<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA nat-control issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466554#M642149</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Taken from the link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even with NAT control disabled, you need to perform NAT on any addresses for which you configure dynamic NAT.&lt;BR /&gt;When NAT control is disabled, and a NAT and a global command pair are configured for an interface, the real IP addresses cannot go&lt;BR /&gt;out on other interfaces unless you define those destinations with the nat 0 access-list command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 08 Jun 2010 23:24:10 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-06-08T23:24:10Z</dc:date>
    <item>
      <title>ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466552#M642147</link>
      <description>&lt;P&gt;We are looking for a clarification of ASA nat-control command. Unfortunately, we don't have spare device to test it out.&lt;/P&gt;&lt;P&gt;The situation is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An ASA firewall has three interfaces: "inside", "outside", and "corpinside".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control is DISABLED.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A GLOBAL statment is defined on the "outside" interface and the correpsonding NAT statement on the "inside" interface, something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; global(outside) 1 ...&lt;/P&gt;&lt;P&gt;&amp;nbsp; nat (inside) 1 ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We confirmed packets from "inside" to "outside" are allowed even for the packes that do not match any NAT rules (including Static NAT, DynamicNAT, and NAT&amp;nbsp; Exempt).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is what happens to traffice from "inside" to "corpinside" if no Dynamic NAT is defined from "inside" to "corpinside" and two interfaces have&lt;/P&gt;&lt;P&gt;different secuity levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One interpretation is: Since NAT is disabled, all traffic from "inside" to "corpinside" should be allowed.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Another interpretation: If dynamic NAT is configured on an interface, all traffic from that interface to any other interface must hit a NAT rule, therefore traffic from "inside" to "corpinside" should be denied .&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We need a clarification of which interpretation is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also,if "inside" and "corpinside" are at the same security level, then is the&amp;nbsp; traffic allowed?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:56:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466552#M642147</guid>
      <dc:creator>lanli_ltp</dc:creator>
      <dc:date>2019-03-11T17:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466553#M642148</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think here are the answer to your questions:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jun 2010 23:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466553#M642148</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-08T23:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466554#M642149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Taken from the link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even with NAT control disabled, you need to perform NAT on any addresses for which you configure dynamic NAT.&lt;BR /&gt;When NAT control is disabled, and a NAT and a global command pair are configured for an interface, the real IP addresses cannot go&lt;BR /&gt;out on other interfaces unless you define those destinations with the nat 0 access-list command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jun 2010 23:24:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466554#M642149</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-08T23:24:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466555#M642150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had read the document you mentioned. Our interpretation at that time was the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; If nat-control is disabled and dynamic NAT is defined on an interface on which traffic is originating, then packets going from that interface to any other interfaces must match NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, in the example I specified above, packets from "inside" to "outside" that do not match any NAT rule (including NAT Exempt rule) should have been dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However,&amp;nbsp; someone did device testing and told us that packets from "inside" to "outside" that match no NAT rule are actually allowed as is.&lt;/P&gt;&lt;P&gt;So that's why we are not sure what is the correct behavior of ASA nat-control.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 02:06:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466555#M642150</guid>
      <dc:creator>lanli_ltp</dc:creator>
      <dc:date>2010-06-09T02:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466556#M642151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure if it clear but "match no NAT rule" does not mean that they do no match a nat rule. You could be matching no nat (nat exemption)&lt;/P&gt;&lt;P&gt;by matching nat (inside) 0 rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it is clear now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 13:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466556#M642151</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-06-09T13:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA nat-control issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466557#M642152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry for the confusion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Patcks that match no nat rules" means "Packets that do not match any NAT rules including Dynamic NAT, Static NAT, and NAT Exempt rules"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jun 2010 14:29:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-control-issue/m-p/1466557#M642152</guid>
      <dc:creator>lanli_ltp</dc:creator>
      <dc:date>2010-06-09T14:29:35Z</dc:date>
    </item>
  </channel>
</rss>

