<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT quistion in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902533#M458136</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try a couple of things for me please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the show nat command to see what NAT will be applied to the various interfaces and try setting the SAS_LAN_10 interface security level to 60.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the same-security-traffic permit inter-interface command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat works by letting traffic from a protected interface go to a less protected or same level interface (with the command above).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amanda Lalli-Cafini&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 20 Mar 2012 10:18:30 GMT</pubDate>
    <dc:creator>alalli</dc:creator>
    <dc:date>2012-03-20T10:18:30Z</dc:date>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902523#M458121</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope someone can help me with the following problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA 5510 that looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERFACE 0: DHCP (OUTSIDE)&lt;/P&gt;&lt;P&gt;INTERFACE 1: 10.45.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;INTERFACE 2: 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to access the net (10.45.0.0 255.255.255.0) on INTERFACE 1 from all IP addresses (192.168.0.1 255.255.255.0) on INTERFACE 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But all INTERFACE 2 addresses shall be translated to one single address (10.45.0.15) at INTERFACE 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I do that ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:42:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902523#M458121</guid>
      <dc:creator>rexpetersen</dc:creator>
      <dc:date>2019-03-11T22:42:24Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902524#M458122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; What version of your ASA ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 13:39:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902524#M458122</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-03-15T13:39:14Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902525#M458124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; 8.03&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 14:44:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902525#M458124</guid>
      <dc:creator>rexpetersen</dc:creator>
      <dc:date>2012-03-15T14:44:15Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902526#M458126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not so sure of your interface names on your FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but I could assume as follows, in case they are not setup on your FW, please change those are in brakets (i.e. interface names) to reflect your ASA interface names.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERFACE 2: assumed security level less than 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;INTERFACE 1: assumed security level equal to 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Mar 2012 15:00:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902526#M458126</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-03-15T15:00:58Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902527#M458128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; rizwanr74&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way you suggest nat 1 to 1&amp;nbsp; &lt;STRONG&gt;a.a.a.1&lt;/STRONG&gt; vil translatet to &lt;STRONG&gt;b.b.b.1&lt;/STRONG&gt; , &lt;STRONG&gt;a.a.a.2&lt;/STRONG&gt; translatet to &lt;STRONG&gt;b.b.b.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The way I wan is that entire a.a.a.a network wil be translatet to one single b.b.b.b address. Like PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 09:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902527#M458128</guid>
      <dc:creator>rexpetersen</dc:creator>
      <dc:date>2012-03-16T09:00:43Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902528#M458130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dmz = INTERFACE 1:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside = INTERFACE 2:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access−list policy−nat extended permit ip 192.168.0.0 255.255.255.0 10.45.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;global (dmz) 45 10.45.0.15&lt;BR /&gt;nat (inside) 45 access-list policy−nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know, if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt; font-family: Courier; "&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 12:58:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902528#M458130</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-03-16T12:58:22Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902529#M458132</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Back on work after a great weekend &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK i get the idea to make a virtual interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have now implementet it, but somehow I can't get the access-list triggered ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even if it try for at short test to put in: ANY ANY ... nothing triggers the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 08:27:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902529#M458132</guid>
      <dc:creator>rexpetersen</dc:creator>
      <dc:date>2012-03-19T08:27:23Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902530#M458133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rex,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the access-list for nat is too restrictive....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try&lt;/P&gt;&lt;P&gt;access−list policy−nat extended permit ip 192.168.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amanda&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 10:39:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902530#M458133</guid>
      <dc:creator>alalli</dc:creator>
      <dc:date>2012-03-19T10:39:40Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902531#M458134</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amanda&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same problem ... no hits on the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here my setup:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif OUTSIDE&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 0&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address x.x.x.154 255.255.255.240 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/1.40&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; vlan 123&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif KUNDENET&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 60&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; ip address 192.168.123.1 255.255.255.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;interface Ethernet0/1.60&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; vlan 130&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; nameif SAS_LAN_10&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; security-level 55&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; ip address 10.45.0.1 255.255.248.0 &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list policy-nat extended permit ip 10.45.0.0 255.255.248.0 192.168.123.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (KUNDENET) 45 192.168.123.121&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (SAS_LAN_10) 45 access-list policy-nat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (OUTSIDE) 1 interface&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;global (KUNDENET) 45 192.168.123.121&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (SAS_LAN_10) 0 access-list NO_NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (SAS_LAN_10) 45 access-list policy-nat&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (SAS_LAN_10) 1 10.45.0.0 255.255.248.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (KUNDENET) 0 access-list NO_NAT&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;nat (KUNDENET) 1 192.168.123.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The NO_NAT's are for some VPN tunnels&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;// Rex&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 11:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902531#M458134</guid>
      <dc:creator>rexpetersen</dc:creator>
      <dc:date>2012-03-19T11:48:58Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902532#M458135</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need an ACL permit entry to enter high security(KUNDENET) zone interface from lower security (SAS_LAN_10)&lt;/P&gt;&lt;P&gt;zone interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access−list kundenet-in extended permit ip 10.45.0.0 255.255.248.0 192.168.123.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group kundenet-in in interface KUNDENET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let me know, if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 19:27:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902532#M458135</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2012-03-19T19:27:51Z</dc:date>
    </item>
    <item>
      <title>NAT quistion</title>
      <link>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902533#M458136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Rex&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try a couple of things for me please.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the show nat command to see what NAT will be applied to the various interfaces and try setting the SAS_LAN_10 interface security level to 60.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use the same-security-traffic permit inter-interface command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat works by letting traffic from a protected interface go to a less protected or same level interface (with the command above).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks very much&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Amanda Lalli-Cafini&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Mar 2012 10:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-quistion/m-p/1902533#M458136</guid>
      <dc:creator>alalli</dc:creator>
      <dc:date>2012-03-20T10:18:30Z</dc:date>
    </item>
  </channel>
</rss>

