<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two matching auto/object NAT statements which one takes precedence in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130561#M393501</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the title says everything, but I will go into more detail. I want to define an auto NAT as kind of a catch all for the 10.0.0.0 /8&amp;nbsp; subnet. This would be a PAT to the outside interface and look similiar to this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAT-INSIDE-10.0.0.0&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I want a more specific nat for servers in this range, because in realitiy the 10.0.0.0 /8 subnet is broken into several /16 blocks. An example of this would be a server at 10.6.240.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAT-SRV-10.6.240.1&lt;/P&gt;&lt;P&gt;host 10.6.240.1&lt;/P&gt;&lt;P&gt;nat (inside,outside) static x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would take precedence in this situation? Would I get the static NAT I am looking for in this situation or would it get caught by the other auto NAT statement? I would lab this up, but I do not have an ASA to readily do this at the moment. Is there a better way to do this? I'm open to suggestion so please feel free to say what you want. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 00:42:35 GMT</pubDate>
    <dc:creator>Alan Herriman</dc:creator>
    <dc:date>2019-03-12T00:42:35Z</dc:date>
    <item>
      <title>Two matching auto/object NAT statements which one takes precedence</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130561#M393501</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the title says everything, but I will go into more detail. I want to define an auto NAT as kind of a catch all for the 10.0.0.0 /8&amp;nbsp; subnet. This would be a PAT to the outside interface and look similiar to this. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAT-INSIDE-10.0.0.0&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I want a more specific nat for servers in this range, because in realitiy the 10.0.0.0 /8 subnet is broken into several /16 blocks. An example of this would be a server at 10.6.240.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAT-SRV-10.6.240.1&lt;/P&gt;&lt;P&gt;host 10.6.240.1&lt;/P&gt;&lt;P&gt;nat (inside,outside) static x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which would take precedence in this situation? Would I get the static NAT I am looking for in this situation or would it get caught by the other auto NAT statement? I would lab this up, but I do not have an ASA to readily do this at the moment. Is there a better way to do this? I'm open to suggestion so please feel free to say what you want. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130561#M393501</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2019-03-12T00:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: Two matching auto/object NAT statements which one takes prec</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130562#M393503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would remove the default PAT rule and confiure it again with a "minor" modification&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Default PAT Source Networks&lt;/P&gt;&lt;P&gt; network-object 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) &lt;STRONG&gt;after-auto&lt;/STRONG&gt; source dynamic DEFAULT-PAT-SOURCE interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above configuration the Static NAT configuration (under the object) would always take precedence of the Default PAT rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above object-group is not mandatory really but I like configuring it that way since it gives me the option to add/change several source networks without removing any configurations in the process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; If you would even further like to widen the application of the Default PAT rule you could configure "any" instead of "inside" which enable you to configure source networks to the "object-group" no matter which interface had a route for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 16:01:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130562#M393503</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T16:01:10Z</dc:date>
    </item>
    <item>
      <title>Two matching auto/object NAT statements which one takes preceden</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130563#M393504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way you have configured the PAT it would seem that it will not overrule the Static NAT in that format. I would still suggest using the format that I described above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I personally use "object NAT" for Static NAT and Port Forward configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Default PAT configurations I handle like in the above post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And special type situations for example NAT for VPN or Policy NAT (not called that in the new software anymore I guess)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VPN&lt;/STRONG&gt; (NAT0/NAT Exempt)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network LAN&lt;/P&gt;&lt;P&gt; subnet 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network VPN-POOL&lt;/P&gt;&lt;P&gt; subnet 10.10.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static LAN LAN destination static VPN-POOL VPN-POOL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Above would basicly handle that LAN and VPN-POOL subnets could communicate without NAT done to their original IP addresses&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In essence the same as the above&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network DESTINATION&lt;/P&gt;&lt;P&gt; host 8.8.8.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network HOST-LOCAL&lt;/P&gt;&lt;P&gt; host 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network HOST-MAPPED&lt;/P&gt;&lt;P&gt; host 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static HOST-LOCAL HOST-MAPPED destination static DESTINATION DESTINATION&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The above would create a NAT rule that would give a different public IP address (for example) to a single local host IF it was attempting to connect to the host configured under the DESTINATION object. Other destination hosts networks would still hit the default PAT rule.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 16:43:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130563#M393504</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T16:43:11Z</dc:date>
    </item>
    <item>
      <title>Two matching auto/object NAT statements which one takes preceden</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130564#M393505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the quick response and I do like your solution for a default PAT and will probably end up doing it that way. Do you happen to know what the processing order is for NAT commands in the same section? Or maybe point me to some documentation that would have the information? I am really curious as to if all static object NAT statements are processes first or if it is just by running-config order. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 19:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130564#M393505</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2013-01-02T19:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Two matching auto/object NAT statements which one takes prec</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130565#M393506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suggest reading through the ASA configuration guide for your software.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Heres a quote from 8.4 versions which includes pretty much all the information you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H2&gt; NAT Rule Order &lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1090468"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; Network object NAT rules and twice NAT rules are stored in a single&amp;nbsp; table that is divided into three sections. Section 1 rules are applied&amp;nbsp; first, then section 2, and finally section 3. &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_overview.html#wp1124475" rel="nofollow"&gt;Table 29-1&lt;/A&gt; shows the order of rules within each section. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp1124464"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1124475table1124473" style="width: 80%;"&gt;&lt;CAPTION&gt;&lt;A name="wp1124475"&gt;&lt;/A&gt;&lt;A name="wpxref87472"&gt;&lt;/A&gt;&lt;P&gt; Table 29-1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT Rule Table &lt;/P&gt;&lt;/CAPTION&gt; 
&lt;TBODY&gt;&lt;TR align="left" valign="bottom"&gt;&lt;TH scope="col"&gt;&lt;A name="wp1124479"&gt;&lt;/A&gt;&lt;DIV&gt; Table Section &lt;/DIV&gt;&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1124705"&gt;&lt;/A&gt;&lt;DIV&gt; Rule Type &lt;/DIV&gt;&lt;/TH&gt; &lt;TH scope="col"&gt;&lt;A name="wp1124481"&gt;&lt;/A&gt;&lt;DIV&gt; Order of Rules within the Section &lt;/DIV&gt;&lt;/TH&gt; 
&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1124483"&gt;&lt;/A&gt;&lt;P&gt; Section 1 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124707"&gt;&lt;/A&gt;&lt;P&gt; Twice NAT &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124485"&gt;&lt;/A&gt;&lt;P&gt; Applied on a first match basis, in the order they appear in the&amp;nbsp; configuration. By default, twice NAT rules are added to section 1. &lt;/P&gt;&lt;A name="wp1133597"&gt;&lt;/A&gt;&lt;A name="wpmkr1133791"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;If&amp;nbsp; you configure EasyVPN remote, the ASA dynamically adds invisible NAT&amp;nbsp; rules to the end of this section. Be sure that you do not configure a&amp;nbsp; twice NAT rule in this section that might match your VPN traffic,&amp;nbsp; instead of matching the invisible rule. If VPN does not work due to NAT&amp;nbsp; failure, consider adding twice NAT rules to section 3 instead. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1124487"&gt;&lt;/A&gt;&lt;P&gt; Section 2 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124709"&gt;&lt;/A&gt;&lt;P&gt; Network object NAT &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124571"&gt;&lt;/A&gt;&lt;P&gt; Section 2 rules are applied in the following order, as automatically determined by the ASA: &lt;/P&gt;&lt;A name="wp1124575"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt; 1. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Static rules. &lt;/P&gt;&lt;A name="wp1124576"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt; 2. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Dynamic rules. &lt;/P&gt;&lt;A name="wp1124577"&gt;&lt;/A&gt;&lt;P&gt; Within each rule type, the following ordering guidelines are used: &lt;/P&gt;&lt;A name="wp1124578"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt; a. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;Quantity&amp;nbsp; of real IP addresses—From smallest to largest. For example, an object&amp;nbsp; with one address will be assessed before an object with 10 addresses. &lt;/P&gt;&lt;A name="wp1124579"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt; b. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;For&amp;nbsp; quantities that are the same, then the IP address number is used, from&amp;nbsp; lowest to highest. For example, 10.1.1.0 is assessed before 11.1.1.0. &lt;/P&gt;&lt;A name="wp1124580"&gt;&lt;/A&gt;&lt;P&gt; &lt;STRONG&gt; c. &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="10" /&gt;If&amp;nbsp; the same IP address is used, then the name of the network object is&amp;nbsp; used, in alphabetical order. For example, abracadabra is assessed before&amp;nbsp; catwoman. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;A name="wp1124547"&gt;&lt;/A&gt;&lt;P&gt; Section 3 &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124711"&gt;&lt;/A&gt;&lt;P&gt; Twice NAT &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1124549"&gt;&lt;/A&gt;&lt;P&gt; Section 3 rules are applied on a first match basis, in the order they&amp;nbsp; appear in the configuration. You can specify whether to add a twice NAT&amp;nbsp; rule to section 3 when you add the rule. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Default PAT I mentioned is moved to Section 3 with "after-auto" to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The whole document can be found for example at&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_overview.html#wp1118157" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_overview.html#wp1118157&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 20:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130565#M393506</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-02T20:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Two matching auto/object NAT statements which one takes prec</title>
      <link>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130566#M393507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, this was exactly what I was looking for. Thank you very much!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Jan 2013 21:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/two-matching-auto-object-nat-statements-which-one-takes/m-p/2130566#M393507</guid>
      <dc:creator>Alan Herriman</dc:creator>
      <dc:date>2013-01-02T21:12:54Z</dc:date>
    </item>
  </channel>
</rss>

