<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Triple Natting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644478#M591429</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you NAT, the NAT process take up system resources.&lt;/P&gt;&lt;P&gt;Honestly I don't see the need for NATing more than once (perhaps two for overlapping), but why three times?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 17 Feb 2011 19:43:12 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2011-02-17T19:43:12Z</dc:date>
    <item>
      <title>Triple Natting</title>
      <link>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644477#M591423</link>
      <description>&lt;P&gt;Hi friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some doubt in the below scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; gig0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; gig0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0/0.4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; eth0/1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; fa0/47&lt;/P&gt;&lt;P&gt;--------Internet router ----------------&amp;gt; ASA Context (Virtual) Firewall -----------------&amp;gt; ASA 5510 Firewall ----------------&amp;gt;Core switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1xx.2xx.3xx.4&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.2/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.5/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.0.10.6/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.10.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to access internet from the coreswitch. I have another virtual firewall connected to another network.&lt;/P&gt;&lt;P&gt;I need to limit the another network traffic into here through physical(ASA5510) firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I need to configure NATing in three places like Internet router, Context Firewall, ASA 5510 v8.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i do natting in all devices, then it may&lt;STRONG&gt; affect the bandwidth &lt;/STRONG&gt;of the network (bottleneck).&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Or&lt;/P&gt;&lt;P&gt;Is there any other way to resolve it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest to me.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:52:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644477#M591423</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2019-03-11T19:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Triple Natting</title>
      <link>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644478#M591429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you NAT, the NAT process take up system resources.&lt;/P&gt;&lt;P&gt;Honestly I don't see the need for NATing more than once (perhaps two for overlapping), but why three times?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Feb 2011 19:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644478#M591429</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2011-02-17T19:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Triple Natting</title>
      <link>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644479#M591430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In internet router, I will nat the 10.0.10.0 series into a public IP to rate limit the bandwidth for this network.&lt;/P&gt;&lt;P&gt;In Virtual firewall and Physical firewall, I will NAT the Inside and outside interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to reduce the NATing in this scenario&lt;/P&gt;&lt;P&gt;Or&lt;/P&gt;&lt;P&gt;Please send any other suggestion for the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Saravanan.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Feb 2011 07:14:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644479#M591430</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2011-02-18T07:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Triple Natting</title>
      <link>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644480#M591431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Saravaran...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike here. Well if you are talking about doing self translations (Nat to themselves) until they get to the router... it is not going to cause latency issues...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it is very important to mention that if you have applications behind the core switch that need to have internet access and are also sensitive to tcp sequence number, you may want to disable the randomization of TCP sequence numbers on one of the ASA's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the rest, I dont see a problem....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 19 Feb 2011 05:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/triple-natting/m-p/1644480#M591431</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-02-19T05:27:11Z</dc:date>
    </item>
  </channel>
</rss>

