<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic But I can see the &amp;quot;sh nat&amp;quot;:  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2530000#M416122</link>
    <description>&lt;P&gt;But I can see the "sh nat":&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;match tcp inside host 10.0.3.41 eq 25 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 200.x.x.182/25&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 26617&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;But when you check the header of the emails sent outside t appears&amp;nbsp;the IP address is 200.xx178 (nat of internet)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I just need that traffic is NATed smtp mail server because there are other IP addresses server using the same public IP address, so we performed the PAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Sep 2014 16:01:12 GMT</pubDate>
    <dc:creator>Vianyfel Cordaro</dc:creator>
    <dc:date>2014-09-10T16:01:12Z</dc:date>
    <item>
      <title>ASA 5520 NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2529998#M416119</link>
      <description>&lt;P&gt;I have the following topology:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;mail server --- swcore --(inside) &amp;lt;&amp;lt; &amp;gt;&amp;gt; ASA (outside) --- ISP border router&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; should perform the following nat on the handle of a mail server 10.0.3.41 &amp;nbsp;to &amp;nbsp; 200.x.x.182&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; I have the following configuration on the ASA:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object-group service SERVICES&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 7001&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq ssh&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 25&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 26&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 993&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 109&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 110&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 143&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 220&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 465&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 468&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 587&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 995&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq www&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq domain&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 8080&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 8443&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq https&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service tcp-udp-object eq 135&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq 135&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 7777&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp-udp eq 8090&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq ftp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq ftp-data&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object udp eq ntp&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq sqlnet&amp;nbsp;&lt;BR /&gt;&amp;nbsp; service-object tcp eq 3389&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list outside extended permit object-group SERVICES any host 200.x.x.182&amp;nbsp;&lt;BR /&gt;access-list inside extended permit object-group SERVICES host 10.0.3.41 any&amp;nbsp;&lt;BR /&gt;access-group outside in interface outside&amp;nbsp;&lt;BR /&gt;access-group inside in interface inside&amp;nbsp;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 200.x.x.182 smtp 10.0.3.41 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global&amp;nbsp;(outside) 1 interface&amp;nbsp;&lt;BR /&gt;nat (inside) 1 10.0.0.0 255.0.0.0&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Sniffer was performed interface that goes to the core sw to int inside &amp;nbsp;ASA, and effectively SMTP packets are received from 10.0.3.41 which is the mail server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you execute a "sh nat" does tells you match the .41 port 25 to 200.xx182&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; But when you check the header of the emails sent outside the domain appears&amp;nbsp;the IP address is 200.xx178 with which it is performed the nat for internet company.&lt;/P&gt;&lt;P&gt;&amp;nbsp; For some reason it is entering the nat&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; And I do not understand because if I can see the sh nat does match the static nat.&lt;/P&gt;&lt;P&gt;border router does not perform any function nat actually execute sh ip nat trans and nothing display.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Feb 2020 07:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2529998#M416119</guid>
      <dc:creator>Vianyfel Cordaro</dc:creator>
      <dc:date>2020-02-22T07:25:10Z</dc:date>
    </item>
    <item>
      <title>your static NAT only works</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2529999#M416121</link>
      <description>&lt;P&gt;The static NAT only works for incoming SMTP, not for outgoing. If you want that all outbound traffic from the mailserver is NATted to .182, you should change your static to the following:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;SPAN style="font-size: 14px;"&gt;static (inside,outside)&amp;nbsp;200.x.x.182 10.0.3.41&amp;nbsp;netmask 255.255.255.255&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;This NAT-statement will work inbound and outbound.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 15:51:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2529999#M416121</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-09-10T15:51:11Z</dc:date>
    </item>
    <item>
      <title>But I can see the "sh nat": </title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2530000#M416122</link>
      <description>&lt;P&gt;But I can see the "sh nat":&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;match tcp inside host 10.0.3.41 eq 25 outside any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; static translation to 200.x.x.182/25&lt;BR /&gt;&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 26617&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 14px;"&gt;But when you check the header of the emails sent outside t appears&amp;nbsp;the IP address is 200.xx178 (nat of internet)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I just need that traffic is NATed smtp mail server because there are other IP addresses server using the same public IP address, so we performed the PAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 16:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2530000#M416122</guid>
      <dc:creator>Vianyfel Cordaro</dc:creator>
      <dc:date>2014-09-10T16:01:12Z</dc:date>
    </item>
    <item>
      <title>&gt; But I can see the "sh nat":</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2530001#M416123</link>
      <description>&lt;P style="font-size: 14px;"&gt;&amp;gt; But I can see the "sh nat":&amp;nbsp;&lt;/P&gt;&lt;P&gt;You see the translation that is used for incoming SMTP. It is only defined for traffic where TCP/25 is on your side. When you send mail, TCP/25 is used as the destination-port and your local port is a random port-number. That won't match your static.&lt;/P&gt;&lt;P&gt;If you can't translate the IP completely for the mail-server, you can configure an extra dynamic PAT for the server:&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;nat (inside) 2 10.0.3.41 255.255.255.255&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;global (outside) 2 200.x.x.182&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;The NAT-ID "2" has to be a free ID in your remaining NAT-config.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Sep 2014 16:15:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/2530001#M416123</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2014-09-10T16:15:41Z</dc:date>
    </item>
  </channel>
</rss>

