<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Processing Query - PIX 6.3 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716668#M534502</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you just explain why you need that. I ask because if you present addresses to the internet then you do not need to NAT the internet source IPs as they go through the firewall so why do you need the dmz addresses as they go to the inside ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may just be a bit of brainlock about this and be missing the obvious &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 01 Aug 2011 13:57:37 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2011-08-01T13:57:37Z</dc:date>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716666#M534500</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a query regarding order of NAT processing with the following configuration (as an example):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;nameif ethernet1 inside security100
nameif ethernet2 dmz1 security50&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (inside,dmz1) 192.168.0.0 192.168.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;route dmz1 10.10.10.0 255.255.255.0 172.16.1.1&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.20.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I initiate traffic from DMZ1 toward a host on the 192.168.0.0/16 (inside) network, I receive a "No translation group found" error message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would have expected the static statement to be matched first, and thus allow this translation to be created?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What are your thoughts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charlie&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:06:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716666#M534500</guid>
      <dc:creator>charles.coutts</dc:creator>
      <dc:date>2019-03-11T21:06:26Z</dc:date>
    </item>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716667#M534501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You would need this nat as well;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz1) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 13:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716667#M534501</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-01T13:47:44Z</dc:date>
    </item>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716668#M534502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you just explain why you need that. I ask because if you present addresses to the internet then you do not need to NAT the internet source IPs as they go through the firewall so why do you need the dmz addresses as they go to the inside ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may just be a bit of brainlock about this and be missing the obvious &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 13:57:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716668#M534502</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-01T13:57:37Z</dc:date>
    </item>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716669#M534503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this because you assume there is no default-route within the LAN ie. if the network being accessed on the LAN is not directly connected to the ASA and there is no default-route then traffic would not get back to the ASA from the LAN ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Aug 2011 17:54:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716669#M534503</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2011-08-01T17:54:15Z</dc:date>
    </item>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716670#M534504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to answer the follow-up questions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with Jon's comments, and so am still unclear as to why the config I have is not sufficient.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charlie&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 09:30:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716670#M534504</guid>
      <dc:creator>charles.coutts</dc:creator>
      <dc:date>2011-08-15T09:30:08Z</dc:date>
    </item>
    <item>
      <title>NAT Processing Query - PIX 6.3</title>
      <link>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716671#M534505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Charles,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I agree with Jon's statement, if the destination network is not in the same network as the ASA, it is good to pat the traffic coming from the dmz to inside. It is not always necessary to create a translation for the source as well, going from lower security to higher security level, but it is just been added as a test to check whether the inside host respond to the firewall inside ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Aug 2011 17:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-processing-query-pix-6-3/m-p/1716671#M534505</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-15T17:55:14Z</dc:date>
    </item>
  </channel>
</rss>

