<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source nat from inbound traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036427#M398612</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gustavo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of using an object NAT you need&amp;nbsp; a Manual NAT (Twice NAT); this this will give you the opportunity to NAT the source and destination of the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-network host-10.11.0.31_1&lt;/P&gt;&lt;P&gt;host 10.11.0.31&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-network&amp;nbsp; host-1.1.1.10&lt;/P&gt;&lt;P&gt;host 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source dynamic any interface destination static host-1.1.1.10 host-10.11.0.31_1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will do the trick!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 27 Sep 2012 22:21:32 GMT</pubDate>
    <dc:creator>Luis Silva Benavides</dc:creator>
    <dc:date>2012-09-27T22:21:32Z</dc:date>
    <item>
      <title>Source nat from inbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036426#M398611</link>
      <description>&lt;P&gt;Hi there ... I need some help figuring out how to do nat of the source of inbound traffic&lt;/P&gt;&lt;P&gt;Here's the idea&lt;/P&gt;&lt;P&gt;I've a WWW server published to internet (with is NAT set to be accessible with a public IP). This ASA is not the default gateway of the www server, as there are other ASA and links in the network&lt;/P&gt;&lt;P&gt;So, what I need is that any traffic getting inbound to the WWW server gets out through the ASA ... I'd like to NAT the public IP of the client accessing the www server to the inside interface (ideally) or any other internal IP that ASA will respond ARP request, so www sends the traffic through this ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried different options of natting, but no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;www (10.11.0.31) -------------&amp;nbsp;&amp;nbsp; (10.11.0.3) ASA internal ---- ASA outside (1.1.1.5) ------------&amp;nbsp; users (any)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat for www&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network host-10.11.0.31&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 10.11.0.31&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat(internal,ouside) static 1.1.1.10&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:00:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036426#M398611</guid>
      <dc:creator>Gustavo Villegas</dc:creator>
      <dc:date>2019-03-12T00:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Source nat from inbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036427#M398612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Gustavo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead of using an object NAT you need&amp;nbsp; a Manual NAT (Twice NAT); this this will give you the opportunity to NAT the source and destination of the packet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-network host-10.11.0.31_1&lt;/P&gt;&lt;P&gt;host 10.11.0.31&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-network&amp;nbsp; host-1.1.1.10&lt;/P&gt;&lt;P&gt;host 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source dynamic any interface destination static host-1.1.1.10 host-10.11.0.31_1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will do the trick!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 22:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036427#M398612</guid>
      <dc:creator>Luis Silva Benavides</dc:creator>
      <dc:date>2012-09-27T22:21:32Z</dc:date>
    </item>
    <item>
      <title>Re: Source nat from inbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036428#M398613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically what we are telling the ASA here is that when it receives a packets going to 1.1.1.10 translate the source of the traffic to the inside interface of the ASA (something well known for&amp;nbsp; the server).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Luis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 22:25:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036428#M398613</guid>
      <dc:creator>Luis Silva Benavides</dc:creator>
      <dc:date>2012-09-27T22:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Source nat from inbound traffic</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036429#M398614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Luis ... thanks for your reply, Accept my apologies for not getting back to you earlier&lt;/P&gt;&lt;P&gt;I was able to test this today, and effectively, your advice did the trick&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot ... I guess I still need to learn quite a bit&amp;nbsp; about new NAT settings &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Oct 2012 20:51:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036429#M398614</guid>
      <dc:creator>Gustavo Villegas</dc:creator>
      <dc:date>2012-10-02T20:51:08Z</dc:date>
    </item>
    <item>
      <title>Hi Luis!</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036430#M398615</link>
      <description>&lt;P&gt;Hi Luis!&lt;/P&gt;
&lt;P&gt;I have a similar issue, with a different twist. On ASA 9.5.&lt;/P&gt;
&lt;P&gt;HostA@192.168.224.4:22 -- (internal-network) -- (inside 192.168.232.4) ASA (192.168.235.4 outside) 192.168.235.4:2022 ----- Internet&lt;/P&gt;
&lt;P&gt;I need packets sourced from internet TO 192.168.235.4:2022 (outside of ASA) to be port mapped to 192.168.224.22. That's done with this :&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network obj_192.168.224.6&lt;BR /&gt; nat (inside,outside) static interface service tcp ssh 2022&lt;/PRE&gt;
&lt;P&gt;Now, the interesting part is that I ALSO need traffic from the internet to be SOURCE NATted to the inside interface of the ASA (192.168.232.4). I've tried :&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (outside,inside) source dynamic interface ! with no luck...&lt;/PRE&gt;
&lt;P&gt;Also tried your suggestion, it seemed to have worked when doing packet-tracer BUT actual traffic does not log counters against "sh nat". Any idea what I might not be doing right?&lt;/P&gt;
&lt;P&gt;In my case, your suggested ended up being :&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;SPAN&gt;object network host_192.168.224.6&lt;BR /&gt; host 192.168.224.6&lt;BR /&gt;nat (outside,inside) source dynamic any interface destination static host_192.168.224.6 host_192.168.224.6&lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 09 Oct 2016 04:31:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036430#M398615</guid>
      <dc:creator>om2010</dc:creator>
      <dc:date>2016-10-09T04:31:21Z</dc:date>
    </item>
    <item>
      <title>Hi Olivier,</title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036431#M398616</link>
      <description>&lt;P&gt;Hi Olivier,&lt;/P&gt;
&lt;P&gt;Do you see the packets arriving to the outside interface if you place a capture? Could you please add the trace keyword when you create the packet capture?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then when you see the first packet(syn) run the command&lt;/P&gt;
&lt;P&gt;Show cap &amp;lt;nameofcapture&amp;gt; packet-number 1 trace&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you could post this output with the output of a regular packet tracer will be great. You can also email it directly to me (luissilv@cisco.com)&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Luis&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Oct 2016 05:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036431#M398616</guid>
      <dc:creator>Luis Silva Benavides</dc:creator>
      <dc:date>2016-10-09T05:14:47Z</dc:date>
    </item>
    <item>
      <title>Fixed with </title>
      <link>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036432#M398617</link>
      <description>&lt;P&gt;Fixed with&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN&gt;&lt;SPAN class="pln"&gt;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;outside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; source &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;dynamic&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; any &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;interface&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; destination &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN style="color: #ff6600; font-size: 14pt;"&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt; interface&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; host_192&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;168.224&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;6&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;works!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2016 03:50:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat-from-inbound-traffic/m-p/2036432#M398617</guid>
      <dc:creator>om2010</dc:creator>
      <dc:date>2016-10-10T03:50:11Z</dc:date>
    </item>
  </channel>
</rss>

