<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA - NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740878#M533518</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt; - I have a ASA which is connected with 2 internet service providers. Both providers have their respective public IP addresses configured to two different physical interfaces. I NAT the Inside zone proxy to one of the provider interface for browsing purpose.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Requirement - &lt;/STRONG&gt;There should be a automatic switchover of proxy from one provider to another when the configured NAT provider fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution -&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The default route configured can be switched automatically from one provider to another using IP SLA monitoring; same has been tested and it works on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem -&lt;/STRONG&gt; The proxy NAT should be switched automatically from one provider to another. Is there any mechanism where the proxy is configured with 2 NAT ID's (of two providers), where one is preferred and if that goes down the other ID is picked?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Amol.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:11:45 GMT</pubDate>
    <dc:creator>rush2amol</dc:creator>
    <dc:date>2019-03-11T21:11:45Z</dc:date>
    <item>
      <title>ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740878#M533518</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Background&lt;/STRONG&gt; - I have a ASA which is connected with 2 internet service providers. Both providers have their respective public IP addresses configured to two different physical interfaces. I NAT the Inside zone proxy to one of the provider interface for browsing purpose.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Requirement - &lt;/STRONG&gt;There should be a automatic switchover of proxy from one provider to another when the configured NAT provider fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Solution -&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The default route configured can be switched automatically from one provider to another using IP SLA monitoring; same has been tested and it works on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem -&lt;/STRONG&gt; The proxy NAT should be switched automatically from one provider to another. Is there any mechanism where the proxy is configured with 2 NAT ID's (of two providers), where one is preferred and if that goes down the other ID is picked?&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Amol.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740878#M533518</guid>
      <dc:creator>rush2amol</dc:creator>
      <dc:date>2019-03-11T21:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740879#M533519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not a tested solution but I think this will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 :&amp;nbsp; Place ISP in different security levels. ISP1 in outside with security level 100 and ISP 2 in outsuide1 with security level&amp;nbsp; say 95.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 : Config IP SLA ( as already done ) for routing switchover.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 3: Identify address to be natted with nat (inside) 1&amp;nbsp; 0.0.0.0 0.0.0.0 ( For all addresses)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 4: Repeat the above address with diff NAT ID&amp;nbsp; nat (inside) 2&amp;nbsp; 0.0.0.0 0.0.0.0 ( For all addresses)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 5: Create twop global pools with NAT ID 1 and 2 as &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (outside) 1 &lt;ISP1 ip="" address=""&gt;&lt;/ISP1&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; global (Outside2) 2 &lt;ISP2 ip="" address=""&gt;&lt;/ISP2&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not tested the solution as I don't have access to ASA box. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But to be honest I think what will happen is traffic will match NAT ID 1 and ASA will perform required NATting and sent to ISP 2 interface (As bcoz of IP SLA&amp;nbsp; default route now points to ISP 2. ISP 2 might not transmit the traffic bcoz source address in packet will be of ISP1. And also in case if it transmits ISP 2 will not get any answer in return because remote host will send reply to source address of packet which is ISP 1. And ISP1 is down. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you try this stuff please let me know if it worked or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Aug 2011 11:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740879#M533519</guid>
      <dc:creator>Deepak Khemani</dc:creator>
      <dc:date>2011-08-19T11:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740880#M533521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After more research I found the soution for the problem you rae facing. Previous answers was full of crap and type mistakes. Security level for outside interface as 100 and 95.&amp;nbsp; My bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt;nameif outsidePrimary&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 1.1.1.2 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt;nameif outsidebackup&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- The interface attached to the Secondary ISP.&lt;BR /&gt;!--- "backup" was chosen here, but any name can be assigned.&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 2.2.2.2 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.22.1.163 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outsidePrimary) 1 interface&lt;BR /&gt;global (outsidebackup) 1 interface&lt;BR /&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- NAT Configuration for Outside and Backup&lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 1.1.1.1 1 track 1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Enter this command in order to track a static route.&lt;BR /&gt;!--- This is the static route to be installed in the routing &lt;BR /&gt;!--- table while the tracked object is reachable.&amp;nbsp; The value after&lt;BR /&gt;!--- the keyword "track" is a tracking ID you specify. &lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;route backup 0.0.0.0 0.0.0.0 2.2.2.1 254&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;SPAN style="color: #0000ff;"&gt;!--- Define the backup route to use when the tracked object is unavailable. &lt;BR /&gt;!--- The administrative distance of the backup route must be greater than &lt;BR /&gt;!--- the administrative distance of the tracked route.&lt;BR /&gt;!--- If the primary gateway is unreachable, that route is removed&lt;BR /&gt;!--- and the backup route is installed in the routing table&lt;BR /&gt;!--- instead of the tracked route. &lt;/SPAN&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;BR /&gt;And then define the config for IP SLA Monitor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Aug 2011 13:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740880#M533521</guid>
      <dc:creator>Deepak Khemani</dc:creator>
      <dc:date>2011-08-19T13:01:36Z</dc:date>
    </item>
    <item>
      <title>ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740881#M533522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;Thx for responding. I am not sure if the given solution would work; actually i haven’t come across anything such specific but what i see is the firewall do accept it. Following for your perusal - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; margin-bottom: .0001pt;"&gt;Hostname/admin# sh run global 100&lt;/P&gt;&lt;P&gt;global (outside) 100 21.21.14.250 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;global (dmz) 100 21.21.13.250 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;Hostname/admin#&lt;/P&gt;&lt;P&gt;Hostname/admin# sh run nat 100&lt;/P&gt;&lt;P&gt;nat (inside) 100 10.224.45.254 255.255.255.255&lt;/P&gt;&lt;P&gt;Hostname/admin#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me check on this and would let you know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would also like to inform you on the following config which i checked and it didn’t work; just for your information...&lt;/P&gt;&lt;P&gt;global (outside1) 100 interface &lt;/P&gt;&lt;P&gt;global (outside2) 101 interface &lt;/P&gt;&lt;P&gt;Hostname/admin#&lt;/P&gt;&lt;P&gt;Hostname/admin# sh run | i pat&lt;/P&gt;&lt;P&gt;access-list pat-SP1 permit ext permit ip host 10.224.45.100 any&lt;/P&gt;&lt;P&gt;access-list pat-SP2 permit ext permit ip host 10.224.45.100 any&lt;/P&gt;&lt;P&gt;Hostname/admin# sh run | i nat&lt;/P&gt;&lt;P&gt;nat (inside) 100 access-list pat-SP1&lt;/P&gt;&lt;P&gt;nat (inside) 101 access-list pat-SP2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the above was entered the browsing was completely stopped, but when i removed one PAT access list it again started to work. The default route was anyways been taken by the IP SLA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Amol&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 14:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740881#M533522</guid>
      <dc:creator>rush2amol</dc:creator>
      <dc:date>2011-08-22T14:46:20Z</dc:date>
    </item>
    <item>
      <title>ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740882#M533523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not really sure about your exact requirement but what I gather is you have ntwo ISP providers and you would want these two ISP's for redundancy, so if the first goes down the seconda takes over automatically????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well if thats your requirement, have you configured sla monitoring on the ASA, because without it, this would not work and ASA would keep punting the packets to your DG with the least metric default route. So you need to add these commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;sla monitor 123
 type echo protocol ipIcmpEcho 10.0.0.1 interface outside
 num-packets 3
 frequency 10&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;sla monitor schedule 123 life forever start-time now&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;track 1 rtr 123 reachability&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;global (outside) 1 interface
global (backup) 1 interface
nat (inside) 1 172.16.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;route outside 0.0.0.0 0.0.0.0 10.200.159.1 1 track 1&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;route backup 0.0.0.0 0.0.0.0 10.25.0.250.1 254&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without this config, the switchover wont happen automatically,&lt;STRONG&gt;&lt;STRONG&gt; the ip's in above example are just for example purpose.&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You can refer to this doc for more help:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this is what you were looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Aug 2011 15:46:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740882#M533523</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-22T15:46:37Z</dc:date>
    </item>
    <item>
      <title>ASA - NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740883#M533524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Deepak,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tried the following config as mentioned by you earlier but it didnt work &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (outsidePrimary) 1 interface&lt;BR /&gt;global (outsidebackup) 1 interface&lt;BR /&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Interesting to note if ping icmp works as expected. Means as per the required routing and its manipulation using the IP SLA necessary pat gets assigned and the ping goes fine, but somehow the connectivity is not working. No browsing, no successfull sessions. But if i remove the alternate NAT (global (outsidebackup) 1 interface) then the browsing starts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea why is this happening ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Amol.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 May 2012 15:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat/m-p/1740883#M533524</guid>
      <dc:creator>rush2amol</dc:creator>
      <dc:date>2012-05-12T15:00:33Z</dc:date>
    </item>
  </channel>
</rss>

