<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 8.3 Static Nat and ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714253#M556319</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are absolutely correct, you don't wanna keep any redundant configuration on your device. You can use the same object for your ACL as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 07 May 2011 11:02:04 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-05-07T11:02:04Z</dc:date>
    <item>
      <title>ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714252#M556316</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the network object below, I am looking for confirmation that It is good practice to use this natted object in my ACL applied incoming to the inside interface rather than have another object specifically for the object My_PC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tested and it does work, however this is my preffered option rather than having to create 2 objects, for the host and also the natted host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# object network My_PC&lt;BR /&gt;ASA(config-network-object)# host 192.168.33.2&lt;BR /&gt;ASA(config-network-object)# nat (inside,outside) static 209.165.201.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ian.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:30:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714252#M556316</guid>
      <dc:creator>iwearing</dc:creator>
      <dc:date>2019-03-11T20:30:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714253#M556319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are absolutely correct, you don't wanna keep any redundant configuration on your device. You can use the same object for your ACL as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 May 2011 11:02:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714253#M556319</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-07T11:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714254#M556322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your confirmation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I wanted to nat the same host to another interface is the config below valid where I would have 2 nats for the object My_PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# object network My_PC&lt;BR /&gt;ASA(config-network-object)# host 192.168.33.2&lt;BR /&gt;ASA(config-network-object)# nat (inside,outside) static 209.165.201.2&lt;/P&gt;&lt;P&gt;ASA(config-network-object)# nat (inside,dmz) static 172.16.100.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ian.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 May 2011 08:27:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714254#M556322</guid>
      <dc:creator>iwearing</dc:creator>
      <dc:date>2011-05-08T08:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714255#M556324</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can create two nats but for different interafaces. The configuration is good and it should definitely work.&lt;/P&gt;&lt;P&gt;Similarly you can also create the below NAT configuration as well, its just the same but its called Manual NAT or twice nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# object network My_PC&lt;BR /&gt;ASA(config-network-object)# host 192.168.33.2&lt;/P&gt;&lt;P&gt;ASA(config)#object network Public_IP&lt;/P&gt;&lt;P&gt;ASA(config-network-object)# host 209.165.201.2&lt;/P&gt;&lt;P&gt;ASA(config)# object network Remote_PC&lt;/P&gt;&lt;P&gt;ASA(config-network-object)# host 172.16.100.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static My_PC Public_IP&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source static&amp;nbsp; My_PC&amp;nbsp; Remote_PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static any any destination static Public_IP My_PC&lt;/P&gt;&lt;P&gt;nat (dmz,inside) source static any any destination static Remote_PC My_PC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the above configuration and the one that you have done are exactly same logically and hold true, but I just prefer it because in the context of a packet processing, manual nat is given preference over auto nat or object nat, so if there are some critical servers or application I usuall do Manual nat for them.&lt;/P&gt;&lt;P&gt;Otherwise you can go for anything that you are comfortable with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 May 2011 15:47:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714255#M556324</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-08T15:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714256#M556327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thansk for the detailed response. Much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ian.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 May 2011 13:11:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714256#M556327</guid>
      <dc:creator>iwearing</dc:creator>
      <dc:date>2011-05-10T13:11:27Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.3 Static Nat and ACL</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714257#M556329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a problem, you can message me on this thread if you face any issues with the configuration &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 May 2011 13:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-3-static-nat-and-acl/m-p/1714257#M556329</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-05-10T13:17:50Z</dc:date>
    </item>
  </channel>
</rss>

