<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Easy ASA/NAT Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832202#M491472</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat 0 does not affect this particular case because the destination is not on the 10.0.0.0 /8 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you doing the test just based on the pings?&lt;/P&gt;&lt;P&gt;Because you might need the command:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -fixup protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you need is the nat statement I sent you (PAT) and the ACL on the inside interface (just if&amp;nbsp; you have one ) allowing that communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please attach the entire configuration, next step would be to do some captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 21 Dec 2011 23:50:13 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2011-12-21T23:50:13Z</dc:date>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832198#M491462</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I have an ASA 5505 that can ping the printer 192.168.1.1 (connected to outside interface) and the workstation 10.1.1.1 (connected to inside interface). The workstation cannot ping the printer, and I cannot get the NAT to work to save my life. What is the best way to gain connectivity between the PC and the printer? Version&amp;nbsp; 8.2(3). There is another printer and another PC that will need connectivity as well on the same&amp;nbsp; subnets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a ton -&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832198#M491462</guid>
      <dc:creator>CSCO11589626</dc:creator>
      <dc:date>2019-03-11T22:00:33Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832199#M491464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As the printers are on the outside and the PCs on the inside, you just need traffic being source from the inside to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For this scenario a Dynamic NAT or PAT will do&amp;nbsp; it for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;Global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is all you need if you want to innitiate connections from a higher security level interface (inside) to a lower security level (outside) on an ASA running 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2011 00:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832199#M491464</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-08T00:24:32Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832200#M491467</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Thanks for your reply. This looks like it should work for me, but it does not - I hope I am missing something easy. There is a NO_NAT configuration in place, as some of the traffic cannot be natted (vpn traffic). Below is the relevant code, if you have any ideas, thanks a million.&lt;/P&gt;&lt;P&gt;I tried your suggestion NAT (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; GLOBAL (outsied) 1 interface&lt;/P&gt;&lt;P&gt;with no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also tried static (inside,outside) 172.29.139.30 10.53.1.58 netmask 255.255.255.255, and those two hosts still cannot communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am basically trying to let 10.53.1.56 255.255.255.248 and 172.29.139.0 255.255.255.128 communicate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.53.1.58 is one of the PCs on the inside, and 172.29.139.30 is one of the printers on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=================================================================================&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.53.1.57 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 172.29.139.140 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list No_NAT extended permit ip 10.53.1.56 255.255.255.248 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;access-list Outside_VPN extended permit ip 10.53.1.56 255.255.255.248 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list No_NAT&lt;/P&gt;&lt;P&gt;============================================================================&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 23:07:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832200#M491467</guid>
      <dc:creator>CSCO11589626</dc:creator>
      <dc:date>2011-12-21T23:07:42Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832201#M491469</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two ways to do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option #1: &lt;/P&gt;&lt;P&gt;no nat-control&lt;/P&gt;&lt;P&gt;access-list external permit icmp any any log&lt;/P&gt;&lt;P&gt;access-group external in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Option #2:&lt;/P&gt;&lt;P&gt;Nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;Global (outside) 1 interface&lt;/P&gt;&lt;P&gt;access-list external permit icmp any any log&lt;/P&gt;&lt;P&gt;access-group external in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by default, traffics initiates from inside interface can traverse the firewall go to go out and come back with the exception of icmp echo-reply&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 23:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832201#M491469</guid>
      <dc:creator>david.tran</dc:creator>
      <dc:date>2011-12-21T23:20:09Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832202#M491472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Martin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat 0 does not affect this particular case because the destination is not on the 10.0.0.0 /8 subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you doing the test just based on the pings?&lt;/P&gt;&lt;P&gt;Because you might need the command:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; -fixup protocol icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All you need is the nat statement I sent you (PAT) and the ACL on the inside interface (just if&amp;nbsp; you have one ) allowing that communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please attach the entire configuration, next step would be to do some captures&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Dec 2011 23:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832202#M491472</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-21T23:50:13Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832203#M491475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Thank you so much - it is working now and I hope to return the favor one day. I was testing with pings, and it looks like fixup protocol icmp did it for me. I know have a much better understanding of NAT PAT as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Happy Holidyas - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MArtin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 21:29:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832203#M491475</guid>
      <dc:creator>CSCO11589626</dc:creator>
      <dc:date>2011-12-22T21:29:27Z</dc:date>
    </item>
    <item>
      <title>Easy ASA/NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832204#M491477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks David - it looks like I had multiple issues with fixup protocol icmp an no nat control.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Happy Holidays !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Dec 2011 21:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/easy-asa-nat-question/m-p/1832204#M491477</guid>
      <dc:creator>CSCO11589626</dc:creator>
      <dc:date>2011-12-22T21:30:40Z</dc:date>
    </item>
  </channel>
</rss>

