<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT problem on additional interface using ASDM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670927#M557574</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you're having issues with sending VPN traffic through the Outside2 interface,right? What type of VPN are you using? If you are using remote access VPN, VPN traffic has to be exempted from getting NAT-ed.&lt;/P&gt;&lt;P&gt;On the route side, you need a default route for the Outside2 interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route Outside2 0.0.0.0 0.0.0.0 &lt;NEXT-HOP&gt; &lt;/NEXT-HOP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Apr 2011 16:25:00 GMT</pubDate>
    <dc:creator>Anu M Chacko</dc:creator>
    <dc:date>2011-04-18T16:25:00Z</dc:date>
    <item>
      <title>NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670926#M557572</link>
      <description>&lt;P&gt;I'm having a problem routing (natting??) through a new interface.&amp;nbsp; I have Inside, Outside, and Outside2.&amp;nbsp; Outside is a DSL line, Outside2 is a dedicated 3MB line that I want to use just for VPN access to a hosting provider.&amp;nbsp; Inside and Outside interfaces work fine with default route. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When adding static routes for VPN access I get a error on the Packet Tracer that looks like it is hitting the NAT for the Outside interface....&amp;nbsp; I removed the static route for now but can someone point me to what's wrong with the config.&amp;nbsp; I'm using the ASDM application and I think the issue is with how I've tried to configure the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config...&amp;nbsp; When the static routes are in, the Packet Tracer shows the routing through the correct interface but fails on the NAT side. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: Times New Roman; color: #000000; font-size: 12pt;"&gt;interface Ethernet0/0&lt;BR /&gt; description DSL Line&lt;BR /&gt; nameif Outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address dhcp &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; description Inside Office Interface&lt;BR /&gt; nameif Inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; description T1's&lt;BR /&gt; nameif Outside2&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address X.X.X.X &lt;SPAN style="mso-spacerun: yes;"&gt; &lt;/SPAN&gt;255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt; no nameif&lt;BR /&gt; no security-level&lt;BR /&gt; no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 10.0.10.1 255.255.255.0 &lt;BR /&gt; management-only&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name X.net&lt;BR /&gt;object-group service CiscoVPN&lt;BR /&gt; service-object udp eq 10000 &lt;BR /&gt; service-object udp eq 4500 &lt;BR /&gt; service-object udp eq isakmp &lt;BR /&gt;object-group service Email&lt;BR /&gt; description E-mail and secure E-mail&lt;BR /&gt; service-object tcp eq 465 &lt;BR /&gt; service-object tcp eq 993 &lt;BR /&gt; service-object tcp eq 995 &lt;BR /&gt; service-object tcp eq imap4 &lt;BR /&gt; service-object tcp eq pop3 &lt;BR /&gt; service-object tcp eq smtp &lt;BR /&gt; service-object tcp eq ssh &lt;BR /&gt;object-group service FTPandSFTP&lt;BR /&gt; description FTP Grouping and custom ports&lt;BR /&gt; service-object tcp eq 10021 &lt;BR /&gt; service-object tcp eq 10022 &lt;BR /&gt; service-object tcp eq 2022 &lt;BR /&gt; service-object tcp eq 2121 &lt;BR /&gt; service-object tcp eq 5620 &lt;BR /&gt; service-object tcp eq 5630 &lt;BR /&gt; service-object tcp eq 8021 &lt;BR /&gt; service-object tcp eq 990 &lt;BR /&gt; service-object tcp eq 9964 &lt;BR /&gt; service-object tcp eq ftp &lt;BR /&gt; service-object tcp eq ftp-data &lt;BR /&gt;object-group service GMail&lt;BR /&gt; service-object tcp eq 465 &lt;BR /&gt; service-object tcp eq 587 &lt;BR /&gt; service-object tcp eq 995 &lt;BR /&gt;object-group service InstantMessage&lt;BR /&gt; description Trillion and others&lt;BR /&gt; service-object tcp eq 1863 &lt;BR /&gt; service-object tcp eq 4443 &lt;BR /&gt; service-object tcp eq 811 &lt;BR /&gt; service-object tcp eq aol &lt;BR /&gt;object-group service InstantMessageUDP udp&lt;BR /&gt; port-object eq 4443&lt;BR /&gt; port-object eq 5190&lt;BR /&gt; port-object eq 811&lt;BR /&gt;object-group icmp-type PingGroup&lt;BR /&gt; description Ping group for ping and tracert&lt;BR /&gt; icmp-object echo&lt;BR /&gt; icmp-object echo-reply&lt;BR /&gt; icmp-object time-exceeded&lt;BR /&gt; icmp-object timestamp-reply&lt;BR /&gt; icmp-object timestamp-request&lt;BR /&gt; icmp-object traceroute&lt;BR /&gt; icmp-object unreachable&lt;BR /&gt;object-group service VPN&lt;BR /&gt; service-object tcp eq 10000 &lt;BR /&gt;object-group service WebServices tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt; port-object eq domain&lt;BR /&gt;object-group service DM_INLINE_SERVICE_1&lt;BR /&gt; group-object CiscoVPN&lt;BR /&gt; group-object VPN&lt;BR /&gt;access-list Inside_access_in extended permit ip 192.168.1.0 255.255.255.0 any &lt;BR /&gt;access-list Outside_access_in extended permit tcp 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 object-group WebServices &lt;BR /&gt;access-list Outside_access_in extended permit icmp 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 object-group PingGroup &lt;BR /&gt;access-list Outside_access_in extended permit object-group CiscoVPN 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit object-group Email 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit object-group FTPandSFTP 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit object-group GMail 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit object-group InstantMessage 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit object-group VPN 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;access-list Outside_access_in extended permit udp 10.0.0.0 255.255.255.0 192.168.1.0 255.255.255.0 object-group InstantMessageUDP &lt;BR /&gt;access-list Outside2_access_in extended permit tcp X.X.X.X &lt;SPAN style="mso-spacerun: yes;"&gt; &lt;/SPAN&gt;255.255.255.0 192.168.1.0 255.255.255.0 object-group WebServices &lt;BR /&gt;access-list Outside2_access_in extended permit object-group DM_INLINE_SERVICE_1 X.X.X.X 255.255.255.0 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu Outside 1500&lt;BR /&gt;mtu Inside 1500&lt;BR /&gt;mtu Outside2 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;nat-control&lt;BR /&gt;global (Outside) 101 interface&lt;BR /&gt;global (Outside2) 1 interface&lt;BR /&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Outside2) 0 192.168.1.0 255.255.255.0&lt;BR /&gt;access-group Outside_access_in in interface Outside&lt;BR /&gt;access-group Inside_access_in in interface Inside&lt;BR /&gt;access-group Outside2_access_in in interface Outside2&lt;BR /&gt;route Outside 0.0.0.0 0.0.0.0 10.0.0.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;http server enable&lt;BR /&gt;http 10.0.10.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd address 192.168.1.100-192.168.1.253 Inside&lt;BR /&gt;dhcpd dns 192.168.1.2 interface Inside&lt;BR /&gt;dhcpd wins 192.168.1.2 interface Inside&lt;BR /&gt;dhcpd lease 50000 interface Inside&lt;BR /&gt;dhcpd domain bswift.net interface Inside&lt;BR /&gt;dhcpd enable Inside&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 10.0.10.2-10.0.10.254 management&lt;BR /&gt;dhcpd enable management&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum: &lt;BR /&gt;: end&lt;BR /&gt;no asdm history enable&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:22:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670926#M557572</guid>
      <dc:creator>ITGuyChicago</dc:creator>
      <dc:date>2019-03-11T20:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670927#M557574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you're having issues with sending VPN traffic through the Outside2 interface,right? What type of VPN are you using? If you are using remote access VPN, VPN traffic has to be exempted from getting NAT-ed.&lt;/P&gt;&lt;P&gt;On the route side, you need a default route for the Outside2 interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route Outside2 0.0.0.0 0.0.0.0 &lt;NEXT-HOP&gt; &lt;/NEXT-HOP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 16:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670927#M557574</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-04-18T16:25:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670928#M557576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu, I'm using a Cisco VPN client on the Inside interface.&amp;nbsp; It works going out the Outside interface using the default route but when I added a static route and the NAT rule it fails when going out through the Outside2 interface.&amp;nbsp; From what I can tell it's trying to use the Outside interface NAT and not the Outside2 NAT.&amp;nbsp; I tried just doing http through that interface and get the same issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 16:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670928#M557576</guid>
      <dc:creator>ITGuyChicago</dc:creator>
      <dc:date>2011-04-18T16:33:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670929#M557578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To what network are you trying to connect to via VPN? I understand that you're using Remote access VPN. So, the VPN client host should be on the outside trying to connect to your secure network. I think you're trying to send HTTP traffic through the Internet, not through the VPN tunnel. In that case, add:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, you will need a route to the Outside2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. Please mark the question as answered if it has been resolved. Do rate helpful posts. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 16:59:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670929#M557578</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-04-18T16:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670930#M557579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anu, I had to remove the two static routes I had in for Outside2 so the developers could continue to work.&amp;nbsp; When I have the static route's in place the routing appears to be working but fails on NAT.&amp;nbsp; I do have a&amp;nbsp; nat (Inside) 101 0.0.0.0 0.0.0.0&amp;nbsp;&amp;nbsp; but I think what is happening is the packets are hitting the first nat statment for the Outside interface and not hitting or have the wrong nat for Outside2 interface.&amp;nbsp;&amp;nbsp;&amp;nbsp; What should the nat look like for inside, outside, and outside2. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the running config&lt;/P&gt;&lt;P&gt;&lt;SPAN style=": ; mso-bidi-language: AR-SA; mso-fareast-language: EN-US; color: #000000; font-size: 12pt; Times New Roman&amp;quot;: ; mso-ansi-language: EN-US; mso-fareast-theme-font: minor-latin; font-family: Times New Roman; , &amp;quot;: ; serif&amp;quot;: ; mso-fareast-font-family: Calibri; "&gt;nat-control&lt;BR /&gt;global (Outside) 101 interface&lt;BR /&gt;global (Outside2) 1 interface&lt;BR /&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Outside2) 0 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 17:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670930#M557579</guid>
      <dc:creator>ITGuyChicago</dc:creator>
      <dc:date>2011-04-18T17:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670931#M557580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the configuration,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Times New Roman;"&gt;global (Outside) 101 interface&lt;BR /&gt;global (Outside2) 1 interface&lt;BR /&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (Outside2) 0 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;there is no nat statement for the global (Outside2) 1 interface.Every nat command must be matched with a global command. You do have a global (Outside2) 1 interface but you're missing the respective nat command. Traffic from the inside should get dynamically translated to the Outside2 interface.&lt;/P&gt;&lt;P&gt;nat (Inside) 101 0.0.0.0 0.0.0.0 is matched with &lt;SPAN style="color: #000000; font-size: 12pt; font-family: Times New Roman;"&gt;global (Outside) 101 interface. &lt;/SPAN&gt;So you need to add the following command if you want the traffic from the inside network to get translated on the Outside2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the static routes, the packet-tracer fails on NAT because the network on the inside is not specified, which you have to with the above NAT command. Try adding this nat command along with the static route. Hope this explanation is clear enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 17:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670931#M557580</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-04-18T17:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670932#M557581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Anu, I think that is it.&amp;nbsp; I have to wait till afterhours to test the changes though. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Roger&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 18:50:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670932#M557581</guid>
      <dc:creator>ITGuyChicago</dc:creator>
      <dc:date>2011-04-18T18:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670933#M557582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure. Let me know how it goes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S. Please mark the question as answered if it has been resolved. Do rate helpful posts.Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Apr 2011 18:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670933#M557582</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-04-18T18:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670934#M557583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Didn't work....&amp;nbsp; First I added the static routes with no issue.&amp;nbsp; Then added the additional nat though the command line but got a error saying it already existed.&amp;nbsp; I deleted the nat entry in ASDM and then manually added both nat statements, this time no error.&amp;nbsp; Saved the config with no issues&amp;nbsp;&amp;nbsp; Going to packet tracer I still received the same error I had before.&amp;nbsp; The Nat even with the correct route was trying to use the (Outside) nat and not the (Outside2) nat..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The weird part was when I first added the second nat statement and it came back with an error saying it was already there, I looked at the running config and it did not show it.... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what to try now.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Apr 2011 13:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670934#M557583</guid>
      <dc:creator>ITGuyChicago</dc:creator>
      <dc:date>2011-04-19T13:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: NAT problem on additional interface using ASDM</title>
      <link>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670935#M557584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roger,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm still not clear if you are trying to pass Internet traffic or VPN traffic through Outside2 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. If you are trying to connect to the internal network from outside via Remote access VPN , then you need to exempt this traffic from being natted. The command:&lt;SPAN style="color: #000000; font-size: 12pt; font-family: Times New Roman;"&gt;nat (Outside2) 0 192.168.1.0 255.255.255.0 is incorrect. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please change this to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip host &lt;N&gt; host &lt;IP add="" of="" vpn="" client="" on="" the="" internet="" who="" is="" trying="" to="" connect="" to="" the="" internal="" n=""&gt;&lt;/IP&gt;&lt;/N&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;route Outside2 0.0.0.0 0.0.0.0 &lt;NEXT-HOP&gt;&lt;/NEXT-HOP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Or, if you are trying to send Internet traffic through the Outside2 interface from the Inside network, you just need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(Inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;glob(Outside2) 101 interface&lt;/P&gt;&lt;P&gt;route Outside2 0.0.0.0 0.0.0.0 &lt;NEXT-HOP ip=""&gt;&lt;/NEXT-HOP&gt;&lt;/P&gt;&lt;P&gt;no &lt;SPAN style="color: #000000; font-size: 12pt; font-family: Times New Roman;"&gt;nat (Outside2) 0 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it would be great if you could use CLI to make these changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Anu.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Apr 2011 09:11:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-problem-on-additional-interface-using-asdm/m-p/1670935#M557584</guid>
      <dc:creator>Anu M Chacko</dc:creator>
      <dc:date>2011-04-24T09:11:34Z</dc:date>
    </item>
  </channel>
</rss>

