<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5510 subinterfaces+NAT nightmare in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112631#M394603</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your post. In fact, it was the solution. The outgoing traffic is routed according to the routing table. The ISP router is the default gateway for all the outgoing routes. So, if the traffic is for Host_SFTP or Host_Spamfilter, it's routed back according to the route configured for the appropriate interface, namely Outside for Host_SFTP and Host_Spamfilter. On the Outside interface, there's a default route with outgoing interface Outside and next hop 192.168.0.3 (the ISP's router side of the physical link). And for Host_E2CWeb, on the Outside_3, there's a default route with next hop 192.168.2.1, the ISP's router side of the subinterface. Everything is working so I think this is a possible correct design. Maybe there are others but this one is working fine. The goal by configuring subinterfaces was to separate different traffics on different VLANs. I&amp;nbsp; went even further by configuring subinterfaces for traffic bound to Host_SFTP and Host_Spamfilter. I can access open services on those servers from the inside and from&amp;nbsp; the outside and no others services. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you to all of you for your contributions, you are just wonderful!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Dec 2012 10:22:02 GMT</pubDate>
    <dc:creator>Leader1980</dc:creator>
    <dc:date>2012-12-12T10:22:02Z</dc:date>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112615#M394578</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an ASA 5510 firewall and in our DMZ we have a server listening on port 443. For this server, we already have a public IP address on the ISP' router. All the traffic to this IP address on port 443 is natted to the ASA's outside interface on port 443.&amp;nbsp; So far, everything is working fine. &lt;/P&gt;&lt;P&gt;We'd like to add another server listening on this same port (443). To do so, we have obtained from our ISP a second public IP address for the second server. As the two servers must be listening on the same port, we have configured a subinterface on the outside interface of the firewall and the ISP has done so as well. We can ping each other on this VLAN, so there is no connectivity issue between us. The ISP's router is natting (and patting) the traffic on the second public IP address to the IP address on the subinterface. We have added an access rule to allow incoming traffic on this subinterface and&amp;nbsp; a NAT rule to send this traffic to the server in the DMZ on port 443. &lt;/P&gt;&lt;P&gt;But despite the access rule, https traffic on the subinterface is being denied by the implicit rule on this interface as shown in the logs below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why is the explicit rule on the interface is not being applied? I'm hopeless, I need your help&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112615#M394578</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2019-03-12T00:33:48Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112616#M394581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check that the &lt;STRONG&gt;source and destination&lt;/STRONG&gt; interfaces &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; settings isnt identical. Think I just had something like this I was wondering as I had copy/pasted one interface configuration without changing the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are try adding commands line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or simply change the &lt;STRONG&gt;"security-level"&lt;/STRONG&gt; to not match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 17:00:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112616#M394581</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-06T17:00:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112617#M394583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni, &lt;/P&gt;&lt;P&gt;Thank you very much for your quick reply. As it's night here in Europe, I'll try this solution tomorrow and let you know if it works. Thanks again for your consideration&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2012 22:33:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112617#M394583</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-06T22:33:42Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112618#M394586</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have changed the security level on the subinterface to a different value from those of the physical outside interface and the DMZ but the traffic is still being denied. In fact, traffic is being dropped as it hits the subinterface from the ISP's router. It's never routed from one of the ASA's interfaces to another. &lt;/P&gt;&lt;P&gt;Has anyone come across this kind of issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 08:36:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112618#M394586</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-07T08:36:26Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112619#M394589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Syslog message description from Cisco says the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H3&gt; 710003 &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;A name="wp5849847"&gt;&lt;/A&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-3-710003: {TCP|UDP} access denied by ACL from 
&lt;EM&gt;source_IP/source_port&lt;/EM&gt; to &lt;EM&gt;interface_name&lt;/EM&gt;:&lt;EM&gt;dest_IP/service
&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt; &lt;A name="wp5849853"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; The ASA denied an attempt to connect to the interface service. For example, the ASA&amp;nbsp; received an SNMP request from an unauthorized SNMP management station. If this message&amp;nbsp; appears frequently, it can indicate an attack. &lt;/P&gt;
&lt;P&gt; &lt;A name="wp6007831"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt; For example: &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt; &lt;A name="wp6007832"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;PRE&gt;%ASA-3-710003: UDP access denied by ACL from 95.1.1.14/5000 to outside:95.1.1.13/1005
&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt; &lt;A name="wp6198707"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;DIV&gt; &lt;/DIV&gt;
&lt;P&gt; &lt;A name="wp5849854"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; Use the &lt;STRONG&gt;show run http&lt;/STRONG&gt;, &lt;STRONG&gt;show run ssh&lt;/STRONG&gt;, or &lt;STRONG&gt;show run telnet&lt;/STRONG&gt; commands to verify&amp;nbsp; that the ASA is configured to permit the service access from the host or network. &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not totally sure but usually when you see a Deny log message that doesnt specify any ACL thats blocking the connection attempt the problem is usually related to some other ASA configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I find it quite strange that when the ISP has given you another public IP address that you would have to configure a new subinterface for it on ASA. So I'm kinda doubtful of that thing alone already. Add to that the fact that the ISP is doing some sort of port forwarding NAT before your ASA. Seems quite complicated scenario for 2 public IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without knowing the actual ASA configuration and the ISP setup I'm not sure how much I can really help with this situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 09:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112619#M394589</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-07T09:45:21Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112620#M394591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Never seen a setup like this &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; But guess theres first time for everything&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I looked correctly the below configuraitons lines should be the ones you are referring to regarding to the NAT&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;First one would be the one thats working&lt;/LI&gt;&lt;LI&gt;Second would be the one you are trying to get working&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;static (Internal,Outside) tcp interface https Host_MAIL01 https netmask 255.255.255.255 &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;static (Outside_3,DMZ) Host_E2CWeb&amp;nbsp; access-list Outside_3_nat_static &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first one you have done as basic Portforward configuration using the "Outside" interface IP. The second one is a Static Policy NAT which to my understanding is supposed to NAT traffic coming from certain outside host to the Outside_3 interface IP. The source host would be NATed to a IP address which is part of the DMZ network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a specific reason you have not done the configuration the same way as the last Port Forward configuration for port TCP/443?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean like&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;static (DMZ,Outside_3) tcp interface https &lt;DMZ host=""&gt; https netmask 255.255.255.255&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Still to my eye this setup is looking a really complex thing to manage when the ISP could simply change the setup so that you can actually use the public IPs directly on your firewall and avoid all the special setups. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What kind of device is there in front of the firewall at the moment? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 13:08:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112620#M394591</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-07T13:08:52Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112621#M394593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your quick reply. In fact the configuration was done through the ASDM and I followed what's in the doc to yield this configuration. I can change the NAT rule to have exactly the same thing as on the physical interface but I am not sure it'll change anything as this is a nat rule and it comes far bahind the access rule, which is the rule being applied here. Our current contract with the ISP only allow us the use of some services on their public IP addresses, not all the services. So they can only forward those services to us. I don't think I have the power to change this, unfortunately. But when you look at the ACLs on the the Outside and Outside_3 interfaces, what's wrong with that? Why is the traffic to Outside_3 not being granted access?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 13:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112621#M394593</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-07T13:44:25Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112622#M394594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your current new Static Policy NAT is configured to do the following&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When the host 81.247.191.241 connects to host 192.168.3.2 (interface) --&amp;gt; Translate host IP 81.247.191.241 to host IP 172.16.2.5&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would first try to change the NAT configuration to match the way the previous one is configured and try again with the same ACL rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So maybe try to remove the current NAT rule and replace it with the below one and test connections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,Outside_3) tcp interface https &lt;DMZ host=""&gt; https netmask 255.255.255.255&lt;/DMZ&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could also test it with the "packet-tracer" command in CLI and copy the output here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input Outside_3 tcp 1.1.1.1 1025 192.168.3.2 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it has no effect you can just return back to the old one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 14:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112622#M394594</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-07T14:49:57Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112623#M394595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the log message, Cisco document says the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H3&gt; 305013 &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;A name="wp6175477"&gt;&lt;/A&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-5-305013: Asymmetric NAT rules matched for forward and reverse 
flows; Connection &lt;EM&gt;protocol&lt;/EM&gt; src &lt;EM&gt;interface_name&lt;/EM&gt;:&lt;EM&gt;source_address&lt;/EM&gt;/&lt;EM&gt;source_port&lt;/EM&gt; dst 
&lt;EM&gt;interface_name&lt;/EM&gt;:&lt;EM&gt;dst_address&lt;/EM&gt;/&lt;EM&gt;dst_port&lt;/EM&gt; denied due to NAT reverse path failure.
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt; &lt;A name="wp6175670"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; An attempt to connect to a mapped host using its actual address was rejected. &lt;/P&gt;
&lt;P&gt; &lt;A name="wp6175738"&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; When not on the same interface as the host using NAT, use the mapped address&amp;nbsp; instead of the actual address to connect to the host. In addition, enable the &lt;STRONG&gt;inspect&lt;/STRONG&gt; command if the&amp;nbsp; application embeds the IP address. &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above explanation/recomendation text lead to believe that the connect was attempted using the actual IP address of the server and not the mapped/NAT address. Hmm....&lt;SPAN __jive_emoticon_name="plain" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And just to confirm something&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is your situation the following?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IPS is using 2 public IP addresses on their network devices&lt;/LI&gt;&lt;LI&gt;Both of the 2 public IP addresses have been configured the forward the port TCP/443 in the following way&lt;UL&gt;&lt;LI&gt;x.x.x.x/443 -&amp;gt; 192.168.0.2/443&lt;/LI&gt;&lt;LI&gt;y.y.y.y/443 -&amp;gt; 192.168.3.2/443&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the above is true I would perhaps even try something else (but you might have to save the current configuration or atleast take not what you have changed if you want to revert back)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would suggest trying (if the above situation regarding the ISP is correct)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remove all the Subinterfaces&lt;UL&gt;&lt;LI&gt;Ethernet0/0.1&lt;/LI&gt;&lt;/UL&gt;&lt;UL&gt;&lt;LI&gt;Ethernet0/0.2&lt;/LI&gt;&lt;LI&gt;Ethernet0/0.3&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Configure a new Port Forward in the following way&lt;UL&gt;&lt;LI&gt;static (DMZ,Outside) tcp 192.168.0.3 443 &lt;DMZ server="" actual="" ip=""&gt; netmask 255.255.255.255&lt;/DMZ&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Configure the "Outside" interface ACL to allow connections to the IP address 192.168.0.3&lt;/LI&gt;&lt;LI&gt;Ask your ISP to forward the new public IP addresses port TCP/443 to the new IP address configured in the NAT (192.168.0.3)&lt;/LI&gt;&lt;LI&gt;Change any other configurations that might be needed between yours and the ISPs devices&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 15:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112623#M394595</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-07T15:31:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112624#M394596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Aziza,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to be asymmetric nat is due to below statements.&lt;/P&gt;&lt;PRE style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; overflow: auto;"&gt;access-list DMZ_nat0_outbound extended permit ip host Host_E2CWeb any &lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; overflow: auto;"&gt;nat (DMZ) 0 access-list DMZ_nat0_outbound&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any chance to remove the above ACL temperory and give a try? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With Regards,&lt;/P&gt;&lt;P&gt;Safwan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 15:52:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112624#M394596</guid>
      <dc:creator>Muhammed Safwan</dc:creator>
      <dc:date>2012-12-07T15:52:56Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112625#M394597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess we're close to the solution. Yes we'd like to achieve this situation :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;x.x.x.x/443 -&amp;gt; 192.168.0.2/443&lt;/LI&gt;&lt;LI&gt;y.y.y.y/443 -&amp;gt; 192.168.3.2/443&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt; If it works, then we'll add other services on the other subinterfaces. So we can leave those, as there is no configuration on them. The ISP techs have done the appropriate changes because traffic is hitting the right interface on the right port.&lt;/P&gt;&lt;P&gt;I'm on holiday on Monday. I'll try this on Tuesday and let you know.&lt;/P&gt;&lt;P&gt;It's very kind of you helping me sort out this issue. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 15:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112625#M394597</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-07T15:54:40Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112626#M394598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT0 that Safwan mentioned would seem to be the cause&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Didnt even notice it myself. Better try that first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 15:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112626#M394598</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-12-07T15:57:00Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112627#M394599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp; guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give it a try on Tuesday and get back to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're so helpful, thanks for your effort&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Dec 2012 16:00:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112627#M394599</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-07T16:00:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112628#M394600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It works now. It was a routing problem. We needed to add another static route on the interface Outside_3 to allow outgoing traffic to be routed on the appropriate interface. Thank you so much for your help, you are my heros &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 13:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112628#M394600</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-11T13:46:37Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112629#M394601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm afraid your problems are still just starting due to bad design and I don't think this will be a working solution. What are your routes at present? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Suppose a client from 81.247.191.241&amp;nbsp; or any other public address sends requests to your webserver. Then it sends traffic to Host_Spamfilter or Host_SFTP. How does the firewall route the return traffic? The routing is destination-based (slightly changed in 8.3 by route-lookup command) so the packets will choose between Outside and Outside_3 based on the routing table. Unless the ISP router handles this by NATing the client source addresses per interface, this causes asymmetric traffic, packet drops or connection failures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The simple design without contradictions would be using a single outside interface utilizing multiple outside private addresses from the same subnet (192.168.0.x) and having a static PAT for each published service as JouniForss suggested.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 22:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112629#M394601</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-11T22:09:43Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112630#M394602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually, this is my assumption as I haven't encountered a similar setup yet. However, ASA 8.3 documentation states that &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"ASA uses the NAT configuration to determine the egress interface. (8.3(1) through 8.4(1)) "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the interface the translated packet will use to leave the firewall&amp;nbsp; will be determined by your NAT rule destination interface, and NOT THE ROUTING TABLE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the 8.2 docs don't mention this topic, the ASA&amp;nbsp; &lt;STRONG&gt;may&lt;/STRONG&gt; use a similar method. This is what may be saving you even with this setup and cause things to work. You will need extreme caution with the route-lookup keyword when you switch to a newer software version. I would still suggest migrating to the simple setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2012 22:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112630#M394602</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-11T22:32:16Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112631#M394603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your post. In fact, it was the solution. The outgoing traffic is routed according to the routing table. The ISP router is the default gateway for all the outgoing routes. So, if the traffic is for Host_SFTP or Host_Spamfilter, it's routed back according to the route configured for the appropriate interface, namely Outside for Host_SFTP and Host_Spamfilter. On the Outside interface, there's a default route with outgoing interface Outside and next hop 192.168.0.3 (the ISP's router side of the physical link). And for Host_E2CWeb, on the Outside_3, there's a default route with next hop 192.168.2.1, the ISP's router side of the subinterface. Everything is working so I think this is a possible correct design. Maybe there are others but this one is working fine. The goal by configuring subinterfaces was to separate different traffics on different VLANs. I&amp;nbsp; went even further by configuring subinterfaces for traffic bound to Host_SFTP and Host_Spamfilter. I can access open services on those servers from the inside and from&amp;nbsp; the outside and no others services. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you to all of you for your contributions, you are just wonderful!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 10:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112631#M394603</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-12T10:22:02Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112632#M394604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I'm glad that it works but don't think that either default route belong to Host_Spamfilter or Host_E2CWeb. Just copy here your default routes: they contain next hop and interface but no referrals to inside zones or servers. Routes are for packets and they don't contain server-based dependencies. ASA routing engine does NOT match the reply packets to leave the box on the same outside interface where the requests came. It is simply destination-based. That is, an outbound request packet&amp;nbsp; (outgoing HTTP request from your server or desktop) may have problems on which route to choose. I still assume the undocumented NAT preference over routing table lets the outgoing reply packets to find their way which I regard as sort of luck.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 22:50:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112632#M394604</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2012-12-12T22:50:33Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 subinterfaces+NAT nightmare</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112633#M394605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There's no reference to inside zones. What I meant is that each service has a dedicated outside subinterface for the incoming traffic and the outgoing traffic refers to the subinterface as the egress interface and the ISP's router subinterface as the next hop. There is no matter of luck, because if it just doesn't work if I don't correctly configure default routes per subinterfaces. Subinterfaces are on different VLANs so the don't "see" each others. I don't see another way to configure default routes, apart from doing it by subinterface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 23:22:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-subinterfaces-nat-nightmare/m-p/2112633#M394605</guid>
      <dc:creator>Leader1980</dc:creator>
      <dc:date>2012-12-12T23:22:40Z</dc:date>
    </item>
  </channel>
</rss>

