<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT control issue - traffic with and w/o nat allowed in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746169#M529880</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm just going to open a ticket on this item. I'd rather not put too much information on a public forum.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 27 Sep 2011 12:56:53 GMT</pubDate>
    <dc:creator>mitchrussell42</dc:creator>
    <dc:date>2011-09-27T12:56:53Z</dc:date>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746167#M529878</link>
      <description>&lt;P&gt;Inside, outside, and two discrete DMZs. Inside 100, outside 0, DMZ1 50, DMZ2 40. DMZ1 -&amp;gt; 192.168.7.0/24. DMZ2 -&amp;gt; 192.168.8.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wireless APs on DMZ2 - using public DNS, want to hit FTP server on DMZ1 with public address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ2,DMZ1) source static WAPs WAPs destination static ftp.contres.com criftp service ftp-service ftp-service&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;criftp is 192.168.7.130.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm bench testing this config to replace a PIX. New ASA 5520s with 8.4(2). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ftp from 192.168.8.32 to 174.76.57.40 and see the connection on the FTP server.&lt;/P&gt;&lt;P&gt;I can also ftp from 192.168.8.32 to 192.168.7.130 and see the connection on the same FTP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet trace does not show this to be possible. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, it is real. There are no bypass paths in my config, the connections show on the firewall for each test case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HELP!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746167#M529878</guid>
      <dc:creator>mitchrussell42</dc:creator>
      <dc:date>2019-03-11T21:30:20Z</dc:date>
    </item>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746168#M529879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We still don't know all the IP addressing. Can you tell us how the WAPs object and the ftp.contres.com object are defined? It is always best when troubleshooting these issues to get the full 'show nat detail output'. This will tell us if any other rules are being matched prior the the rule in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 12:34:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746168#M529879</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-09-27T12:34:52Z</dc:date>
    </item>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746169#M529880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I'm just going to open a ticket on this item. I'd rather not put too much information on a public forum.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 12:56:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746169#M529880</guid>
      <dc:creator>mitchrussell42</dc:creator>
      <dc:date>2011-09-27T12:56:53Z</dc:date>
    </item>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746170#M529881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand. For your own troubleshooting, the 'show nat detail' command is your friend. Go through the Source pool for each nat entry and try and locate each hit for the Source IP address you are testing. Then check the destination and make sure it matches what is being received in the packets. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember, the Manual Nat statements are processed in order. So make sure there are no Manual Nat entries above the entry you wish to use that match the traffic in question. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brendan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 Sep 2011 13:29:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746170#M529881</guid>
      <dc:creator>brquinn</dc:creator>
      <dc:date>2011-09-27T13:29:07Z</dc:date>
    </item>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746171#M529882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, here is an instance with all fake info:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC3 &amp;lt;--&amp;gt; ASA &amp;lt;--&amp;gt; PC2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PC3 is 5.5.5.2, WinXP, gw 5.5.5.1&lt;/P&gt;&lt;P&gt;PC2 is 192.168.200.100, Ubuntu, gw 192.168.200.1&lt;/P&gt;&lt;P&gt;ASA is 5.5.5.1 outside, 192.168.200.1 inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From PC3, I can connect to the NAT of PC2 at 5.5.5.50 with ftp.&lt;/P&gt;&lt;P&gt;Also, from PC3, I can connect to the real address of PC2 at 192.168.200.100 with ftp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to use this style of NAT so I can map three outside IPs with three different services to the same real server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Isn't this a bug for the private addresses to be exposed to the outside? I know that these are normally routed over the Internet, but routing tables can be manipulated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 5.5.5.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;boot system disk0:/asa842-k8.bin&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;object network public-web&lt;/P&gt;&lt;P&gt; host 5.5.5.55&lt;/P&gt;&lt;P&gt;object network public-ftp&lt;/P&gt;&lt;P&gt; host 5.5.5.50&lt;/P&gt;&lt;P&gt;object network private-server&lt;/P&gt;&lt;P&gt; host 192.168.200.100&lt;/P&gt;&lt;P&gt;object service ftp-obj&lt;/P&gt;&lt;P&gt; service tcp destination eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any object private-server eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended deny ip any any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-645.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static public-ftp private-server service ftp-obj ftp-obj&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_any&lt;/P&gt;&lt;P&gt; nat (inside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;timeout tcp-proxy-reassembly 0:01:00&lt;/P&gt;&lt;P&gt;timeout floating-conn 0:00:00&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;user-identity default-domain LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;http 192.168.200.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcpd auto_config outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;no threat-detection statistics tcp-intercept&lt;/P&gt;&lt;P&gt;webvpn&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 15:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746171#M529882</guid>
      <dc:creator>mitchrussell42</dc:creator>
      <dc:date>2011-09-28T15:17:41Z</dc:date>
    </item>
    <item>
      <title>NAT control issue - traffic with and w/o nat allowed</title>
      <link>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746172#M529883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Workaround - black hole technique&lt;/P&gt;&lt;P&gt;If you packet trace both scenarios, you find the 5.5.5.50 access does a translation, but no translation is attempted for 192.168.200.100. Both then match the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, put a dummy translation into the NAT statements. I used:&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static private-server black-hole service ftp-obj ftp-obj&lt;/P&gt;&lt;P&gt;object network black-hole&lt;/P&gt;&lt;P&gt;&amp;nbsp; host 172.32.254.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the access to the private address of the server gets translated to a bad address, and dies the death it deserves.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still contend that allowing access w/o NAT is an unwanted feature on Cisco's part.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Sep 2011 15:52:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-control-issue-traffic-with-and-w-o-nat-allowed/m-p/1746172#M529883</guid>
      <dc:creator>mitchrussell42</dc:creator>
      <dc:date>2011-09-28T15:52:33Z</dc:date>
    </item>
  </channel>
</rss>

