<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT/routing issue from one subinterface to another in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117240#M395358</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gotcha.&amp;nbsp; I'm a jack of all trades master of none &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might investigate the local dns server a bit more, as I break something there it affects a 20 person office.&amp;nbsp; I mess up the ASA, dozens of different customers feel the pain.&amp;nbsp; And apparently no one knows what a lab is so I'm kind of stuck doing this right in production.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can add an entry, even as a test a host file entry on a workstation, and a route now that i think about it, pointing to the Franklin web server at 192.168.156.20 instead of the public....and if i lowered the security level on Franklin then i should be able to traverse Amherst to Franklin....off the top of my head, still might need to work that out a little better..thanks though!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Nov 2012 16:18:46 GMT</pubDate>
    <dc:creator>WStoffel1</dc:creator>
    <dc:date>2012-11-21T16:18:46Z</dc:date>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117232#M395350</link>
      <description>&lt;P&gt;I have a customer that sits behind an ASA on Int g0/1.143 (sec-level set to 100).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have another customer that sits behind the same firewall on Int g0/1.156 (sec level = 100 as well).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default gateway for each customer is the ip address on the above interfaces, 192.168.143.254 and 192.168.156.254 respectively.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer on 1.156 has a web server that's up and alive on the internet, natted to a public address of 72.46.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customers on 192.168.143.0/24 cannot get to the website.&amp;nbsp; When i tracert from 192.168.143.10 i can see the router that sits on the outside interface of the ASA then it fails, so it's being sent out the default gateway of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am i missing here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks as always.... &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117232#M395350</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2019-03-12T00:25:48Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117233#M395351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you might be missing is a nat command and also the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can share your configuration or atleast the interface configuration, I can suggest you more specific configuration for it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 01:58:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117233#M395351</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-11-21T01:58:39Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117234#M395352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kind of hard to show the whole config, it's enormous, and i have customers behind it.&amp;nbsp; Same security traffic is enabled inter and intra.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the two interfaces are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.143&lt;/P&gt;&lt;P&gt;vlan 143&lt;/P&gt;&lt;P&gt;nameif Amherst&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.143.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1.156&lt;/P&gt;&lt;P&gt;vlan 156&lt;/P&gt;&lt;P&gt;nameif Franklin&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.156.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought it was just similar to another issue I had help resolving last week...i thought i just needed a static nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Amherst,Franklin) 192.168.143.0 192.168.143.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But that didn't work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 02:45:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117234#M395352</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T02:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117235#M395353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to reach the site from behind the ASA (on the LAN) using the public NATed IP of the server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you are trying to test connections or reach it using DNS name?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you have a &lt;STRONG&gt;"dns"&lt;/STRONG&gt; parameter in the &lt;STRONG&gt;"static"&lt;/STRONG&gt; command for server you are trying to reach.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example might be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 1.2.3.4 10.10.10.10 netmask 255.255.255.255 &lt;SPAN style="color: #ff0000;"&gt;dns&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will make it possible to reach the server using the public DNS name from the local LAN. What the ASA will do with the "dns" parameter is that it will see the DNS query go out and the reply come in. It will then modify the DNS reply sent to the client by changing the resolved IP address to the local LAN address of the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though for this to work you will have to be using public DNS server or the server has to be somewhere behind the ASA so that the clients DNS query will be seen by the ASA. If the DNS server is in the same LAN as the client ASA wont see the DNS query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cant simply use the public NAT IP from behind the ASA to connect to the server&amp;nbsp; OR you would possibly have to make NAT configurations that would also affect your access rules between those interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might have understood you incorrectly but it seemed like an issue I just described above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 07:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117235#M395353</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T07:22:16Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117236#M395354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you trying to reach the site from behind the ASA (on the LAN) using the public NATed IP of the server?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;Yes&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I guess you are trying to test connections or reach it using DNS name?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;Yes, dns name.&amp;nbsp; I'm trying to get from one inside interface, to a web page on another inside interface.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is actually eerily similar to another post I have going currently, but I'm having trouble making the leap on the dns resolution/natting problem.&amp;nbsp; So please bear with me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Amherst subinterface above is a complete /24 lan.&amp;nbsp; Meaning it's a customer's office Active Directory domain....and the domain controlller, 192.168.143.10, which of course is all of the clients DNS server.&amp;nbsp; Client dhcp addresses are 192.168.143.100-200.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The web server sits on the Franklin interface, 192.168.156.20 and has a public nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Franklin,outside) 74.11.x.x 192.168.156.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you're saying above is this nat should read:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Franklin,outside) 74.11.x.x 192.168.156.20 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, since the dns query would never leave the 192.168.143.0 network, it's not going to work.&amp;nbsp; Correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 12:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117236#M395354</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T12:56:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117237#M395355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we have run into this problem the most common solution has been to do configuration change on the actual LAN DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess one option is also to do a Static NAT between the 2 LAN interfaces. In other words NAT the Web server LAN address to the public IP address towards the other LAN. In this case you have to take into consideration that all traffic from the LAN initiating the connection have to use the new public Static NAT IP address. It could therefore affect some LAN - to - LAN traffic (not VPN but actual LAN to LAN through the same ASA &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example command would be (with made up IPs and names)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT to outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (lan1,outside) 1.2.3.4 10.10.10.10 netmask 255.255.255.255 dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Static NAT between LANs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (lan1,lan2) 1.2.3.4 10.10.10.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure would a Static Policy NAT be even better. To my understanding it would be done in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WEBSERVER-POLICY-NAT permit tcp host 10.10.10.10 www 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (lan1,lan2) 1.2.3.4 access-list WEBSERVER-POLICY-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;10.10.20.0/24 is the other LAN&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this should work too BUT I can't say for sure as I'm just writing this off my head. The above Static Policy NAT should only apply for the web/http traffic with the Web server, other traffic would use the actual IP address of the server when connecting from the other LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't test this at the moment with an actual ASA so I can't confirm if the above configuration is possible or if it would work. The first option I mentioned should work but as I said it might cause problems between the LANs if the Web server has some other services towards the other LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 14:09:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117237#M395355</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T14:09:42Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117238#M395356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While I digest this, and thanks for all your help by the way, I'm wondering if your first thought isn't the right way to go on this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;When we have run into this problem the most common solution has been to do configuration change on the actual LAN DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what sort of creativity are you thinking there?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking you mean an A record for the web server using the private IP, then an access list to allow HTTP from nameif Amherst-&amp;gt;nameif Frankin?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 14:35:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117238#M395356</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T14:35:47Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117239#M395357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure how the change is configured as I don't handle any kind of IT in my work or anything related to server other than use them &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic idea is just to do the same on the actual DNS server that would have been done on the ASA with the "dns" parameter. Basically a separate configuration that would tell any host/client requesting the IP address with DNS query to contact the local IP address and NOT the public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would atleast eliminate any need to modify the ASA configurations by doing special rules there. I always aim to keep the firewall NAT configurations simple so they don't come back to haunt me later. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I guess the DNS configuration on the DNS server might be a same sort of special setup that might cause problem while troubleshooting if the configuration isnt documented well etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 15:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117239#M395357</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T15:51:08Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117240#M395358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gotcha.&amp;nbsp; I'm a jack of all trades master of none &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I might investigate the local dns server a bit more, as I break something there it affects a 20 person office.&amp;nbsp; I mess up the ASA, dozens of different customers feel the pain.&amp;nbsp; And apparently no one knows what a lab is so I'm kind of stuck doing this right in production.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can add an entry, even as a test a host file entry on a workstation, and a route now that i think about it, pointing to the Franklin web server at 192.168.156.20 instead of the public....and if i lowered the security level on Franklin then i should be able to traverse Amherst to Franklin....off the top of my head, still might need to work that out a little better..thanks though!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 16:18:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117240#M395358</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T16:18:46Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117241#M395359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I feel your pain &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; I'm kinda cautious testing things on our ASAs or FWSMs (A major screw up or run in with a bug in a software can affect up to 200 separate firewalls, though I guess that would be pretty rare occurence) &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Usually have an ASA5505 at hand though and some test Security Contexts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I totally forgot to mention about testing this by changing configuration on the a single clients host file.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "dns" parameter you can naturally also test (if you see any reason for it) by changing some test computers DNS server to public DNS for the tests.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let us know if get this settled and please mark the question answered/rate the answer if you feel its been of help. Always keeps the motivation up for everyone answering on these forums. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 16:26:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117241#M395359</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T16:26:15Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117242#M395360</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh and by the way,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think most ASAs (atleast models 5510 and above) should have available 2 Security Contexts for your use. So if you want to totally overhaul your ASA setup and get 2 virtual firewalls (one for production and one for tests) if would be possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It does naturally take some time/work and changing from single firewall to multiple mode (virtual Security Contexts) will eliminate some features from the ASA depending on your used software. One major example is loosing support for Client VPN. (L2L VPN work only with newest software)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 16:30:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117242#M395360</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T16:30:02Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117243#M395364</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting that you mention that.&amp;nbsp; It's a 5540 in single context mode, but I've noticed there were two contexts available and never paid much attention to it.&amp;nbsp; But the ASA has a secondary and since it's single context i just always thought it was Active/Standby.&amp;nbsp; I didnt set any of this up, i just support it now.&amp;nbsp; But last night it failed over and now trying to figure out why.&amp;nbsp;&amp;nbsp; Then i notice it's Active/Active.&amp;nbsp; But it can't be since Active/Active is only supported in multiple context mode.&amp;nbsp; So i haven't quite made sense of that.&amp;nbsp; But then i see the 2 security contexts you mention and it made me laugh.&amp;nbsp;&amp;nbsp; These forums far outweigh any book i've bought.&amp;nbsp; The main reason we havent been multiple context is the tunnels, we have several dozen L2L.&amp;nbsp; But multiple contexts make much more sense for this environment, considering we're only at 8.04, i didn't even know vpn was supported in newer code.&amp;nbsp; Now completely off topic from where i started, but thanks again for the enlightenment!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 17:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117243#M395364</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T17:48:10Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117244#M395365</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes thank you, I have a bit of testing to do, fortunately with Thanksgiving i have a few days of downtime to work around.&amp;nbsp; I'll post back my results, but yes i need to keep people such as yourself motivated, since i often find myself in unchartered waters.&amp;nbsp; Love the challenge, but to easy to break things!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 17:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117244#M395365</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T17:54:48Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117245#M395366</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would have to agree with &lt;A _jive_internal="true" href="https://community.cisco.com/people/JouniForss" id="jive-21864412164144979937683" style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; outline: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;JouniForss&lt;/A&gt;.&amp;nbsp; Since the firewall is pushing the web trafic out the external interface and then attempting to hairpin back to the .156 interface, more than likely the ASA is going to natively look at the tcp syn-ack process and deny it.&amp;nbsp; Do you have any debugs of the session traffic which you could post?&amp;nbsp; Either way, I would suggest two different options.&amp;nbsp; First could probably be the easiest for future troubleshooting or maintenance and that would be to add an A record on the local DNS server for the .143 subnet so it resolves to the .156 internal IP address of the web server.&amp;nbsp; This is going to force the ASA to recognize the locally connected route of .156 as the destination and route the traffic accordingly.&amp;nbsp; Along with this you will need to add the appropriate ACL's and NAT exempt statement to allow the routing.&amp;nbsp; Something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list AMHERST_ACCESS_IN ext permit tcp 192.168.146.0 255.255.255.0 192.168.156.0 255.255.255.0 eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (AMHERST,FRANKLIN) source static AMHERST_SUBNET AMHERST_SUBNET destintation static FRANKLIN_SUBNET FRANKLIN_SUBNET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other option would be to add a class-map which matches the source traffic of Amherst to the destination of the webserver and add the policy-map which will allow tcp-state-bypass.&amp;nbsp; You could add this rule to the default system service-policy or the interface.&amp;nbsp; Below I have added a link that speaks about tcp-state-bypass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/conns_tcpstatebypass.pdf&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 19:23:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117245#M395366</guid>
      <dc:creator>n_schloemer</dc:creator>
      <dc:date>2012-11-21T19:23:18Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117246#M395367</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;quick question, how would you debug the session traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 21:03:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117246#M395367</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T21:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117247#M395368</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can make the DNS change on the local LAN DNS server to point to the private IP address of the server instead of the public this should be almost enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ofcourse you need to allow the traffic on the access-list in the source interface (unless you have some wider rule already allowing that)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT setup between the interfaces depends on your ASA software. In a 8.3 and newer software you wouldnt need any NAT configurations for this traffic as you wont be doing any NAT and the traffic will be using the client/server actual IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In software 8.2 and below there is a thing called "nat-control" which determines if a NAT is always required or never required. The default setting, if I remember right, is that the "nat-control" is not enabled. (Its not visible in the configuration in this case). Then again if "nat-control" is enabled it will show in the configuration just above the "global" configuration lines. I havent had to deal with this in ages so I might have gotten it completely the wrong way (which setting was default that is)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to capture traffic for a connection you are testing you can do it either at the test computer itself, on the server, in the switches you might have or on the ASA (which I have used alot in recent months to get familiar with using it for troubleshooting)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if we presume that you want to capture only HTTP connections towards the server using (and return traffic) the ASA, you could do following configurations. I also presume you are connecting using the local IP of the server (even though it should work if access rules are OK and there is not some other NAT configuration in the way)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WEB-SERVER-CAPTURE permit tcp host &lt;CLIENT ip=""&gt; host &lt;ACTUAL server="" ip=""&gt;&lt;/ACTUAL&gt;&lt;/CLIENT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list WEB-SERVER-CAPTURE permit tcp host &lt;ACTUAL server="" ip=""&gt; host &lt;CLIENT ip=""&gt;&lt;/CLIENT&gt;&lt;/ACTUAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture WEB-SERVER-CAPTURE type raw-data packet-length 1522 access-list WEB-SERVER-CAPTURE interface Amherst buffer 33500000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the amount of data captured by the above configuration by using command &lt;STRONG&gt;"show capture". &lt;/STRONG&gt;The capture wont show in the "show run" output of ASA. Only with "show capture" command. If the ASA happens to boot the capture will be removed also.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"buffer" &lt;/STRONG&gt;parameter sets the amount of memory used for storing data. I'm using almost the maximum amount ASA allows per capture.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"circular-buffer" &lt;/STRONG&gt;tells the ASA to overwrite the old data if the memory amount set with "buffer" is exceeded. Otherwise the capture will stop when buffer is full.&amp;nbsp; Access-list and Capture name dont have to match but I usually do it that way.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can show the capture data with &lt;STRONG&gt;"show capture &lt;CAPTURE name=""&gt;"&lt;/CAPTURE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I would suggest using Wireshark software for opening the capture file.&amp;nbsp; For this you need to copy the file from ASA to your computer with TFTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:WEB-SERVER-CAPTURE t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/filename.pcap" rel="nofollow"&gt;ftp://x.x.x.x/filename.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use Wireshark for capturing traffic on the computer you install it&amp;nbsp; on ofcourse (I guess you might be familiar with this already,&amp;nbsp; personally I havent used it for a long time even if it is a very basic&amp;nbsp; tool for networking)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To remove the capture use the command &lt;STRONG&gt;"no capture &lt;CAPTURE name=""&gt;"&lt;/CAPTURE&gt;&lt;/STRONG&gt;. Notice though that this command will also delete the captured data from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you dont want to go quite so deep you can simple watch the ASA logs through ASDM, ASA CLI or better yet Syslog server. Logging level on ASA would need to be atleast "informational" so that you can see the messages related to connection forming and closing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 21:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117247#M395368</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-21T21:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117248#M395369</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was thinking wireshark and packet captures would be a last resort, maybe i'm at that point then as nothing seems to be working.&amp;nbsp; But i just got a little hope...by the way i'm running asa804-k8.bin &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've made no dns changes locally yet but when i'm on a server on the Amherst lan, 192.168.143.10, and i try to ping the web server on the Franklin lan, 192.168.156.10, the requests time out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i added, based on your above&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Static NAT to outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;static (lan1,outside) 1.2.3.4 10.10.10.10 netmask 255.255.255.255 dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Franklin,outside) 74.11.x.x 192.168.156.10 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;Static NAT between LANs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;static (lan1,lan2) 1.2.3.4 10.10.10.10 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Franklin,amherst) 74.11.x.x 192.168.156.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 constant pings running now and i see log file entries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the local addressing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 21 2012 17:30:18: %ASA-3-305006: portmap translation creation failed for icmp src amherst:192.168.143.10 dst Franklin:192.168.156.10 (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Likewise the ping to the Public url yields:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nov 21 2012 17:31:34: %ASA-3-305006: portmap translation creation failed for icmp src amherst:192.168.143.10 dst Franklin:74.11.x.x (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm wondering if your lan1 and lan2 are matching up with my amherst and Franklin lans, respectively.&amp;nbsp; Or do i have things backwards?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2012 22:49:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117248#M395369</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-21T22:49:28Z</dc:date>
    </item>
    <item>
      <title>NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117249#M395370</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Seems to be some problem with NAT configurations then.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We still havent seen your configurations though so I can't say anything for sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would suggest would be to leave the server to outside Static NAT with the DNS parameter added and remove the Static NAT server to other lan to return to a normal situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would first try the DNS changes before trying anything else. At the least use a test computer in the LAN where you need to connect from and use a public DNS server and see if you can connect then to the server by using DNS name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also post the ASA configurations and remove the sensitive information if there is some.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco explanation for your log message ID&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt; 305006 &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;A name="wp4770953"&gt;&lt;/A&gt;&lt;A name="wpxref23100"&gt;&lt;/A&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-3-305006: {outbound static|identity|portmap|regular) translation 
creation failed for &lt;EM style="font-style: italic;"&gt;protocol&lt;/EM&gt; src &lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM style="font-style: italic;"&gt;:&lt;/EM&gt;source_address&lt;EM style="font-style: italic;"&gt;/&lt;/EM&gt;source_port 
[(&lt;EM&gt;idfw_user&lt;/EM&gt;)] dst &lt;EM&gt;interface_name&lt;/EM&gt;&lt;EM style="font-style: italic;"&gt;:&lt;/EM&gt;dest_address&lt;EM style="font-style: italic;"&gt;/&lt;/EM&gt;dest_port [(&lt;EM&gt;idfw_user&lt;/EM&gt;)]
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp4770957"&gt;&lt;/A&gt;&lt;A name="wpmkr4770954"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Explanation&amp;nbsp;&amp;nbsp;&amp;nbsp; A protocol (UDP, TCP, or ICMP) failed to create a translation through the ASA. The&amp;nbsp; ASA does not allow packets through that are destined for network or broadcast addresses. The ASA&amp;nbsp; provides this checking for addresses that are explicitly identified with static commands. For&amp;nbsp; inbound traffic, the ASA denies translations for an IP address identified as a network or broadcast&amp;nbsp; address. &lt;/P&gt;&lt;P&gt;&lt;A name="wp4770971"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; The ASA does not apply PAT to all ICMP message types; it only applies&amp;nbsp; PAT ICMP echo and echo-reply packets (types 8 and 0). Specifically, only&amp;nbsp; ICMP echo or echo-reply packets create a PAT translation. As a result,&amp;nbsp; when the other ICMP messages types are dropped, this message is&amp;nbsp; generated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp4770978"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; The ASA uses the global IP address and mask from configured static&amp;nbsp; commands to differentiate regular IP addresses from network or&amp;nbsp; broadcast IP addresses. If the global IP address is a valid network&amp;nbsp; address with a matching network mask, then the ASA does not create a&amp;nbsp; translation for network or broadcast IP addresses with inbound packets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp4770982"&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt; For example: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A name="wp4770983"&gt;&lt;/A&gt; &lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;DIV&gt;
&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.1.1.128 netmask 255.255.255.128
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp4770984"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;DIV&gt; &lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp4770985"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;P&gt; The ASA responds to global address 10.2.2.128 as a network address and&amp;nbsp; to 10.2.2.255 as the broadcast address. Without an existing translation,&amp;nbsp; the ASA denies inbound packets destined for 10.2.2.128 or 10.2.2.255,&amp;nbsp; and logs this message. &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp4770989"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;P&gt; When the suspected IP address is a host IP address, configure a separate static command with a host mask in front of the subnet &lt;STRONG&gt;static&lt;/STRONG&gt; command (the first match rule for static commands). The following &lt;STRONG&gt;static&lt;/STRONG&gt; commands cause the ASA to respond to 10.2.2.128 as a host address: &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp4770993"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;DIV&gt;
&lt;PRE&gt;&lt;STRONG&gt;static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.255 
static (inside,outside) 10.2.2.128 10.2.2.128 netmask 255.255.255.128
&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp4770994"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;DIV&gt; &lt;/DIV&gt;
&lt;P&gt;&lt;A name="wp4770995"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;P&gt; The translation may be created by traffic started from the inside host&amp;nbsp; with the IP address in question. Because the ASA views a network or&amp;nbsp; broadcast IP address as a host IP address with an overlapped subnet&amp;nbsp; static configuration, the network address translation for both &lt;STRONG&gt;static&lt;/STRONG&gt; commands must be the same. &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;A name="wp4770999"&gt;&lt;/A&gt; &lt;/P&gt;
&lt;P&gt;Recommended Action&amp;nbsp;&amp;nbsp;&amp;nbsp; None required. &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2012 06:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117249#M395370</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-11-22T06:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117250#M395371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, posting my config is going to take some work, it's 1900 lines long and there's a lot of stuff i can't post publicly, but I'm afraid to make changes sense i may change something relevant.&amp;nbsp; However i will work on that today.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i had an interesting thing i just noticed.&amp;nbsp; I got back on that server, having not changed anything since i left it Wednesday, and went to ping that website, it's coming back as the local private address.&amp;nbsp; I can still get to the website externally so the web site is still up...meaning it's still using the public address elsewhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So something in this translation is working?&amp;nbsp; The server is point to 4.2.2.2 for dns.&amp;nbsp; And I have to say it's very odd to see a windows server responding back from a public DNS server with a private address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2012 15:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117250#M395371</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-23T15:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT/routing issue from one subinterface to another</title>
      <link>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117251#M395373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok actually that wasn't so bad to go through.&amp;nbsp; I removed all of my other customers subinterfaces and access lists, as well as the crypto and I think it's ok.&amp;nbsp; Any questions on anything i changed just let me know.&amp;nbsp; Also note, i left the real vlan and private subnet for Amherst and Franklin this time, so this is the actual config.&amp;nbsp; I'm trying to get hosts on 192.168.133.0 to the webserver at 192.168.146.10.&amp;nbsp; The webservers public address is network-object host x.x.122.45&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2012 16:41:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-routing-issue-from-one-subinterface-to-another/m-p/2117251#M395373</guid>
      <dc:creator>WStoffel1</dc:creator>
      <dc:date>2012-11-23T16:41:10Z</dc:date>
    </item>
  </channel>
</rss>

