<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782378#M531193</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RE: "ASA we never allows you to telnet to the lowset security level interface &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That made me crack up ... because, of course it makes sense! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am finally having some success in a test lab configuration and have had first successful NAT pass-through. Seems I keep adding more access rules and the test is starting to work. My config is a huge mess however.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 11 Sep 2011 14:32:41 GMT</pubDate>
    <dc:creator>Atl_Gator</dc:creator>
    <dc:date>2011-09-11T14:32:41Z</dc:date>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT Config?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782376#M531191</link>
      <description>&lt;P&gt;Hello Everyone!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recently purchased an ASA 5505 running v8.4(2) and have been trying to get it to work for a week with no.&amp;nbsp; It seems like a very cool product and design but feels like I am missing some magic command to make my config work.&amp;nbsp; Discovered all kinds of interesting oddities (like if you set inside and outside to security level 0 with all open ACLs, the ASDM works but you can't telnet to the device ... would love an explanation for that one &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt; )!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To the problem at hand:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- 6 Public IP addresses translated to 6 internal IPs in two IP block ranges of 3 each.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Allow all traffic to them (the internal IPs have their own firewalls).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; - Optionally configure it to be as fast/efficient as possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am upgrading from a Cisco (Linksys) RV082 because it would die / lock-up at 2M of traffic.&amp;nbsp; But the configuration for the above was very easy and worked right off the bat (just turn on 1-to-1 NAT for the IP ranges).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a nutshell, I just want 1-to-1 Static NAT for these IPs that lets everything through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; External_IP_1&amp;nbsp;&amp;nbsp; 10.0.0.10&lt;/P&gt;&lt;P&gt; External_IP_2&amp;nbsp;&amp;nbsp; 10.0.0.11&lt;/P&gt;&lt;P&gt; External_IP_3&amp;nbsp;&amp;nbsp; 10.0.0.11&lt;/P&gt;&lt;P&gt; External_IP_4&amp;nbsp;&amp;nbsp; 10.0.0.20&lt;/P&gt;&lt;P&gt; External_IP_5&amp;nbsp;&amp;nbsp; 10.0.0.21&lt;/P&gt;&lt;P&gt; External_IP_6&amp;nbsp;&amp;nbsp; 10.0.0.22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just want to get things live at this point and will play with locking things down later.&amp;nbsp; We have a sizable long-term budget so this is pilot testing the ASA but after a week of reading everything I can find about the ASA/8.4 trying like 15 different configurations and talking with some data center pros am still stuck at the "no joy" phase and have never gotten a single packet back to our servers as far as I know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attached our config, it's a mess, but we've tried simple ones, factory resets, etc.&amp;nbsp; Other oddities include DNS working for some devices but not others on the inside network.&amp;nbsp; We just switch unplug things and plug into the RV082 and it all works fine so its not our devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have a super simple 1-to-1 Static NAT config that lets everything through?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: We can't use transparent mode because we need protected access 10.0.0.11&amp;lt;-&amp;gt;10.0.0.21 for example and this can't be on the public net.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782376#M531191</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2019-03-11T21:23:14Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782377#M531192</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hello Mate ,&lt;/P&gt;&lt;P&gt;this is the super example :&lt;/P&gt;&lt;P&gt;internal ip :&lt;/P&gt;&lt;P&gt;10.0.0.1&lt;/P&gt;&lt;P&gt;external public ip :&lt;/P&gt;&lt;P&gt;11.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config :&lt;/P&gt;&lt;P&gt;object network obj_10.0.0.1&lt;/P&gt;&lt;P&gt;host 10.0.0.1&lt;/P&gt;&lt;P&gt;object network obj_11.0.0.1&lt;/P&gt;&lt;P&gt;host 11.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config :&lt;/P&gt;&lt;P&gt;i always prefer to put static rule as the first entries in the table :&lt;/P&gt;&lt;P&gt;nat (inside,outside)&amp;nbsp; 1 source static obj_10.0.0.1 obj _11.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the access-list applied to the&amp;nbsp; outside interface :&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit ip any host 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding the two 0 security level inside and outside . the rule is :&lt;/P&gt;&lt;P&gt;ASA we never allows you to telnet to the lowset security level interface &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH.&lt;/P&gt;&lt;P&gt;cheers.&lt;/P&gt;&lt;P&gt;Mohammad&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2011 14:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782377#M531192</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2011-09-11T14:26:03Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782378#M531193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;RE: "ASA we never allows you to telnet to the lowset security level interface &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That made me crack up ... because, of course it makes sense! &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am finally having some success in a test lab configuration and have had first successful NAT pass-through. Seems I keep adding more access rules and the test is starting to work. My config is a huge mess however.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2011 14:32:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782378#M531193</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-11T14:32:41Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782379#M531194</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;cheers for the good news &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;please rate useful Fourms !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Sep 2011 14:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782379#M531194</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2011-09-11T14:36:01Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782380#M531195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, after another day down the toilet ... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think your config is fantastic and exactly right.&amp;nbsp; I've been able to eliminate a lot more things through selective testing and narrowing and the situation I have now:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; - Everything works perfectly with a web server running on my laptop pretending to be a server with an&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; external IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; - However, the two servers (each of which have two NICs running Linux), no matter what I do, they don't pass &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; packets through the ASA.&amp;nbsp; But the laptop works perfectly in any swapped situation, exactly as written&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; and exactly as configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But no matter what I do, I can't get the servers to pass any packets through&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, at this point my best guess is there is some sort of switch incompatibility between the NICs on the ASA and the ones on my servers or something like this.&amp;nbsp; However everything works great on the RV082 when I move it over.&amp;nbsp; When the servers are connected even if it's only one NIC to the ASA logging into them goes really slow (this could be because of no DNS however).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas before I return the ASA?&amp;nbsp; I can't really afford to burn another week on this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone recommend something better?&amp;nbsp; Not too inclined to buy another one of these.&amp;nbsp; Is there any method I can use to eliminate the NICs as an incompatibility issue?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The network cards we have are "Intel(R) PRO/1000 Network Connection".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually ... I just found this ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P id="dirQna"&gt;"&lt;A href="http://www.ask.com/faqcentral/INTEL_1000.html" name="18"&gt;Do&amp;nbsp; Intel (R) PRO/ 1000 family of Gigabit adapters support Cisco ISL VLANs?&lt;/A&gt;&lt;/P&gt;&lt;DIV id="qnaans"&gt;&lt;DIV&gt;No.&amp;nbsp; Intel(R)'s Gigabit adapters do not support ISL VLANs. They do support&amp;nbsp; the 802.3 VLAN standard, which is much more commonly used.&lt;BR /&gt;&lt;A href="http://wzus1.ask.com/r?t=p&amp;amp;d=us&amp;amp;s=usseo&amp;amp;c=faql&amp;amp;app=seo&amp;amp;l=dir&amp;amp;o=0&amp;amp;sv=0a5c4074&amp;amp;ip=40fab893&amp;amp;id=EB8792ECB784D9872A9DB58B0D611C9F&amp;amp;q=CISCO_1000&amp;amp;p=1&amp;amp;qs=121&amp;amp;ac=590&amp;amp;g=6467UkiXwu29O+&amp;amp;cu.wz=0&amp;amp;en=af&amp;amp;io=17&amp;amp;ep=&amp;amp;eo=&amp;amp;b=a018&amp;amp;bc=&amp;amp;br=&amp;amp;tp=d&amp;amp;ec=25&amp;amp;pt=http%3A%2F%2Fwww.ask.com%2Ffaqcentral%2FINTEL_1000.html...&amp;amp;ex=&amp;amp;url=&amp;amp;u=http://www.ask.com/faqcentral/INTEL_1000.html" target="_blank"&gt;http://www.ask.com/faqcentral/INTEL_1000.html...&lt;/A&gt;"&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which VLAN standard does the ASA use?&amp;nbsp; Let me guess .... (cry)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 02:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782380#M531195</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-12T02:03:58Z</dc:date>
    </item>
    <item>
      <title>ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782381#M531196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; hi ,&lt;/P&gt;&lt;P&gt;ASA support .1q VLAN tagging .&amp;nbsp; can you explain a little more regarding the TWO NICS how thery are connected to the ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Sep 2011 07:07:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782381#M531196</guid>
      <dc:creator>Mohammad Alhyari</dc:creator>
      <dc:date>2011-09-12T07:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782382#M531197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They were connected directly to the ASA and am now trying a switch in between.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried completely different set of devices now and the behavior is sort of absurd.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- 1st device added/NATed ... works amazing.&lt;/P&gt;&lt;P&gt;- 2nd device added/NATed ... this device works but the 2nd device no longer works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These new tests were re-enabling on a complete different network/etc., assigning outside IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been unsuccessful in getting 2 outside IPs to work with NAT and the "object" method.&amp;nbsp; I am now&lt;/P&gt;&lt;P&gt;trying to use the other NAT command sequences independently.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It really feels like the device is crippled or something or is somehow limited to only allow one outside NATed&lt;/P&gt;&lt;P&gt;IP. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone verify their own situation with the ASA 5505 working with more than 1 external public IP NATed?&amp;nbsp; I've been able to make it work with many different devices but never more than 1 IP at a time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 07:10:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782382#M531197</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-13T07:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782383#M531198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, I verified ... I connected multiple devices in the lab.&amp;nbsp; it&amp;nbsp; seems only the first NAT rule works.&amp;nbsp; If I swap the order of the rules&amp;nbsp; then the top one starts working and the follow on ones don't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone verify for me that they actually got more than one IP on the outside interface working ever before?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Sep 2011 07:18:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782383#M531198</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-13T07:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 v8.4 - Most simple 'allow everything' 1-to-1 Static</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782384#M531199</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;After a hellish week, finally isolated the issue.&amp;nbsp;&amp;nbsp; We couldn't allow for any downtime in swapping the ASA in and out so the 4 hour timeout on the ARP caches was never reached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ISP router ARP caches simply were ignoring our gear.&amp;nbsp; The fix was to get the MAC from the old router and enter it in the new one as a clone and as soon as we did that, everything went live and pretty.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a great device.&amp;nbsp; The upside is this hellish experience probably turned me into a baby-CCIE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you everyone for all the help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has this issue again, just wait 4 hours or get the old router WAN MAC address and use the interfaces tab to clone it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Sep 2011 07:22:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-v8-4-most-simple-allow-everything-1-to-1-static-nat/m-p/1782384#M531199</guid>
      <dc:creator>Atl_Gator</dc:creator>
      <dc:date>2011-09-14T07:22:27Z</dc:date>
    </item>
  </channel>
</rss>

