<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Outside NAT Query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481810#M638351</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the explaination !! I understood the implications ; however coming back to inbound traffic for the same scenario , i have 2 queries&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I agree that we should not use "permit ip any any " for the Inbound traffic (applied to Conditional NAT) , however will the inbound traffic work at all with this ACL ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Also if i modify the access-list with " &lt;SPAN style="color: #993300;"&gt;permit ip any &amp;lt; Public IP &amp;gt;"&lt;/SPAN&gt; in the conditional NAT for the Inbound traffic , am i suppose to use the&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Public IP &amp;lt; NATTED IP of Inside server &amp;gt;&lt;/STRONG&gt; or i can use the Private IP also (as there will be static NAT already for the destination translation )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 08 Aug 2010 11:32:54 GMT</pubDate>
    <dc:creator>ankurs2008</dc:creator>
    <dc:date>2010-08-08T11:32:54Z</dc:date>
    <item>
      <title>Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481801#M638342</link>
      <description>&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Hi halijenn / experts ,&lt;BR /&gt;&lt;BR /&gt;I have configured outside NAT on an ASA so that the traffic is sourced from public IP on the internet to be NATTED to a private IP on the inside.&lt;BR /&gt;Following is the error &lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="color: #993300;"&gt;Asymmetric NAT rules matched for forward and reverse flows; Connection for tcp src inside:10.40.1.7/4191 dst outside:219.85.5.94/80 &lt;BR /&gt;denied due to NAT reverse path failure&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Following is the config &lt;BR /&gt;&lt;BR /&gt;access-list OUT_NAT extended permit ip any any&lt;BR /&gt;&lt;BR /&gt;global (inside) 2 10.2.2.1 255.255.255.255&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 10.40.0.0 255.255.0.0&lt;BR /&gt;nat (outside) 2 access-list &lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;OUT_NAT&lt;/SPAN&gt; &lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;outside &lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Now my query is that what i believe that most probabaly it is not working due to "ip any any " mentioned in the access-list and it should resolve the issue &lt;BR /&gt;Please let me know if i am thinking correct ; however i am not sure as to why it will effect the outbound traffic , i believe it should not work for inbound &lt;BR /&gt;traffic . &lt;BR /&gt;&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:20:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481801#M638342</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2019-03-11T18:20:12Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481802#M638343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct. By saying "ip any any" you have instructed the firewall&lt;/P&gt;&lt;P&gt;that all external IP (internet IP) should be NAT'ed to the inside interface&lt;/P&gt;&lt;P&gt;IP. Now, you are trying to open a connection to a public IP which does not&lt;/P&gt;&lt;P&gt;exist for the inside subnet. You need to modify the access-list line so that&lt;/P&gt;&lt;P&gt;only specific hosts get NAT'ed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Aug 2010 12:55:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481802#M638343</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-03T12:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481803#M638344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know the packet flow of the same . I am not able to understand as to whether this will work for the inbound traffic or not ? Also for the outbound traffic , will it face issues when the packet is coming back from the internet ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Aug 2010 03:05:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481803#M638344</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-04T03:05:36Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481804#M638345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ankur,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you are trying to access an internet IP from the inside, the traffic&lt;/P&gt;&lt;P&gt;hits the firewall with source IP being your internal IP and destination IP&lt;/P&gt;&lt;P&gt;being an internet IP. When the packet exits the firewall, its source IP will&lt;/P&gt;&lt;P&gt;be natted to the interface IP (outside interface IP). However, there is no&lt;/P&gt;&lt;P&gt;rule to convert the destination IP (there is no destination NAT configured),&lt;/P&gt;&lt;P&gt;so the destination IP will be unchanged. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the return traffic hits the firewall, the source IP will be the&lt;/P&gt;&lt;P&gt;internet servers IP and destination IP will be that of the outside interface&lt;/P&gt;&lt;P&gt;of the firewall. Now, as per the configuration you have, the source IP will&lt;/P&gt;&lt;P&gt;be converted to inside interface IP and destination IP (outside interface&lt;/P&gt;&lt;P&gt;IP) will be converted to corresponding inside host IP (based on xlate&lt;/P&gt;&lt;P&gt;entry). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if you notice the two parts, when the traffic exits your firewall&lt;/P&gt;&lt;P&gt;towards the internet, the destination IP is unchanged however, when the&lt;/P&gt;&lt;P&gt;reply traffic enters the firewall and exits towards your LAN, the source IP&lt;/P&gt;&lt;P&gt;will be NAT'ed. This is asymmetric in nature. Hence the firewall will&lt;/P&gt;&lt;P&gt;complain about it and it will block the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Aug 2010 03:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481804#M638345</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-04T03:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481805#M638346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perfect explanation !! I also wanted to know if the Inbound traffic will work with " permit ip any any " or not with the same configuration ? Also if i modify the access-list with &lt;SPAN style="color: #800000;"&gt;" permit ip any &amp;lt; Public IP &amp;gt;"&lt;/SPAN&gt; in the conditional NAT for the Inbound traffic , am i suppose to use the Public IP &lt;SPAN style="color: #800000;"&gt;&amp;lt; NATTED IP of Inside server &amp;gt;&lt;/SPAN&gt; or i can use the Private IP also ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Aug 2010 10:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481805#M638346</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-04T10:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481806#M638347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It will be really helpful if you can throw some light on below query&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 07:55:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481806#M638347</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-05T07:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481807#M638348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ankur,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically, when you NAT outside traffic entering your network, it is done to a specific destination (a server) or a specific IP address is natted to inside IP address (server is on the outside). You do not NAT all internet traffic to inside interface IP as that would lead to asymmetric NAT rules. Also, once you define the NAT rules, technically you are saying that your internal hosts should not be seeing any public IP addresses. If that is the case, then you will not be able to browse any public sites with their own IP address. Can you shed some light on the reasons behind configuring destination NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Aug 2010 13:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481807#M638348</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-05T13:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481808#M638349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081;"&gt;&lt;SPAN style="color: #333333;"&gt;Thanks for the explaination ! I understood the same . I have a generic quesiton as mentioned below&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;My query is that when packet is going from Inside to Outside and while the packet is returning back (reply) , does it need to undergo the NAT Check again ? Over here , i mean to say that before a connection is built , is it like that packet will analyze the translations for return traffic , beforehand i.e which path it will take .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;I have gone through below discussion where it is mentioned "ASA doesn't seem to have a notion of state associated with NATs where assumed SNAT on reverse for a static DNAT forward, overrides exempt on the return " .Is it true ?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #810081; text-decoration: underline; "&gt;&lt;A href="https://community.cisco.com/thread/1003401"&gt;https://supportforums.cisco.com/thread/1003401&lt;/A&gt;&lt;/SPAN&gt;&lt;A href="https://community.cisco.com/thread/1003401"&gt;Denied due to NAT reverse path failure&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 11:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481808#M638349</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-06T11:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481809#M638350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ankur,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case, when you configure &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;nat (outside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Essentially, what you are saying is that all internet traffic comes to&lt;/P&gt;&lt;P&gt;inside subnet via NAT (no public IP is visible). In such a scenario, the&lt;/P&gt;&lt;P&gt;only address that is visible to your inside subnet is your inside interface&lt;/P&gt;&lt;P&gt;IP. Hence when you try to access any other address, the firewall complains.&lt;/P&gt;&lt;P&gt;The error message may not indicate the correct scenario but essentially, the&lt;/P&gt;&lt;P&gt;firewall is complaining that the public IP you are using is not valid as&lt;/P&gt;&lt;P&gt;there is a conflicting reverse path NAT statement. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 13:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481809#M638350</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-06T13:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481810#M638351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for the explaination !! I understood the implications ; however coming back to inbound traffic for the same scenario , i have 2 queries&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) I agree that we should not use "permit ip any any " for the Inbound traffic (applied to Conditional NAT) , however will the inbound traffic work at all with this ACL ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Also if i modify the access-list with " &lt;SPAN style="color: #993300;"&gt;permit ip any &amp;lt; Public IP &amp;gt;"&lt;/SPAN&gt; in the conditional NAT for the Inbound traffic , am i suppose to use the&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Public IP &amp;lt; NATTED IP of Inside server &amp;gt;&lt;/STRONG&gt; or i can use the Private IP also (as there will be static NAT already for the destination translation )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Aug 2010 11:32:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481810#M638351</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-08T11:32:54Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481811#M638352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the way you have configured (permit ip any any) you will not be able to&lt;/P&gt;&lt;P&gt;browse internet from inside. However, outside clients can access your inside&lt;/P&gt;&lt;P&gt;server without any issue. To answer your second question, you need to use&lt;/P&gt;&lt;P&gt;the private IP in the access-list as the NAT rule is applied before traffic&lt;/P&gt;&lt;P&gt;exits your inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Aug 2010 18:20:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481811#M638352</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-08T18:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481812#M638353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ankur,&lt;/P&gt;&lt;P&gt;When you PAT a network on the inside to the outside interface address of the ASA, no host can reach the individual host on the inside because they are all hiding behind the PAT pool - correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, when you hide the whole internet behind a PAT address (inside interface) the same rule applies. How can the inside hosts reach out to yahoo and google when they are all hiding behind a PAT pool?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 00:37:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481812#M638353</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-09T00:37:06Z</dc:date>
    </item>
    <item>
      <title>Re: Outside NAT Query</title>
      <link>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481813#M638354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi NT / kusankar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perfect explanation !! thanks a ton !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 01:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-nat-query/m-p/1481813#M638354</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-08-09T01:06:54Z</dc:date>
    </item>
  </channel>
</rss>

