<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Difference between double nat and twice nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765047#M493701</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. I have a question here. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic will get initiated from 10.1.1.1 and the ultimate destination will be&amp;nbsp; 172.16.1.1 (translated destination address). The source address (10.1.1.1) will get hide natted to the interface address. The translated destination address (172.16.1.1) will get translated to the external destination (192.168.1.1). so the traffic is like&amp;nbsp; this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. SA: 10.1.1.1&amp;nbsp; DA: 172.16.1.1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the traffic leaves the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. SA: Firewall Interface address DA: 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Return traffic from 192.168.1.1 will get natted back to 172.16.1.1 once it reaches the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please confirm whether I am correct here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shyam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 11 Nov 2011 04:55:00 GMT</pubDate>
    <dc:creator>sshantikumar</dc:creator>
    <dc:date>2011-11-11T04:55:00Z</dc:date>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765045#M493699</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been seeing this concept of Twice NAT on cisco devices and Double NAT on Checkpoint devices. Somehow I am not able to understand how they work. Are they the same? Could anyone please explain whaht these concepts actually achieve? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am mainly looking for an example where the destination also changes. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shyam&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:48:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765045#M493699</guid>
      <dc:creator>sshantikumar</dc:creator>
      <dc:date>2019-03-11T21:48:41Z</dc:date>
    </item>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765046#M493700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shyam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right that twice NAT simply means that both the source and the destination IP addresses in the packet are translated. In the new NAT syntax of ASA 8.3 and 8.4, you can do this in a single command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network obj-10.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 10.1.1.1&lt;/P&gt;&lt;P&gt;object network obj-192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 192.168.1.1&lt;/P&gt;&lt;P&gt;object network obj-172.16.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 172.16.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static obj-10.1.1.1 interface destination static obj-192.168.1.1 obj-172.16.1.1&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this example, if a packet sourced from 10.1.1.1 and destined to 192.168.1.1 arrives at the inside interface, the ASA will translate the source address to the outside interface IP. It will also translate the destination address to 172.16.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can find more configuration examples here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_rules.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Nov 2011 14:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765046#M493700</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-11-10T14:54:37Z</dc:date>
    </item>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765047#M493701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. I have a question here. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic will get initiated from 10.1.1.1 and the ultimate destination will be&amp;nbsp; 172.16.1.1 (translated destination address). The source address (10.1.1.1) will get hide natted to the interface address. The translated destination address (172.16.1.1) will get translated to the external destination (192.168.1.1). so the traffic is like&amp;nbsp; this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. SA: 10.1.1.1&amp;nbsp; DA: 172.16.1.1&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the traffic leaves the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. SA: Firewall Interface address DA: 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Return traffic from 192.168.1.1 will get natted back to 172.16.1.1 once it reaches the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please confirm whether I am correct here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shyam&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2011 04:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765047#M493701</guid>
      <dc:creator>sshantikumar</dc:creator>
      <dc:date>2011-11-11T04:55:00Z</dc:date>
    </item>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765048#M493702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Shyam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're correct on the source address but the destination address should be reversed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. SA: 10.1.1.1, DA: 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After leaving the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. SA: Outside interface IP, DA: 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Nov 2011 13:37:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765048#M493702</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2011-11-11T13:37:39Z</dc:date>
    </item>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765049#M493703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello mirober2,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess Shyam was right in his statement.As per this cisco dcument:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_rules.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format of the command is "static(inside,outside) source static real_ip mapped_ip destination static mapped_ip real_ip".&lt;/P&gt;&lt;P&gt;So , SA=10.1.1.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DA=172.16.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; After leaving the firewall&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SA=Outside Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DA=192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Dinesh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 17:24:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765049#M493703</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2013-04-26T17:24:39Z</dc:date>
    </item>
    <item>
      <title>Difference between double nat and twice nat</title>
      <link>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765050#M493704</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Shyam,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went through your query and have found&amp;nbsp; link's which would help you in solving your query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As rightly said the Twice NAT is performed on the cisco devices and for the same please refer to the following link as it would help you understand its fundamentals:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/nat_rules.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/asdm63/configuration_guide/nat_rules.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly Double NAT is performed on the Checkpoint Devices the following link will be helpful for the same:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.practicallynetworked.com/networking/fixing_double_nat.htm"&gt;http://www.practicallynetworked.com/networking/fixing_double_nat.htm&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 20:33:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/difference-between-double-nat-and-twice-nat/m-p/1765050#M493704</guid>
      <dc:creator>harvisin</dc:creator>
      <dc:date>2013-04-30T20:33:04Z</dc:date>
    </item>
  </channel>
</rss>

