<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5505 nat-issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943924#M436025</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Samuel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Jennifer stated is a desing issue, you will need to configure the TCP state bypass or a U-turning policy to allow that communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 24 May 2012 13:46:54 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-05-24T13:46:54Z</dc:date>
    <item>
      <title>ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943922#M436022</link>
      <description>&lt;P&gt;Hi, we have users connecting via an ISP Wan-link to our ASA with inside-subnet 192.168.1.0. The remote users are on 192.168.2.0 and can only access 192.168.1.1, no other IP on the 192.168.1.0 subnet. Any idea why?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The (ISP) router and 192.168.2.0-subnet is behind 192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks/Sam&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's my config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TMPASA01# show run&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.4(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname TMPASA01&lt;/P&gt;&lt;P&gt;domain-name tmp.local&lt;/P&gt;&lt;P&gt;enable password v4fmcWqoQy.l8i1X encrypted&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt; switchport access vlan 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address X.X.X.X 255.255.255.252 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan10&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;boot system disk0:/asa843-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name tmp.local&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network inside-lan&lt;/P&gt;&lt;P&gt; subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object network FTP-SERVER-PORT20&lt;/P&gt;&lt;P&gt; host 192.168.1.55&lt;/P&gt;&lt;P&gt;object network FTP-SERVER-PORT21&lt;/P&gt;&lt;P&gt; host 192.168.1.55&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-PORT80&lt;/P&gt;&lt;P&gt; host 192.168.1.106&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-PORT5222&lt;/P&gt;&lt;P&gt; host 192.168.1.106&lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT8008&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT8443&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT1701&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT4500&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT500&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-UDP-PORT6000&lt;/P&gt;&lt;P&gt; host 192.168.1.106&lt;/P&gt;&lt;P&gt;object network WEB-SERVER-UDP-PORT6001&lt;/P&gt;&lt;P&gt; host 192.168.1.106&lt;/P&gt;&lt;P&gt;object network PPTP-SERVER-PORT1723&lt;/P&gt;&lt;P&gt; host 192.168.1.56&lt;/P&gt;&lt;P&gt; description PPTP Tunnel TMP Server&lt;/P&gt;&lt;P&gt;object network inside-nat-192.168.2.0&lt;/P&gt;&lt;P&gt; subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group service L2TP udp&lt;/P&gt;&lt;P&gt; port-object eq 1701&lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit icmp any any &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.55 eq ftp-data &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.55 eq ftp &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.106 eq www &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.106 eq 5222 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.56 eq 8008 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.56 eq 8443 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit udp any host 192.168.1.56 object-group L2TP &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit udp any host 192.168.1.56 eq 4500 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit udp any host 192.168.1.56 eq isakmp &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit udp any host 192.168.1.106 eq 6000 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit udp any host 192.168.1.106 eq 6001 &lt;/P&gt;&lt;P&gt;access-list INBOUND extended permit tcp any host 192.168.1.56 eq pptp &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-647.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network inside-lan&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;object network FTP-SERVER-PORT20&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp-data ftp-data &lt;/P&gt;&lt;P&gt;object network FTP-SERVER-PORT21&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp ftp ftp &lt;/P&gt;&lt;P&gt;object network WEB-SERVER-PORT80&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www &lt;/P&gt;&lt;P&gt;object network WEB-SERVER-PORT5222&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 5222 5222 &lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT8008&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 8008 8008 &lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT8443&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp 8443 8443 &lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT1701&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 1701 1701 &lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT4500&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 4500 4500 &lt;/P&gt;&lt;P&gt;object network ICAL-SERVER-PORT500&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp isakmp isakmp &lt;/P&gt;&lt;P&gt;object network WEB-SERVER-UDP-PORT6000&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 6000 6000 &lt;/P&gt;&lt;P&gt;object network WEB-SERVER-UDP-PORT6001&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service udp 6001 6001 &lt;/P&gt;&lt;P&gt;object network PPTP-SERVER-PORT1723&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp pptp pptp &lt;/P&gt;&lt;P&gt;object network inside-nat-192.168.2.0&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group INBOUND in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 88.131.16.33 1&lt;/P&gt;&lt;P&gt;route inside 192.168.2.0 255.255.255.0 192.168.1.254 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout pat-xlate 0:00:30&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication telnet console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication http console LOCAL &lt;/P&gt;&lt;P&gt;aaa authentication serial console LOCAL &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;ssh version 2&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;ntp server 192.36.133.17 source outside prefer&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:11:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943922#M436022</guid>
      <dc:creator>Samuel Eng</dc:creator>
      <dc:date>2019-03-11T23:11:01Z</dc:date>
    </item>
    <item>
      <title>ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943923#M436023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I assume that the default gateway on those devices in 192.168.1.0/24 is the ASA inside interface 192.168.1.1. That's why the remote user is not able to access the 192.168.1.0/24 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reason being: the ASA does not see the complete TCP handshake, hence dropping the packet.&lt;/P&gt;&lt;P&gt;Eg:&lt;/P&gt;&lt;P&gt;TCP SYN: remote user --&amp;gt; 192.168.1.x host&lt;/P&gt;&lt;P&gt;TCP SYN-ACK: 192.168.1.x host --&amp;gt; ASA inside interface, and at this stage, the ASA will drop it because it does not see the SYN packet as the SYN packet goes directly to the host as they are in the same subnet hence does not route via default gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 13:30:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943923#M436023</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-05-24T13:30:52Z</dc:date>
    </item>
    <item>
      <title>ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943924#M436025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Samuel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Jennifer stated is a desing issue, you will need to configure the TCP state bypass or a U-turning policy to allow that communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 13:46:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943924#M436025</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-24T13:46:54Z</dc:date>
    </item>
    <item>
      <title>ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943925#M436026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, thanks for your replys. How do I configure this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And, just to be clear: I do get ping-replys from 192.168.1.1 from the 192.168.2.0-subnet, but on no other addresses. And I can't access any other host/port/service in the 192.168.1.0-net, but I can reach the internet from 192.168.2.0-subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/Sam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 14:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943925#M436026</guid>
      <dc:creator>Samuel Eng</dc:creator>
      <dc:date>2012-05-24T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943926#M436027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Samuel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets give it a try to the U-turning configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 192.168.254.0&lt;/P&gt;&lt;P&gt;subnet 192.168.254.255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Object network 2_inside-lan&lt;/P&gt;&lt;P&gt;subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network inside-lan&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside) 1 source dynamic&amp;nbsp; 2_inside-lan interface destination static 192.168.254.0 inside-lan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will need to try to access the inside host by using the 192.168.254.0 ,as this is a desing problem that would be the way to make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if it works!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 17:23:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943926#M436027</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-24T17:23:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943927#M436028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply. Just don't know where you got the 192.168.254.0-subnet from?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 21:44:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943927#M436028</guid>
      <dc:creator>Samuel Eng</dc:creator>
      <dc:date>2012-05-24T21:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5505 nat-issues</title>
      <link>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943928#M436029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Samuel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue here is that the flow of the traffic (packet) is not the same for the outgoing and incoming packet. So we need to change that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do it we will nat the Inside1 local subnet to a Diferent subnet ( a ghost subnet) that the router will only know it by the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will force the router to always send the traffic to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the posts that help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2012 23:28:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5505-nat-issues/m-p/1943928#M436029</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-24T23:28:55Z</dc:date>
    </item>
  </channel>
</rss>

