<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Resilient NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822828#M456438</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you running?&amp;nbsp; And post what you have tried to configure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jan 2012 13:48:01 GMT</pubDate>
    <dc:creator>andrew.prince</dc:creator>
    <dc:date>2012-01-20T13:48:01Z</dc:date>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822825#M456435</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to setup an ASA 5520 to correctly NAT over two wan links. The idea sounds pretty straingforward but it does not, I have only 2 IPs that are involved with the NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.10(Nated Server) -- 172.16.1.10(Web Server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 interfaces that sould be applied to it let's say outside1, outside2. The server is reacheable through each outside interface, the outside interfaces is selected uppon dynamic routing and that is working OK.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if link outside1 is up the Nat follows this schema&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.10(inside) -- 172.16.1.10(outside1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;that works fine, but I want that automagically changes over when the link outside1 is down to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.10(inside) -- 172.16.1.10(outside2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I can't have a NAT with 2 IPs and 2 different interfaces (ASDM doesn't allow me to), is there a way to implement this??&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822825#M456435</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2019-03-11T22:16:51Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822826#M456436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not know about the ASDM - but from the CLI you can do this with no issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jan 2012 15:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822826#M456436</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-19T15:38:22Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822827#M456437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't works, I can create the static NAT through the CLI (with a warning BTW ASDM does allow me to create it with a big warning message). After create the parallel NAT my ASA doesn't realice that it should use the one accorded to the interfaces that the routing tells it to route the package.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did try to clear the xlate table, but it didn't work, also tried to disable the interface asociated with this NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way to make it works is deleting the other NAT in order to have just one active (the one that the routing protocol is telling is active)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other idea??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 13:46:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822827#M456437</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T13:46:11Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822828#M456438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What version are you running?&amp;nbsp; And post what you have tried to configure.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 13:48:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822828#M456438</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T13:48:01Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822829#M456439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside1) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside2) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The routing is eigrp that is working OK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 14:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822829#M456439</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T14:43:51Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822830#M456440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK the way I read that is - the internal machine 172.16.1.10 will be translated and visible on the outside as 192.168.1.10 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 14:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822830#M456440</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T14:46:56Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822831#M456441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, and it needs to be reached through two wan links that are way different in a failover configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a branch office and I want to keep my internal IPs hidden, so I use NAT to achive this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas to implement this on the ASA??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have thought that I can move the routing failover part to a router and use just one interface on the ASA but I need to buy the new router. This is only if the ASA can't do the trick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 14:54:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822831#M456441</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T14:54:31Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822832#M456442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just put that into a lab firewall - and have no issues, see my test config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif Outside1&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif Outside2&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.0.2.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 172.16.254.250 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list outside-in extended permit tcp any host 192.168.1.10 eq telnet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;static (Inside,Outside1) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (Inside,Outside2) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group outside-in in interface Outside1&lt;/P&gt;&lt;P&gt;access-group outside-in in interface Outside2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route Outside1 8.8.8.0 255.255.255.0 10.0.1.254 1&lt;/P&gt;&lt;P&gt;route Outside2 9.9.9.0 255.255.255.0 10.0.2.254 1&lt;/P&gt;&lt;P&gt;route Inside 172.16.1.0 255.255.255.0 172.16.254.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ciscoasa# show xlate&lt;/P&gt;&lt;P&gt;2 in use, 2 most used&lt;/P&gt;&lt;P&gt;Global 192.168.1.10 Local 172.16.1.10&lt;/P&gt;&lt;P&gt;Global 192.168.1.10 Local 172.16.1.10&lt;/P&gt;&lt;P&gt;ciscoasa#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from my lab routers, I could ping and telnet to the external address thru to 2 seperate interfaces to the internal lab router - all works OK.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 15:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822832#M456442</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T15:28:54Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822833#M456443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is pretty much the scenario, just 2 things I'm missing&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The route to 172.16.1.0 is not applied to Inside it is applied to each Outside according to the EIGRP process.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also can see the xlate table correctly active.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it should work pretty straightforward as I said but it doesn't &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 15:44:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822833#M456443</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T15:44:22Z</dc:date>
    </item>
    <item>
      <title>Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822834#M456444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry really confused now - so the 172.16.1.0/24 is NOT on the inside??? Where is it???&amp;nbsp; Are you saying that 172.16.1.10 is reachable thru both &lt;SPAN style="text-decoration: underline;"&gt;Outside1&lt;/SPAN&gt; and &lt;SPAN style="text-decoration: underline;"&gt;Outside2&lt;/SPAN&gt; interfaces, and when you are on the &lt;SPAN style="text-decoration: underline;"&gt;Inside&lt;/SPAN&gt;, to get to it you want to use IP address 192.168.1.10?? If that is the case - I am not surprised it does not work, as the config is wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 15:53:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822834#M456444</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T15:53:13Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822835#M456445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, that is the case&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the branch office I want to reach the 172.16.1.10 thru both Outside1 and Outside2 hiding the 172.16.1.10 with 192.168.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you tell me if that is achievable and what errors do I have?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know this is not an usual configuration (at least I haven't found anything like it) I'm sorry to confuse you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822835#M456445</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T16:03:24Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822836#M456446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;so just to be clear - the Inside network is 192.168.1.0/24 from the outside1 and outside2 you want to connect to 192.168.1.10 BUT you need it via 172.16.1.10?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,outside1) 172.16.1.10 192.168.1.10&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style-type: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,outside2) 172.16.1.10 192.168.1.10&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:12:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822836#M456446</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T16:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822837#M456447</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be clear&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside is 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote is 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't want inside-net (not just 192.168.1.0) to know 172.16.1.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I need is if inside telnets 192.168.1.10 it goes to 172.16.1.10 (independent from which Outside interface is active and routing)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so far I have static(inside,outside1) 192.168.1.10 172.16.1.10 (that works pretty well but if outside1 goes offline, I have to change it to outside2, deleting outside1)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822837#M456447</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T16:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822838#M456448</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the clarification - try this config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside1,inside) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (outside2,inside) 192.168.1.10 172.16.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might get an error - ignore it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822838#M456448</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-20T16:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822839#M456449</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Andrew&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give it a try tonight since it is a production environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll let you know the results&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jan 2012 16:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822839#M456449</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-20T16:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822840#M456450</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Andrew, I don't want to bother you with this but 2 things&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I already had the config you suggest, I was posting the wrong static rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. It doesn't works dynamically, when I route to interface Outside1 it works, when I switch to Outside2 I must delete the Nat rule associated with interface Outside1 in order to get Outside2 working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know I should pay more attention to this details and avoid wasting your time. I'm really sorry about it. I'm back to drawing board, any suggestion??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2012 04:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822840#M456450</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-21T04:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822841#M456451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;post your entire config ( remove passwords)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Jan 2012 08:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822841#M456451</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-21T08:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822842#M456452</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA-Branch&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif ISP1&lt;/P&gt;&lt;P&gt; security-level 20&lt;/P&gt;&lt;P&gt; ip address 10.0.1.2 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; nameif Inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/2&lt;/P&gt;&lt;P&gt; nameif ISP2&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.10.60.55 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/3&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt; port-object eq 53400&lt;/P&gt;&lt;P&gt; port-object eq 53401&lt;/P&gt;&lt;P&gt; port-object eq 53501&lt;/P&gt;&lt;P&gt; port-object eq 53511&lt;/P&gt;&lt;P&gt; port-object eq 53521&lt;/P&gt;&lt;P&gt; port-object eq 53541&lt;/P&gt;&lt;P&gt; port-object eq 53551&lt;/P&gt;&lt;P&gt; port-object eq 53561&lt;/P&gt;&lt;P&gt;access-list Inside_access_in extended permit tcp any host 192.168.1.10 object-group Ports-Branch&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu ISP1 1500&lt;/P&gt;&lt;P&gt;mtu Inside 1500&lt;/P&gt;&lt;P&gt;mtu ISP2 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any Inside&lt;/P&gt;&lt;P&gt;icmp permit any ISP2&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-631.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (ISP1) 10 interface&lt;/P&gt;&lt;P&gt;global (ISP2) 10 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (ISP2,Inside) 192.1.2.50 172.17.254.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (ISP1,Inside) 192.1.2.50 172.17.254.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group ISP1_access_in in interface ISP1&lt;/P&gt;&lt;P&gt;access-group Inside_access_in in interface Inside&lt;/P&gt;&lt;P&gt;access-group ISP2_access in interface ISP2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router eigrp 10&lt;/P&gt;&lt;P&gt; network 10.10.60.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network 10.0.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've removed some trivial info (I hope), pretty much this is how it is configured&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jan 2012 00:36:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822842#M456452</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-23T00:36:55Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822843#M456453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see the issue now - it makes sense that you need to remove the static entry via ISP1&amp;nbsp; for it to work, NAT is an up &amp;gt; down process - so the ISP1 entry will be hit every time.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way I can think of right now, is to NAT the traffic before it gets to the ASA, like put a router in front of the Branch ASA or NAT it closer to the source with a route map that defines the destination subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jan 2012 10:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822843#M456453</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2012-01-23T10:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Resilient NAT</title>
      <link>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822844#M456454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Andrew&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I was right thinking of use a router with the ISPs links and a link to the ASA and configure the ASA with a single inside outside schema. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BTW thank you very much for your advices. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jan 2012 14:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/resilient-nat/m-p/1822844#M456454</guid>
      <dc:creator>Sunset666_2</dc:creator>
      <dc:date>2012-01-23T14:31:24Z</dc:date>
    </item>
  </channel>
</rss>

