<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Logging and nat rules question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902142#M436561</link>
    <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;I have an asa with the latest asdm. I have 2 questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When doing a no Nat rule between 2 destinations, do I create a nat rule with my source and destination, then in the bottom box keep both as original ? How do I know if nat control is enabled on the GUI ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to see some logs for something that is getting denied, on the bottom of each acl I don't see the implicit deny rule, do i need to create one at the bottom of my acl in question and turn logging to debugging?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:08:55 GMT</pubDate>
    <dc:creator>carl_townshend</dc:creator>
    <dc:date>2019-03-11T23:08:55Z</dc:date>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902142#M436561</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;I have an asa with the latest asdm. I have 2 questions&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When doing a no Nat rule between 2 destinations, do I create a nat rule with my source and destination, then in the bottom box keep both as original ? How do I know if nat control is enabled on the GUI ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to see some logs for something that is getting denied, on the bottom of each acl I don't see the implicit deny rule, do i need to create one at the bottom of my acl in question and turn logging to debugging?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902142#M436561</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2019-03-11T23:08:55Z</dc:date>
    </item>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902143#M436562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the requirement to know it via ASDM or can it be via CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If CLI I can help you right now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do a sh run nat-control ( If you are running a version higher than 8.3 nat control will be disabled by default)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the not nat Rule, Yes you have to let them original. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now regarding the ACL in order to log it you need to create it ( By default the implicit deny will not generate a log)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco Security Engineer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 May 2012 03:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902143#M436562</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-19T03:28:43Z</dc:date>
    </item>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902144#M436563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi&lt;/P&gt;&lt;P&gt;so if we run 8.4 then is trafic allowed to flow throught he device without nat by default ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also with the logging messages, so are you saying that i need to create an implicit deny under each of my access lists to see the deny logs ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 May 2012 09:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902144#M436563</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2012-05-19T09:32:03Z</dc:date>
    </item>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902145#M436564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from 8.3 to new versions Nat control is disabled, so if a packet from a higher security level wants to go to a lower version&lt;/P&gt;&lt;P&gt;there is no need for a NAT statement as required on 8.2 or lower versions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see the deny logs yes you will need to do that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;DO Rate all the helpful posts&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 May 2012 19:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902145#M436564</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-19T19:10:04Z</dc:date>
    </item>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902146#M436565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi There&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what about if traffic say from outside (low security interface) needs access to a host in the inside (high security) interface, do we need to do configure a nat exemption for this ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Carl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2012 11:37:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902146#M436565</guid>
      <dc:creator>carl_townshend</dc:creator>
      <dc:date>2012-05-21T11:37:22Z</dc:date>
    </item>
    <item>
      <title>Logging and nat rules question</title>
      <link>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902147#M436567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Carl,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not at all you do not need that, but if you have a private ip address for the internal host you will need to nat it to the outside world to make it routable... but that is common sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not required to used it ( if you have on the inside interface public ip addresses then you will not need to do the NAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if you have any other question if not please mark the question as answered.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 21 May 2012 17:36:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-and-nat-rules-question/m-p/1902147#M436567</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-05-21T17:36:08Z</dc:date>
    </item>
  </channel>
</rss>

