<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outside nat question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627747#M589942</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1. whether the below NAT exempt with remote vpn client as source (on out of asa) bidirectional or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A1. It is bidirectional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A2. An xlate will be created as soon as this static nat is configured. (That is why it is called static).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# show run access-l&lt;BR /&gt;access-list test extended permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;BR /&gt;# show run static&lt;BR /&gt;static (inside,outside) 10.1.1.0&amp;nbsp; access-list test&lt;BR /&gt;# show xlate&lt;BR /&gt;1 in use, 2 most used&lt;BR /&gt;Global 10.1.1.0 Local 10.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 19 Mar 2011 10:12:53 GMT</pubDate>
    <dc:creator>padatta</dc:creator>
    <dc:date>2011-03-19T10:12:53Z</dc:date>
    <item>
      <title>Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627736#M589931</link>
      <description>&lt;P&gt;hi experts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a question for the following outside nat statement when the user is coming from outside of the ASA and requires to go to inside destination&lt;/P&gt;&lt;P&gt;is the below nat at all possible ? i.e nat exempt with outside .if yes , then in what circumstance it will be used .this kind of seem to do identity&lt;/P&gt;&lt;P&gt;source translation from outside to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list OUT_NAT outside&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip &amp;lt;Source&amp;gt; &amp;lt;Destination&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip interface outside 10.1.1.1 255.255.255.255&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:02:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627736#M589931</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2019-03-11T20:02:45Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627737#M589932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list OUT_NAT outside&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip &lt;SOURCE&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is used to tell the ASA to bypass NAT for traffic received on its outside interface from &lt;SOURCE&gt; to &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to give you an example...&lt;/P&gt;&lt;P&gt;If you have a nat rule to provide Internet access to VPN clients terminating on the outside interface:&lt;/P&gt;&lt;P&gt;nat (outside) 1 VPN_POOL&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then, you can add the above NAT0 rule to bypass NAT between the VPN client pool and another Site-to-Site tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Mar 2011 13:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627737#M589932</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-03-08T13:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627738#M589933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for replying , und'stnd this now .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so you mean the VPN Clients will be able to access the internal devices of the ASA1 (apart from accessing internet from the same ASA1 ) and devices of other ASA2 as well , if ASA1 and ASA2 have site to site vpn among them (see below ) ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Inside servers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;ASA2----ASA1----VPN Clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also , this seems to resemble closely to the "Split tunnel" functionality in the VPN ? right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) have one more query&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list OUT_NAT outside&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip &lt;SOURCE&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can we&amp;nbsp; also achieve the above with the help of static policy (identity) nat i.e something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside)&amp;nbsp; &lt;VPNPOOL&gt; access-list OUT_NAT&lt;/VPNPOOL&gt;&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip&amp;nbsp; &lt;VPNPOOL&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/VPNPOOL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where the destination will be ASA inside servers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Mar 2011 11:04:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627738#M589933</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-09T11:04:26Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627739#M589934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jayesh,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Your 1st query :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;by using the nat exempt mentioned by fred we can access&amp;nbsp; both the internal servers as well as networks behind ASA2 if you have a site to site vpn configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is totally different from split tunneling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Split tunneling we actually differentiate the traffic that is supposed to flow through the VPN tunnel from the clients end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in case you access-list as follows in the split tunnel : access-list split standard permit 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We mention that we need to send all traffic to 10.0.0.0 through the VPN tunnel and rest all other traffic need not be encrypted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your 2nd Query:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We could also implement it using the Static policy Nat as suggested by you . But the only condition being the traffic has to be initiated from the source mentioned in the access-list. Until then there would not be a entry in the xlate table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT exempt is bi-directional and it doesnt create an entry in the xlate table where as policy nat is unidirectional and hence traffic has to be sourced from the source ip mentioned in the access-list to create entry in the xlate table.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this addresses all the query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Mar 2011 15:36:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627739#M589934</guid>
      <dc:creator>praiyeng</dc:creator>
      <dc:date>2011-03-09T15:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627740#M589935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for explaining it praveen , but the below nat is only for the low to higher source identity translation as it has outside keyword and i dont think it will be bidirectional , though the NAT exempts are bidirectional&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (outside) 0 access-list OUT_NAT outside&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip &lt;SOURCE&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also static identity policy nat is bidirectional . this below eg. will act as a source translation for outside (lower to higher) and destination dranslation from higher to lower .right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside)&amp;nbsp; &lt;VPNPOOL&gt; access-list OUT_NAT&lt;/VPNPOOL&gt;&lt;/P&gt;&lt;P&gt;access-list OUT_NAT extended permit ip&amp;nbsp; &lt;VPNPOOL&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/VPNPOOL&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Mar 2011 11:53:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627740#M589935</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-11T11:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627741#M589936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The usage of the keyword " outside" purely defines the static as a destination Nat and hence you will need a source nat also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The policy Nat is bi-directional but after an Xlate entry is created. Hence the traffic has to be initiated from the source mentioned in the access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,outside) 10.1.1.0 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic has to be initiated from 10.0.0.0 only then there would be a entry in the xlate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;once there is a entry in the xlate the entry works as bidirectional.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 12 Mar 2011 01:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627741#M589936</guid>
      <dc:creator>praiyeng</dc:creator>
      <dc:date>2011-03-12T01:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627742#M589937</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;praveen , thanks for replying&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) i am still not clear if this is a bidirectional NAT ? in my views i dont think so it is bidirectional (usually NAT exempts are bidirectional but this is not )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list OUT_NAT outside&lt;BR /&gt;access-list OUT_NAT extended permit ip &lt;SOURCE&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) as per you the "outside" keyword&amp;nbsp; purely defines the static as a "destination Nat" .i dont think is true as in below example we are doing a source identity translation (assuming VPN CLIENT from outside initates the traffic)&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;static (outside,inside)&amp;nbsp; &lt;VPNPOOL&gt; access-list OUT_NAT&lt;BR /&gt;access-list OUT_NAT extended permit ip&amp;nbsp; &lt;VPNPOOL&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/VPNPOOL&gt;&lt;/VPNPOOL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) just for my curiosity there is one example you mentioned below and indeed this has nothing to do with the above two&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,outside) 10.1.1.0 access-list test&lt;BR /&gt;access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my ques : is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Mar 2011 02:57:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627742#M589937</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-13T02:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627743#M589938</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi experts ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any input on this is highly apprciated .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Mar 2011 06:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627743#M589938</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-16T06:54:37Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627744#M589939</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi experts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i was waiting for some expert comment on this .kindly help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2011 02:22:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627744#M589939</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-18T02:22:52Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627745#M589940</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Got lost in the mail thread. The objective of using outside nat / indentity nat for VPN pool is not clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please elaborate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2011 08:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627745#M589940</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-03-18T08:50:13Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627746#M589941</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi paps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;making it more clear .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) whether the below NAT exempt with remote vpn client as source (on out of asa) bidirectional or not&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list OUT_NAT outside&lt;BR /&gt;access-list OUT_NAT extended permit ip &lt;SOURCE&gt; &lt;DESTINATION&gt;&lt;/DESTINATION&gt;&lt;/SOURCE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) a simple policy based nat is as follows (nothing to do with outside nat)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,outside) 10.1.1.0 access-list test&lt;BR /&gt;access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my ques : is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2011 02:20:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627746#M589941</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-19T02:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627747#M589942</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q1. whether the below NAT exempt with remote vpn client as source (on out of asa) bidirectional or not?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A1. It is bidirectional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Q2. is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A2. An xlate will be created as soon as this static nat is configured. (That is why it is called static).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# show run access-l&lt;BR /&gt;access-list test extended permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;BR /&gt;# show run static&lt;BR /&gt;static (inside,outside) 10.1.1.0&amp;nbsp; access-list test&lt;BR /&gt;# show xlate&lt;BR /&gt;1 in use, 2 most used&lt;BR /&gt;Global 10.1.1.0 Local 10.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2011 10:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627747#M589942</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-03-19T10:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627748#M589943</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi paps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for answring .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regarding 2nd ques&amp;nbsp; , you have mentioned that xlate is created as soon as static nat is configured .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;while praveen mentioned following if you see the initial part of this thread (mentioned in " ")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The policy Nat is bi-directional but after an Xlate entry is created. Hence the traffic has to be initiated from the source mentioned in the access-list.&lt;/P&gt;&lt;P&gt; &lt;BR /&gt;For example :&lt;BR /&gt;Static (inside,outside) 10.1.1.0 access-list test&lt;BR /&gt;access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic has to be initiated from 10.0.0.0 only then there would be a entry in the xlate.once there is a entry in the xlate the entry works as bidirectional"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so which one of the above is true ? Thats the reason my question was what if 11.0.0.0 initates the traffic first .&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2011 13:09:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627748#M589943</guid>
      <dc:creator>jvardhan29</dc:creator>
      <dc:date>2011-03-19T13:09:22Z</dc:date>
    </item>
    <item>
      <title>Re: Outside nat question</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627749#M589944</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, as per the above pasted outputs (again pasted below), the xlate was created as soon as static was configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# show run access-li&lt;BR /&gt;access-list test extended permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0&lt;BR /&gt;# show run static&lt;BR /&gt;static (inside,outside) 10.1.1.0&amp;nbsp; access-list test&lt;BR /&gt;# show xlate&lt;BR /&gt;1 in use, 2 most used&lt;BR /&gt;Global 10.1.1.0 Local 10.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be good to verify this on your ASA as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Mar 2011 13:49:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-question/m-p/1627749#M589944</guid>
      <dc:creator>padatta</dc:creator>
      <dc:date>2011-03-19T13:49:50Z</dc:date>
    </item>
  </channel>
</rss>

