<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic outside nat in asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716718#M421668</link>
    <description>&lt;P&gt;Hi guys i am a bit confused, please help me ..&lt;/P&gt;&lt;P&gt;RTR2----(Outside)ASA(Inside)----Rtr1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the outside n/w range is 192.168.1.0/24 with Rtr2 having .2 and ASA having .1&lt;/P&gt;&lt;P&gt;the inside n/w range is 192.168.2.0 with asa having .1 and Rtr1 hving .2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now i want to perform dynamic outside nat for Rtr2.&lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0 outside &lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;i knw that outside keyword is used for outside nat , and when i try to configure &lt;/P&gt;&lt;P&gt;nat command on outside intf, it gives me a warning also..but it takes the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my doubt is why outside nat doesnt works with outside keyword.I hope you guys got my doubt..&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 09:39:07 GMT</pubDate>
    <dc:creator>diptanshusingh</dc:creator>
    <dc:date>2020-02-21T09:39:07Z</dc:date>
    <item>
      <title>outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716718#M421668</link>
      <description>&lt;P&gt;Hi guys i am a bit confused, please help me ..&lt;/P&gt;&lt;P&gt;RTR2----(Outside)ASA(Inside)----Rtr1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the outside n/w range is 192.168.1.0/24 with Rtr2 having .2 and ASA having .1&lt;/P&gt;&lt;P&gt;the inside n/w range is 192.168.2.0 with asa having .1 and Rtr1 hving .2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now i want to perform dynamic outside nat for Rtr2.&lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0 outside &lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;-------&lt;/P&gt;&lt;P&gt;i knw that outside keyword is used for outside nat , and when i try to configure &lt;/P&gt;&lt;P&gt;nat command on outside intf, it gives me a warning also..but it takes the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my doubt is why outside nat doesnt works with outside keyword.I hope you guys got my doubt..&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:39:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716718#M421668</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2020-02-21T09:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716719#M421669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are correct, this is the correct way to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it is not working, check the access-list applied to the outside interface, and show xlate to confirm if you have any other existing xlates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleas post the complete sanitized config if this does not help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 11:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716719#M421669</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-22T11:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716720#M421670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks for you reply matti..actually what i wanted to know is that why is it so that why only when we apply "outside " keyword then only it works.. bcz with out that also when say&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it means nat for the source ip address 192.168.1.0/24 to a different ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 13:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716720#M421670</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-08-22T13:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716721#M421671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The outside keyword will allow the connections to initiate from an interface with a lower security level.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 13:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716721#M421671</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-22T13:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716722#M421672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ohh ..thanks...i got it...this means when i want to configure the same thing from my DMZ--to--inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i have to apply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 0 0 outside..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 13:29:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716722#M421672</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-08-22T13:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716723#M421673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outside keyword represent any outer (less secure) interface, not the actual outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 13:41:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716723#M421673</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-22T13:41:20Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716724#M421674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for clearing my concept...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 13:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716724#M421674</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-08-22T13:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716725#M421675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi matti . i have the following setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host---(inside)Pix(Outside)---Rtr&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host ip address 10.0.0.10&lt;/P&gt;&lt;P&gt;Pix Inside 10.0.0.1&lt;/P&gt;&lt;P&gt;Pix Outside 172.31.0.1&lt;/P&gt;&lt;P&gt;Rtr IP add:172.31.0.2(Rtr having a deault route to pix)&lt;/P&gt;&lt;P&gt;i tried to configure outside nat, but its not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname Firewall&lt;/P&gt;&lt;P&gt;enable password xxx encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.31.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd xxx&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;nat (outside) 1 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;----&lt;/P&gt;&lt;P&gt;i see the following messages&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%PIX-6-305011: Built dynamic ICMP translation from outside:172.31.0.2/2253 to in&lt;/P&gt;&lt;P&gt;side:10.0.0.1/30&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for icmp src outside:172.31.0.2 dst in&lt;/P&gt;&lt;P&gt;side:Insrv (type 8, code 0)&lt;/P&gt;&lt;P&gt;%PIX-6-305011: Built dynamic ICMP translation from outside:172.31.0.2/2254 to in&lt;/P&gt;&lt;P&gt;side:10.0.0.1/31&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for icmp src outside:172.31.0.2 dst in&lt;/P&gt;&lt;P&gt;side:Insrv (type 8, code 0)&lt;/P&gt;&lt;P&gt;%PIX-6-305011: Built dynamic ICMP translation from outside:172.31.0.2/2255 to in&lt;/P&gt;&lt;P&gt;side:10.0.0.1/32&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for icmp src outside:172.31.0.2 dst in&lt;/P&gt;&lt;P&gt;side:Insrv (type 8, code 0)&lt;/P&gt;&lt;P&gt;%PIX-6-305011: Built dynamic ICMP translation from outside:172.31.0.2/2256 to in&lt;/P&gt;&lt;P&gt;side:10.0.0.1/33&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for icmp src outside:172.31.0.2 dst in&lt;/P&gt;&lt;P&gt;side:Insrv (type 8, code 0)&lt;/P&gt;&lt;P&gt;%PIX-6-305011: Built dynamic ICMP translation from outside:172.31.0.2/2257 to in&lt;/P&gt;&lt;P&gt;side:10.0.0.1/34&lt;/P&gt;&lt;P&gt;%PIX-3-305005: No translation group found for icmp src outside:172.31.0.2 dst in&lt;/P&gt;&lt;P&gt;side:Insrv (type 8, code 0)&lt;/P&gt;&lt;P&gt;--------------&lt;/P&gt;&lt;P&gt;show xlate output&lt;/P&gt;&lt;P&gt;PAT Global 10.0.0.1(36) Local 172.31.0.2 ICMP id 5850&lt;/P&gt;&lt;P&gt;PAT Global 10.0.0.1(35) Local 172.31.0.2 ICMP id 5849&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 14:52:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716725#M421675</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-08-22T14:52:16Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716726#M421676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now you are only translating the source address of the outside host, NAT for the destination address also has to be configured. You want to reach the inside host by its real address? Then you need to do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.0.10 10.0.0.10 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 15:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716726#M421676</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-22T15:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716727#M421677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yeah got it.. but can i use dynamic nat .. in these cases instead of using static nat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 15:07:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716727#M421677</guid>
      <dc:creator>diptanshusingh</dc:creator>
      <dc:date>2007-08-22T15:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: outside nat in asa</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716728#M421678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use the nat(0) to disable nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 103 permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 103&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can tune that acl to only allow some traffic if you want to.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Aug 2007 15:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-in-asa/m-p/716728#M421678</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-22T15:50:19Z</dc:date>
    </item>
  </channel>
</rss>

