAME&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Allow all other traffic&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; permit ip &lt;NETWORK&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which in my config I entered as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network Test_Group&lt;/P&gt;&lt;P&gt;network-object 192.168.133.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Testing1 remark Deny all Connections to Higher Security Level networks&lt;/P&gt;&lt;P&gt;access-list Testing1 deny ip any object-group Test_Group&lt;/P&gt;&lt;P&gt;access-list Testing1 remark Allow all other traffic&lt;/P&gt;&lt;P&gt;access-list Testing1 permit ip 192.168.180.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Which in my mind made sense &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input Exchange tcp 192.168.180.26 32000 192.168.133.6 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;MAC Access list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 192.168.133.0&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; AUD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Implicit Rule&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: Exchange&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: AUD&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2013 21:24:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131361#M393490</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-03T21:24:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131362#M393491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you attached the ACL to the interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group Testing1 in interface Exchange&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jan 2013 21:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131362#M393491</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-03T21:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131363#M393492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Clearly I had not, hahahaa.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to attach the packet tracers, since I have a few now.&amp;nbsp; But I did manage to pass traffic eventually from my lower security interface (Exchange) to my higher (AUD)!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm just showing my steps in case i did something completely wrong, but still ended up making it work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In particular I had to remove &lt;STRONG&gt;access-list Testing1 deny ip any object-group Test_Group, &lt;/STRONG&gt;see below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once i applied the acl to Exchange I was still getting dropped due to a configured rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group Testing1 in interface Exchange&lt;/P&gt;&lt;P&gt;access-list Testing1 extended deny ip any object-group Test_Group&lt;/P&gt;&lt;P&gt;access-list Testing1 remark Allow all other traffic&lt;/P&gt;&lt;P&gt;object-group network Test_Group&lt;/P&gt;&lt;P&gt;network-object 192.168.133.0 255.255.255.0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i removed the deny ip any at the start of the Testing1 acl (access-list Testing1 deny ip any object-group Test_Group)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and got the following (progress):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (AUD) 1 192.168.133.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip AUD 192.168.133.0 255.255.255.0 Exchange any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I added &lt;STRONG&gt;static (Exchange,AUD) 192.168.180.0 192.168.180.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That got me to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (AUD) 1 192.168.133.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip AUD 192.168.133.0 255.255.255.0 Exchange any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which in my mind the translation coming back was not correct and added&lt;STRONG&gt; static (AUD,Exchange) 192.168.133.0 192.168.133.0 netmask 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Resulting in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Phase: 13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type: ROUTE-LOOKUP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Subtype: output and adjacency&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Result: ALLOW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Config:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional Information:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;found next-hop 192.168.133.6 using egress ifc AUD&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;adjacency Active&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;AUD is my higher security interface!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing else seems to be broken.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My only concern is did I do the translations appropriately?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By removing &lt;STRONG&gt;access-list Testing1 deny ip any object-group Test_Group &lt;/STRONG&gt;am i creating a giant hole in my firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See attached....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you so much!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To sum up, here's the config i added:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Testing1 permit ip 192.168.180.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-group Testing1 in interface Exchange&lt;/P&gt;&lt;P&gt;static (Exchange,AUD) 192.168.180.0 192.168.180.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (AUD,Exchange) 192.168.133.0 192.168.133.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 14:37:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131363#M393492</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-04T14:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131364#M393493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Some things&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It cant see what your object-group Test_Group containts but I would suspect that you have actually added the AUD network in this group, which you shouldnt have. Though now looking at what I have written to you I have probably not written it in the clearest way. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;UL&gt;&lt;LI&gt;What you could do regarding this is to keep the "deny ip any object-group Test_Group" statement BUT add your "access-list Testing1 line 1 permit tcp 192.168.180.0 255.255.255.0 192.168.133.6 eq 80". This would first allow the connection you need THEN deny all rest to your local networks and THEN allow everything else (which would equal traffic headed to outside)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access-list could look like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Allow specific Traffic to other local networks&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; permit tcp 192.168.180.0 255.255.255.0 host 192.168.133.6 eq 80&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Deny all Connections to Higher Security Level networks&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; deny ip any object-group &lt;NAME&gt;&lt;/NAME&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; remark Allow all other traffic&lt;/ACL&gt;&lt;/LI&gt;&lt;LI&gt;access-list &lt;ACL name=""&gt; permit ip &lt;NETWORK&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/ACL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I think the problem you had with the Static NAT is that you only need the "(AUD,Exchange)" line. To my understanding these type of statics are always done as the higher security-level interface as the source and the lower as the destination&lt;UL&gt;&lt;LI&gt;&lt;P&gt;static (AUD,Exchange) 192.168.133.0 192.168.133.0 netmask 255.255.255.0 &lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;The above command should be bidirectional, as in handle connections from either network/interface&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if the information has been helpfull &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; And naturally ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 14:52:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131364#M393493</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-04T14:52:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131365#M393494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Test_Group DOES contain the AUD network, and nothing else!&amp;nbsp; I had a hard time with that one, but yeah, i couldn't grasp where you were going with it, and just applied it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Well, just applied it as I was interpreting it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll go back and change the ACL to start.&amp;nbsp; Then post back.&amp;nbsp; I have to work on a bunch of other things today so unfortunately it's not going to be till late this afternoon...possibly this weekend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to just back up for a minute, could you possibly clarify what your original intent was for the "object group network &lt;NAME&gt;"&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe i'm missing something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 15:22:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131365#M393494</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-04T15:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131366#M393495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So basically when we consider your setup before you made any changes to your firewall configurations, almost all of your interfaces lacked any "access-list" configurations and only "security-level" value decided what traffic was allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This again lead to the fact that Exchange (90) couldnt not access anything on AUD (95)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when we consider that you configure an ACL to an interface (Exchange) its "security-level" looses its meaning while controlling traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My idea was to build the new ACL rules for the Exchange traffic with the same logic than was with the "security-level" in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would require configuring the new ACL in the following way&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;It should allow the traffic you are going to attempt&lt;/LI&gt;&lt;LI&gt;It should block all traffic to interfaces/networks which have higher "security-level" than Exchange&lt;/LI&gt;&lt;LI&gt;It should allow traffic to all lower "security-level" interfaces/networks&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The object-group is supposed to be an "object-group" that contains all the networks related to the higher "security-level" interfaces. The "permit ip &lt;NETWORK&gt; &lt;MASK&gt; any" is supposed to allow all other traffic.&lt;/MASK&gt;&lt;/NETWORK&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I did forget to write in my above answers was that you need to make an ACL rule at the very top of the new ACL that allows the TCP/80 connection you are attempting from Exchange to AUD. If you didnt the connection would naturally be dropped by the "deny ip any object-group &lt;NAME&gt;" line.&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to I would have entered/added the following configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Define object-group that contains all the networks behind more secure interfaces&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;AUD&lt;/LI&gt;&lt;LI&gt;Lit&lt;/LI&gt;&lt;LI&gt;LV&amp;nbsp; &lt;UL&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network EXCHANGE-BLOCKED-NETWORKS&lt;/P&gt;&lt;P&gt; description Blocked Destination Networks for Exchange&lt;/P&gt;&lt;P&gt; network-object 172.16.0.0 255.255.254.0 &lt;/P&gt;&lt;P&gt; network-object 172.16.2.0 255.255.254.0 &lt;/P&gt;&lt;P&gt; network-object 172.16.4.0 255.255.254.0 &lt;/P&gt;&lt;P&gt; network-object 172.16.8.0 255.255.254.0 &lt;/P&gt;&lt;P&gt; network-object 192.168.31.0 255.255.255.0 &lt;/P&gt;&lt;P&gt; network-object 192.168.35.0 255.255.255.0 &lt;/P&gt;&lt;P&gt; network-object 192.168.42.0 255.255.255.0 &lt;/P&gt;&lt;P&gt; network-object 192.168.112.0 255.255.255.0 &lt;/P&gt;&lt;P&gt; network-object 192.168.220.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.220.16 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.220.17 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.220.18 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.221.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.222.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.224.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.225.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.226.15 255.255.255.255 &lt;/P&gt;&lt;P&gt; network-object 192.168.105.0 255.255.254.0&lt;/P&gt;&lt;P&gt; network-object 192.168.139.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.133.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configure the ACL&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Allow the TCP/80 traffic&lt;/LI&gt;&lt;LI&gt;Deny all other traffic to more secure networks (based on the object-group created before)&lt;/LI&gt;&lt;LI&gt;Allow all traffic which will permit traffic to all less secure interfaces (outside + local)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN remark Allow specific Traffic to other local networks&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN permit tcp 192.168.180.0 255.255.255.0 host 192.168.133.6 eq 80&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN remark Deny all Connections to Higher Security Level networks&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN deny ip any object-group EXCHANGE-BLOCKED-NETWORKS&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN remark Allow all other traffic&lt;/P&gt;&lt;P&gt;access-list EXCHANGE-IN permit ip 192.168.180.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Attach the ACL to interface&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Controls traffic incoming to interface Exchange with the "in" parameter&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group EXCHANGE-IN in interface Exchange&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configure Static NAT to allow connection with the original IP addresses bidirectionally&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (AUD,Exchange) 192.168.133.0 192.168.133.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Gah! I hate how the site changes rows for the ACL lines that are long &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 15:44:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131366#M393495</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-04T15:44:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131367#M393496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Wow.&amp;nbsp; I mean WOW!&amp;nbsp; I was expecting a quick description and I got the motherload!&amp;nbsp; I wasn't even coming close this, you're on such a higher level than me.&amp;nbsp; Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ripped out the config from earlier and I'm going to have at this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm starting to wonder if changing security levels wasn't the way to go to fix my earlier problems and I should have configured access lists on the interfaces instead.&amp;nbsp; It seems logical now.&amp;nbsp; But I inherited this config so I just keep plugging along with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANK YOU!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 21:13:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131367#M393496</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-04T21:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131368#M393498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And actually my LIT interface is at 95 for no reason now that i look at it, so that one i can set back to 90 like the rest. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Certainly making the above config a little smaller.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jan 2013 21:25:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131368#M393498</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-04T21:25:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131369#M393500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You my friend are a firewall GURU!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Jan 2013 13:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131369#M393500</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2013-01-05T13:21:17Z</dc:date>
    </item>
    <item>
      <title>NAT issue across interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131370#M393502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to be of help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Jan 2013 13:26:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-across-interfaces/m-p/2131370#M393502</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-05T13:26:42Z</dc:date>
    </item>
  </channel>
</rss>

