<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 NONAT/NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833465#M460406</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reset I, well there is nothing we can do as one host on the inside is sending that Reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try to do a tcp state by pass to see if that makes a difference ( Only to see if the ASA is dropping the connection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list tcp_bypass permit tcp host 10.41.40.35 host 10.41.95.21&lt;/P&gt;&lt;P&gt;access-list tcp_bypass permit tcp&amp;nbsp; host 10.41.95.21 host 10.41.40.35 &lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt;match access-list tcp_bypass&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set connection advanced&lt;/EM&gt; -options&amp;nbsp; &lt;EM&gt;tcp&lt;/EM&gt;-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the other issue&lt;/P&gt;&lt;P&gt;access-list 2issue permit ip host 192.168.20.254 host 10.41.95.241&lt;/P&gt;&lt;P&gt;access-list 2issue permit ip host 192.168.20.254 host 10.41.95.242&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.20.254 access-list 2issue&lt;/P&gt;&lt;P&gt;access-list outside permit ip host 10.41.95.241 host 192.168.20.254&lt;/P&gt;&lt;P&gt;access-list outside permit ip host 10.41.95.242 host 192.168.20.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 03 Feb 2012 21:44:23 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-02-03T21:44:23Z</dc:date>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833459#M460389</link>
      <description>&lt;P&gt;Hey Everyone, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a really odd requirement for a NAT and then a NONAT on my firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One interface on our ASA 5510 version 8.2(1) connects into our vendor's network and they only allow for one address to be allowed through the firewall.&amp;nbsp; This allowed address is the interface IP and it is overloaded.&amp;nbsp; The subnet is a 24-bit mask but I have 2 systems on my inside interface that need to have a connection to them from this Vendor network on one address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This connection is OPC which is our DCOM and initiates a (MS) DCERPC connection.&amp;nbsp; The NAT Overload is working and we have full commands and visibility but no OPC/DCOM/DCERPC control from that one server to our servers.&amp;nbsp; I have tried to set up a NONAT for this one address to our servers and also a static to the address to by-pass the NAT; neither of these worked to allow the communications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know what more information you need to help me out with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kimberly&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833459#M460389</guid>
      <dc:creator>Kimberly Adams</dc:creator>
      <dc:date>2019-03-11T22:21:19Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833460#M460390</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay so in order to access the other site on one of the interface of your ASA you are allowed to go through their network by having only one ip address, but there is also a requirement for them to access two internal servers on your ASA.&lt;/P&gt;&lt;P&gt;Are they tring to connect from a lower to a higher security level, if this is the case nat control is enable by default and you will need a bi-directional NAT rule ( Static Nat or NAT 0 with ACL)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know if the connection is being innitiated on the lower security level, the nat statement and also the ACL applied to the interface allowing the connection, then we will use packet-tracer an captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 05:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833460#M460390</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T05:50:34Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833461#M460392</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response and this is what I have; this is part of the configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(1)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname SC1-E-FW1&lt;/P&gt;&lt;P&gt;domain-name wosrpt.us&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.41.2.254 255.255.255.240&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif GAMESA&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.20.253 255.255.224.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.41.95.254 255.255.254.0 standby 10.41.95.253&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; nameif SUB_P&amp;amp;C_NET&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.241.4.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network PDXRPT&lt;/P&gt;&lt;P&gt; network-object 10.41.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object-group network SC1EMS&lt;/P&gt;&lt;P&gt; network-object 10.41.94.0 255.255.254.0&lt;/P&gt;&lt;P&gt;object-group network SUBSTATION_NET&lt;/P&gt;&lt;P&gt; network-object 10.241.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network SC1_UCC_SERVERS&lt;/P&gt;&lt;P&gt; network-object host 10.41.95.241&lt;/P&gt;&lt;P&gt; network-object host 10.41.95.242&lt;/P&gt;&lt;P&gt; network-object host 10.41.95.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list outside extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip object-group PDXRPT object-group SC1EMS&lt;/P&gt;&lt;P&gt;access-list SUBSTATION extended permit ip host 10.41.95.239 object-group SUBSTATION_NET&lt;/P&gt;&lt;P&gt;access-list SUBSTATION extended permit icmp host 10.41.95.239 object-group SUBSTATION_NET&lt;/P&gt;&lt;P&gt;access-list SUBSTATION extended permit ip object-group SUBSTATION_NET host 10.41.95.239&lt;/P&gt;&lt;P&gt;access-list SUBSTATION extended permit icmp object-group SUBSTATION_NET host 10.41.95.239&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit ip any 192.168.0.0 255.255.224.0&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit icmp any any source-quench&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list GAMESA extended permit ip host 192.168.20.254 object-group SC1_UCC_SERVERS&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip object-group PDXRPT object-group SC1EMS&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip object-group SC1EMS object-group PDXRPT&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip object-group SC1EMS object-group SUBSTATION_NET&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu SUB_P&amp;amp;C_NET 1500&lt;/P&gt;&lt;P&gt;mtu GAMESA 1500&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 10 burst-size 5&lt;/P&gt;&lt;P&gt;icmp permit any outside&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp permit any SUB_P&amp;amp;C_NET&lt;/P&gt;&lt;P&gt;icmp permit any GAMESA&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;global (GAMESA) 1 interface&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.41.95.241 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.41.95.242 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (GAMESA) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;static (inside,GAMESA) 192.168.21.1 10.41.95.25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group outside in interface outside&lt;/P&gt;&lt;P&gt;access-group SUBSTATION in interface SUB_P&amp;amp;C_NET&lt;/P&gt;&lt;P&gt;access-group GAMESA in interface GAMESA&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.41.2.242 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And&amp;nbsp; now I am also having another issue with this firewall between our&amp;nbsp; PDXRPT and 1 device at the site.&amp;nbsp; It is coming back as a TCP Reset-I.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help with either of these issues would be very much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kimberly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 20:27:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833461#M460392</guid>
      <dc:creator>Kimberly Adams</dc:creator>
      <dc:date>2012-02-02T20:27:45Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833462#M460395</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you be a little bit more specific here, I mean where is the connection being innitiated,where is the connection going to, if you run a packet tracer what do you get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be more than glad to help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 21:07:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833462#M460395</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-02T21:07:51Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833463#M460398</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reset is coming from our core network and here is the syslog messages:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 02 2012 12:49:06: %ASA-7-609001: Built local-host inside:10.41.95.21&lt;/P&gt;&lt;P&gt;Feb 02 2012 12:49:06: %ASA-6-302013: Built inbound TCP connection 9634632 for outside:10.41.40.35/1617 (10.41.40.35/1617) to inside:10.41.95.21/20000 (10.41.95.21/20000)&lt;/P&gt;&lt;P&gt;Feb 02 2012 12:49:06: %ASA-6-302014: Teardown TCP connection 9634632 for outside:10.41.40.35/1617 to inside:10.41.95.21/20000 duration 0:00:00 bytes 0 TCP Reset-I&lt;/P&gt;&lt;P&gt;Feb 02 2012 12:49:06: %ASA-7-609002: Teardown local-host inside:10.41.95.21 duration 0:00:00&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is for the TCP Reset-I issue.&amp;nbsp; The other issue this firewall is having is IP address 192.168.20.254 needs to talk directly to my two servers without natting.&amp;nbsp; These two servers are 10.41.95.241 and .242.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kimberly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 21:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833463#M460398</guid>
      <dc:creator>Kimberly Adams</dc:creator>
      <dc:date>2012-02-02T21:18:09Z</dc:date>
    </item>
    <item>
      <title>ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833464#M460402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please Anyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still looking for some help with this issue.&amp;nbsp; Please let me know if you require any further information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kimberly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 16:59:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833464#M460402</guid>
      <dc:creator>Kimberly Adams</dc:creator>
      <dc:date>2012-02-03T16:59:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 NONAT/NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833465#M460406</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reset I, well there is nothing we can do as one host on the inside is sending that Reset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could try to do a tcp state by pass to see if that makes a difference ( Only to see if the ASA is dropping the connection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list tcp_bypass permit tcp host 10.41.40.35 host 10.41.95.21&lt;/P&gt;&lt;P&gt;access-list tcp_bypass permit tcp&amp;nbsp; host 10.41.95.21 host 10.41.40.35 &lt;/P&gt;&lt;P&gt;class-map tcp_bypass&lt;/P&gt;&lt;P&gt;match access-list tcp_bypass&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class tcp_bypass&lt;/P&gt;&lt;P&gt;&lt;EM&gt;set connection advanced&lt;/EM&gt; -options&amp;nbsp; &lt;EM&gt;tcp&lt;/EM&gt;-state-bypass&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the other issue&lt;/P&gt;&lt;P&gt;access-list 2issue permit ip host 192.168.20.254 host 10.41.95.241&lt;/P&gt;&lt;P&gt;access-list 2issue permit ip host 192.168.20.254 host 10.41.95.242&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.20.254 access-list 2issue&lt;/P&gt;&lt;P&gt;access-list outside permit ip host 10.41.95.241 host 192.168.20.254&lt;/P&gt;&lt;P&gt;access-list outside permit ip host 10.41.95.242 host 192.168.20.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio!!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Feb 2012 21:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-nonat-nat/m-p/1833465#M460406</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-03T21:44:23Z</dc:date>
    </item>
  </channel>
</rss>

