<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Questions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794495#M533777</link>
    <description>&lt;P&gt;Can anyone help me ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know if the following is possible on an ASA, I have tried to get this working but I am having great diffculties:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a three interface ASA running 8.3 and I want to have the following functionality:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Have some hosts on the DMZ interface use static NAT for bidirectional communications (Which is typical).&lt;/P&gt;&lt;P&gt;2) Have some hosts on the DMZ interface access the Internet using PAT (NAT hide). (For example hosts that are members of a load balanced group so do not need a static entry).&lt;/P&gt;&lt;P&gt;3) Ensure all hosts are accesible from remote access VPN clients using NAT identity (Static, NAT'd the VPN client pool address to itself).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is when I have NAT identity and PAT configured at the same time only one method of access works which I believe is to do with the NAT order of operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do what I require ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help .... It is difficult to send a config as the firewall I have been tasked to work on is a complete mess !!!, but I will try and put together the relevant parts and post in due course.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:10:20 GMT</pubDate>
    <dc:creator>paultribe</dc:creator>
    <dc:date>2019-03-11T21:10:20Z</dc:date>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794495#M533777</link>
      <description>&lt;P&gt;Can anyone help me ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know if the following is possible on an ASA, I have tried to get this working but I am having great diffculties:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a three interface ASA running 8.3 and I want to have the following functionality:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Have some hosts on the DMZ interface use static NAT for bidirectional communications (Which is typical).&lt;/P&gt;&lt;P&gt;2) Have some hosts on the DMZ interface access the Internet using PAT (NAT hide). (For example hosts that are members of a load balanced group so do not need a static entry).&lt;/P&gt;&lt;P&gt;3) Ensure all hosts are accesible from remote access VPN clients using NAT identity (Static, NAT'd the VPN client pool address to itself).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is when I have NAT identity and PAT configured at the same time only one method of access works which I believe is to do with the NAT order of operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to do what I require ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help .... It is difficult to send a config as the firewall I have been tasked to work on is a complete mess !!!, but I will try and put together the relevant parts and post in due course.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794495#M533777</guid>
      <dc:creator>paultribe</dc:creator>
      <dc:date>2019-03-11T21:10:20Z</dc:date>
    </item>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794496#M533779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first two are very typical and can be done surely, but always for static nat users, if they access internet, they woudl always use the mapped ip and not pat ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the 3rd, in 8.3, there is no nat prefernce, the one which is most specific, would take precedence, we just have two types of nats, auto nat and manual nat, and manual nayt atkes preference. So there is not really a nat exempt or pat preference, it depends upon the flow of traffic, the order in nat table and how specific it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 16:15:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794496#M533779</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-11T16:15:07Z</dc:date>
    </item>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794497#M533781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When the VPN host tries to access a host in the DMZ that does not have a static NAT I get the following message:&lt;/P&gt;&lt;P&gt;&lt;A name="wp6175477"&gt;&lt;BR /&gt;&lt;/A&gt;%ASA-5-305013: Asymmetric NAT rules matched for forward and reverse &lt;BR /&gt;flows; Connection &lt;EM&gt;protocol&lt;/EM&gt; src &lt;EM&gt;interface_name&lt;/EM&gt;:&lt;EM&gt;source_address&lt;/EM&gt;/&lt;EM&gt;source_port&lt;/EM&gt;[(&lt;EM&gt;idfw_user&lt;/EM&gt;)] dst &lt;EM&gt;interface_name&lt;/EM&gt;:&lt;EM&gt;dst_address&lt;/EM&gt;/&lt;EM&gt;dst_port&lt;/EM&gt;[(&lt;EM&gt;idfw_user&lt;/EM&gt;)] denied due to &lt;BR /&gt;NAT reverse path failure.&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 16:38:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794497#M533781</guid>
      <dc:creator>paultribe</dc:creator>
      <dc:date>2011-08-11T16:38:32Z</dc:date>
    </item>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794498#M533783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a packet flow, the packets are checvked for translations, from source to destination and vice-versa as well, if there is a nat statement, which is taking precedence over the nat statement that we are using for the return packet, thats when you see the error, or if there is no translation for the reverse flow, so this might be difficult to point out the missing chunk in your config, but would only be done after having a look at the config and understanding the flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Aug 2011 18:24:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794498#M533783</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-11T18:24:18Z</dc:date>
    </item>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794499#M533786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun (In case you are interested)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have managed to resolve the issue now. I should have mentioned the task I am doing is also upgrading the ASA from 8.2 to 8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that during the upgrade all original No NAT statements that let VPN clients access internal resources also did not work. I found that this was due to the upgrade procedure making the rules "unidirectional". Once I corrected this I applied the same type of No NAT rule to my new DMZ interface and everything now works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 11:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794499#M533786</guid>
      <dc:creator>paultribe</dc:creator>
      <dc:date>2011-08-12T11:08:41Z</dc:date>
    </item>
    <item>
      <title>NAT Questions</title>
      <link>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794500#M533788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey thats good, I am very much interested and yes, if you were upgarding to version 8.3, you might hit this bug &lt;/P&gt;&lt;P&gt;CSCti36048and as i said the unidirectional keyword restricts the traffic in only one dircetion, so that caused the error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Aug 2011 11:21:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-questions/m-p/1794500#M533788</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-12T11:21:41Z</dc:date>
    </item>
  </channel>
</rss>

