<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need some help with a fundamental concept of nat'ing/routing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917643#M437706</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the result of the show show run access-group&amp;nbsp; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW02# show run access-group &lt;/P&gt;&lt;P&gt;access-group&amp;nbsp;&amp;nbsp; Primary_Public_access_in_tmp in interface Primary_Public&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp;&amp;nbsp; FW_LANx_in in interface LANx&lt;/P&gt;&lt;P&gt;access-group FW_VPN_Touchdown_in in&amp;nbsp;&amp;nbsp; interface FW_VPN_Touchdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know for certain that&amp;nbsp; the FW_VPN_Touchdown is no longer in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the&amp;nbsp; purpose of this command to show only the access lists that are tied to&amp;nbsp; an interface?&lt;/P&gt;&lt;P&gt;If so, I am even more confused, as the access list&amp;nbsp; no-nat then does not appear to be used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 May 2012 14:29:49 GMT</pubDate>
    <dc:creator>paulbatte</dc:creator>
    <dc:date>2012-05-07T14:29:49Z</dc:date>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917636#M437696</link>
      <description>&lt;P&gt;I have the following code on an ASA5500 pair with very down-level code. 7.1.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a snippet of the ruleset:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;interface GigabitEthernet0/1.40&lt;BR /&gt;description Production Servers Network&lt;BR /&gt;vlan 40&lt;BR /&gt;nameif Production&lt;BR /&gt;security-level 40&lt;BR /&gt;ip address 172.20.0.1 255.255.0.0 standby 172.20.0.2&lt;BR /&gt;&lt;BR /&gt;access-list no-nat extended permit ip 192.168.3.0 255.255.255.0 192.168.20.0 255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 172.20.0.0 255.255.0.0 192.168.20.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;nat (Production) 0 access-list no-nat&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I correct in believing all traffic sourced from the 192.168.3.0 and 172.20.0.0 networks&amp;nbsp; coming in via the Production interface will NOT be Nat'ed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My next question is will that traffic be routed through that interface Production using&amp;nbsp; the original IP addresses, or will that traffic NOT be routed anywhere? &lt;/P&gt;&lt;P&gt;I don't want that traffic to be routed, but am concerned since these access list commands permit IP traffic between the networks, this traffic will be routed.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:02:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917636#M437696</guid>
      <dc:creator>paulbatte</dc:creator>
      <dc:date>2019-03-11T23:02:14Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917637#M437697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you already said the traffic matched by the access-list will not be NATed, so this means that it will pass without any IP source change.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on your routing table but also your access-list on, that traffic will be routed and permited.&lt;/P&gt;&lt;P&gt;If you have a an access-list applied on the Production interface that allows host from 182.168.3.0/24 to access 192.168.20.0/24 and 172.20.0.0/16 to access 192.168.20.0/24 , then the destination of the packet will be check in the routing table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this access-list will only allow traffic to pass without doing source nat to it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 16:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917637#M437697</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-05-04T16:19:09Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917638#M437698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are right on your first question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic will flow with the real IP coming from the source networks located behind the interface called Production to the destination network 192.168.20.0/24. Routing will always need to be done in order to be able to get to the destination. And the destination network needs to know how to get to the source addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this clear?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 16:20:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917638#M437698</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2012-05-04T16:20:25Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917639#M437699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for responses, but they confuse me more.&lt;/P&gt;&lt;P&gt;It is not your answers causing my confusion, but the firewall rules I am trying to apply to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what you are saying, traffic WILL flow from the 192.168.3.0 network to the 192.168.20.0 network, flowing through the Production interface. It won't be Nat'ed, but it will route because the access list explicitly allows IP traffic sourced&amp;nbsp; from the 192.168.3.0 network to reach the 192.168.20.0 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, this is not what is currently happening in the networks, as far as I have been told.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me add more lines of code to the problem, and give my interpretation, and you can tell me where I am going wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. There is no access list explictly associated with the Production interface, as can be seen through the definition in my first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. More complete code:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network network_vpn&lt;/P&gt;&lt;P&gt; description VPN IP's&lt;/P&gt;&lt;P&gt; network-object 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.20.0 255.255.255.0 172.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip object-group network_vpn 172.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip object-group network_vpn 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.20.0.0 255.255.0.0 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.2.0&amp;nbsp; 255.255.255.0 172.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.0.0 255.255.0.0 172.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.20.0.0 255.255.0.0 192.168.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.20.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 172.20.0.0 255.255.0.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.3.0 255.255.255.0 172.20.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.3.0 255.255.255.0 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no-nat extended permit ip 192.168.2.0 255.255.255.0 192.168.20.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Production) 0 access-list no-nat&lt;/P&gt;&lt;P&gt;nat (Production) 0 access-list Production_nat0_inbound outside&lt;/P&gt;&lt;P&gt;nat (Production) 1 172.20.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the 3rd last line in the access-list no-nat commands as an example.&lt;/P&gt;&lt;P&gt;As I envision this, if I have a network sourced as 192.168.3.0, coming in through the Production interface, IP traffic can reach the 172.20.0.0 network, albeit through not NAT'ed, but with the original IP addreses, assuming routing is configured between these networks? I guess my related question would be is routing not implictly turned on between these networks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Also, I think several lines of this access rule are redundant, given the network object covers the 192.168.2.0 and 192.168.3.0 networks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 18:08:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917639#M437699</guid>
      <dc:creator>paulbatte</dc:creator>
      <dc:date>2012-05-04T18:08:20Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917640#M437700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) please post : show run access-group&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Let's take "nat (Production) 0 access-list no-nat"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; this nat command will :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - match the source and destination on the access-list&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - match the packets source from Production with the source that apears in the acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; In my optinion I do not think that your acl-lines will be match by this nat exemption , because 192.168.3.0 or 192.168.2.0 are not behaind the Production interface - please correct me if I'm wrong.If this is the case then I belive that the only line that makes sens in the acl is ip 172.20.0.0 255.255.0.0 192.168.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; This has nothing to do with the acl applied on the interface, for filtering purpose. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 19:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917640#M437700</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-05-04T19:58:08Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917641#M437701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have requested the output of that command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the meantime, I guess a very fundamental question I still have is this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general terms, if a packet encounters a "nat 0" access list on an interface, and it meets the conditions you described in point #2 above, I know it won't NAT, but will it route using the permit rules in the access list?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 20:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917641#M437701</guid>
      <dc:creator>paulbatte</dc:creator>
      <dc:date>2012-05-04T20:28:07Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917642#M437702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul , &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without any doubt the permision will be checked against the access-list applied ( in or out direction depending on the direction and interface applied )&lt;/P&gt;&lt;P&gt;If for example you have an acl applied on the in direction of the Production denying all the traffic that you exempt from nat, it will for sure be droped and the nat exemption will not matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 May 2012 20:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917642#M437702</guid>
      <dc:creator>Dan-Ciprian Cicioiu</dc:creator>
      <dc:date>2012-05-04T20:34:42Z</dc:date>
    </item>
    <item>
      <title>Need some help with a fundamental concept of nat'ing/routing</title>
      <link>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917643#M437706</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the result of the show show run access-group&amp;nbsp; command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW02# show run access-group &lt;/P&gt;&lt;P&gt;access-group&amp;nbsp;&amp;nbsp; Primary_Public_access_in_tmp in interface Primary_Public&lt;/P&gt;&lt;P&gt;access-group&amp;nbsp;&amp;nbsp; FW_LANx_in in interface LANx&lt;/P&gt;&lt;P&gt;access-group FW_VPN_Touchdown_in in&amp;nbsp;&amp;nbsp; interface FW_VPN_Touchdown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know for certain that&amp;nbsp; the FW_VPN_Touchdown is no longer in use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the&amp;nbsp; purpose of this command to show only the access lists that are tied to&amp;nbsp; an interface?&lt;/P&gt;&lt;P&gt;If so, I am even more confused, as the access list&amp;nbsp; no-nat then does not appear to be used.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 14:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-some-help-with-a-fundamental-concept-of-nat-ing-routing/m-p/1917643#M437706</guid>
      <dc:creator>paulbatte</dc:creator>
      <dc:date>2012-05-07T14:29:49Z</dc:date>
    </item>
  </channel>
</rss>

