<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Rule Blocking Traffic? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517647#M606748</link>
    <description>&lt;P&gt;I am pretty confused about a firewall setup I inherited that is causing me some problems. It's an ASA 5505 configured with the standard Inside and Outside networks, plus a DMZ and a Test LAN. I am trying to get a backup solution configured that of course requires agents installed on the hosts to talk to the central console. The central console is installed on the DMZ in the 192.168.10.0/24 network. The server with the agent is installed on the 192.168.100.0/24 Test network. I added an ACL via the ADSM as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list TEST_access_in line 3 extended permit object-group DM_INLINE_PROTOCOL_2 host 192.168.10.4 any &lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit ip host 192.168.10.4 any &lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit icmp host 192.168.10.4 any&lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit tcp host 192.168.10.4 any&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I tested this through the packet trace tool, it failed. It says it failed due to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (TEST) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;match ip TEST any inside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.20.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits=2, untranslate_hits=0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have asolutely no idea what this means. I thought NAT just determined what kind of address translation you have for your unrouteable IPs. I don't know why it would be blocking access between two networks. Can anyone give me some ideas or information about what this is referring to and what I might be doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:09:49 GMT</pubDate>
    <dc:creator>iglablues</dc:creator>
    <dc:date>2019-03-11T19:09:49Z</dc:date>
    <item>
      <title>NAT Rule Blocking Traffic?</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517647#M606748</link>
      <description>&lt;P&gt;I am pretty confused about a firewall setup I inherited that is causing me some problems. It's an ASA 5505 configured with the standard Inside and Outside networks, plus a DMZ and a Test LAN. I am trying to get a backup solution configured that of course requires agents installed on the hosts to talk to the central console. The central console is installed on the DMZ in the 192.168.10.0/24 network. The server with the agent is installed on the 192.168.100.0/24 Test network. I added an ACL via the ADSM as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list TEST_access_in line 3 extended permit object-group DM_INLINE_PROTOCOL_2 host 192.168.10.4 any &lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit ip host 192.168.10.4 any &lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit icmp host 192.168.10.4 any&lt;BR /&gt;&amp;nbsp; access-list TEST_access_in line 3 extended permit tcp host 192.168.10.4 any&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I tested this through the packet trace tool, it failed. It says it failed due to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nat (TEST) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;match ip TEST any inside any&lt;/P&gt;&lt;P&gt;dynamic translation to pool 1 (192.168.20.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;translate_hits=2, untranslate_hits=0&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have asolutely no idea what this means. I thought NAT just determined what kind of address translation you have for your unrouteable IPs. I don't know why it would be blocking access between two networks. Can anyone give me some ideas or information about what this is referring to and what I might be doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517647#M606748</guid>
      <dc:creator>iglablues</dc:creator>
      <dc:date>2019-03-11T19:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Rule Blocking Traffic?</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517648#M606749</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please post the interface and nat configuration. This is a natting issue. Also, it would be nice if you could post the packet tracer output and the ip addresses you are testing from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Nov 2010 18:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517648#M606749</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-15T18:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Rule Blocking Traffic?</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517649#M606750</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks! Here is the config of the interfaces:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.20.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 155.212.203.186 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface Vlan3&lt;BR /&gt; nameif dmz&lt;BR /&gt; security-level 50&lt;BR /&gt; ip address 192.168.10.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan13&lt;BR /&gt; nameif TEST&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.100.1 255.255.255.0&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the NAT statetements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;access-list dmz_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.30.0 255.255.255.240&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.30.0 255.255.255.240&lt;BR /&gt;access-list inside_nat0_outbound extended permit ip 192.168.20.0 255.255.255.0 192.168.100.0 255.255.255.0&lt;BR /&gt;*********************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&lt;BR /&gt;global (inside) 1 interface&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;global (dmz) 2 interface&lt;BR /&gt;global (TEST) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (dmz) 0 access-list dmz_nat0_outbound&lt;BR /&gt;nat (TEST) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;static (TEST,inside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0 dns&lt;BR /&gt;static (inside,dmz) 192.168.20.0 192.168.20.0 netmask 255.255.255.0&lt;BR /&gt;static (inside,TEST) 192.168.100.0 192.168.20.0 netmask 255.255.255.0&lt;BR /&gt;static (TEST,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;BR /&gt;***************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group dmz_access_in in interface dmz&lt;BR /&gt;access-group TEST_access_in in interface TEST&lt;BR /&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to connect from IP 192.168.10.4 in the DMZ network to 192.168.20.220 on the inside LAN. With no changes to the configuration from me I do a packet trace from the DMZ. The output is this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/5/1/9/8915-DMZ-No%20Change.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I perform the same test on the inside interface, no change made to the existing config, and I get this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/6/1/9/8916-Inside%20-%20No%20change.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, I figure I need to add an ACL to prevent the implicit deny rule. I create a rule permitting source 192.168.10.4 to 192.168.20.220, protocols IP and TCP, and apply it to the inside of the inside interface. I do the same test as before and I get this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/7/1/9/8917-Inside%20-%20ACL%20Changed.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Having thought about this since my post, I do need to mention that the source IP (192.168.10.4) has a static NAT to a public IP in the config. So, presumably when traffic from that host leaves the ASA it gets translated to the public IP. I did try changing my ACLs to the public IP instead, but that also didn't work so I doubt that I'm barking up the right tree.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Nov 2010 20:42:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517649#M606750</guid>
      <dc:creator>iglablues</dc:creator>
      <dc:date>2010-11-15T20:42:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Rule Blocking Traffic?</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517650#M606751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are not running packet tracer for&amp;nbsp; the return traffic properly.&lt;/P&gt;&lt;P&gt;If you run it for traffic hitting the inside the sourced will be 192.168.20./24 destined to 192.168.10.4.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config looks good for this flow..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Nov 2010 20:50:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule-blocking-traffic/m-p/1517650#M606751</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-11-15T20:50:41Z</dc:date>
    </item>
  </channel>
</rss>

