<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Going with NAT Exemption!!!! in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635025#M568843</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA to configure NAT Exemption you would normally do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 2.2.2.0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 4.4.4.0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 5.5.5..0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way when traffic flows between 2.2.2.0/24, 4.4.4.0/24, 5.5.5.0/24 and the remote x.x.x.x/24 traffic will not be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT 0 with ACL takes precedence over any other type of NAT rule.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 26 Jan 2011 21:00:40 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2011-01-26T21:00:40Z</dc:date>
    <item>
      <title>Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635024#M568842</link>
      <description>&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;Hi Folks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;Kindly Have a look to the Attached Diagram&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;The Matter is our 3 sites are connected through MPLS Cloud so that in Site 3 I Dont prefere&amp;nbsp; to go translation to reach the other 2 sites ,and way back...so am thinking to go with NAT Exemption tied with access list to go untraslated to to reach other sites while the others site access resources on the inside network after that i ll be &lt;/SPAN&gt;&lt;SPAN style="color: #333399;"&gt;establiched IPSec Tunnel over the mpls cloud to reach others as well in secure fashion&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;Expert pls advise&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;Rgds&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333399;"&gt;Ibrahim&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:40:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635024#M568842</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2019-03-11T19:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635025#M568843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the ASA to configure NAT Exemption you would normally do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 2.2.2.0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 4.4.4.0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 5.5.5..0 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way when traffic flows between 2.2.2.0/24, 4.4.4.0/24, 5.5.5.0/24 and the remote x.x.x.x/24 traffic will not be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT 0 with ACL takes precedence over any other type of NAT rule.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 26 Jan 2011 21:00:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635025#M568843</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-26T21:00:40Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635026#M568844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does tunel still working later on when i tuning it ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jan 2011 15:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635026#M568844</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-01-27T15:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635027#M568845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you're saying with the NAT 0 rules is that the traffic through the tunnel should not be NATed.&lt;/P&gt;&lt;P&gt;This will not affect the establishment of the tunnel itself (as it only affects traffic going inside the tunnel).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, for the tunnel to be able to pass traffic properly, both sides should agree that the expected traffic is coming from the real addresses (not the translated ones).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Jan 2011 17:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635027#M568845</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-27T17:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635028#M568846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mate,do u think that with NAT Exemption we run out of security coz we r visible to to providor or the tunel solve the sec issue?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jan 2011 15:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635028#M568846</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-01-29T15:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635029#M568847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some people consider NAT as a security mechanism because it ''hides'' the real IP.&lt;/P&gt;&lt;P&gt;I personally like true security mechanisms.&lt;/P&gt;&lt;P&gt;If you tunnel all communication encrypted with IPsec, there no security flaws using NAT 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Jan 2011 23:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635029#M568847</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-01-29T23:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635030#M568848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I dont get the design you are using here. If you are using MPLS cloud then why do you need NAT and stuff...&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;I suppose you would be having your own vrf with the provider. Now you can use routing protocol like BGP or OSPF between CE's. That way you dont need to confgure NAT or something.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;And if you want to have encryption for your data you use VPN over MPLS. If there is any security policy you want to apply you can confgure your ASA to firewall taffic base on site's private IP Addresses.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Hope I am not letting you in wrong direction.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Deepak Khemani&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 06:51:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635030#M568848</guid>
      <dc:creator>Deepak Khemani</dc:creator>
      <dc:date>2011-01-30T06:51:54Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635031#M568849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deepack&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have asa 5510,and 2800 acts as CE router,we rely on static route to reach all sites&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bty our CE Router 2800 its managed by the ISP,so we cant run routing protocol&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 09:38:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635031#M568849</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-01-30T09:38:01Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635032#M568850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mates&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can the Below works for my firewall using NAT Exemption to avoid translation to reach other 3 sites back anf forth over MPLS Cloud&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;description to ISP Mpls&lt;BR /&gt;ip address 11.11.11.1 255.255.255.252&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 12.12.12.12 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list extended all permit ip 0.0.0.0 0.0.0.0 any&lt;/P&gt;&lt;P&gt;nat (inside ) 0 access-list all&lt;/P&gt;&lt;P&gt;route (outside) 0.0.0.0 0.0.0.0 11.11.11.2&lt;BR /&gt;route (inside) 0.0.0.0 0.0.0.0 12.12.12.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks folks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 16:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635032#M568850</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-01-30T16:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635033#M568851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ibrahim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That would actually nonat all the traffic passing across the ASA. If you want to nonat traffic to specific sites, on the destination side of the ACL you would need to put the destination network. For example, you need to nonat the traffic from the inside going to the network 4.2.2.0 255.255.255.0, being the inside network 10.10.10.0 255.255.255.0:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.10.10.0 255.255.255.0 4.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have any problems, let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 16:11:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635033#M568851</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-01-30T16:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: Going with NAT Exemption!!!!</title>
      <link>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635034#M568852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;IN THIS SITUATION, NO NEED FOR PAT CONFIGURATION?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;do i need to configure the nat exeption on other 3 sites also toward my subnet in order to let they&amp;nbsp; ping my resources,or just in my small sites&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 30 Jan 2011 16:52:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/going-with-nat-exemption/m-p/1635034#M568852</guid>
      <dc:creator>Ibrahim Jamil</dc:creator>
      <dc:date>2011-01-30T16:52:00Z</dc:date>
    </item>
  </channel>
</rss>

