<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT: any to any issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816329#M6588</link>
    <description>But how can the Internal ASA have anything to with the 192.168.5.0/24 clients not receiving DHCP leases from the DHCP server on the same subnet?&lt;BR /&gt;The 172.16.0.0/29 clients is supposed to be isolated from 192.168.5.0/24.&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Fri, 08 Mar 2019 14:35:52 GMT</pubDate>
    <dc:creator>andreas.dahlberg</dc:creator>
    <dc:date>2019-03-08T14:35:52Z</dc:date>
    <item>
      <title>ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816232#M6582</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;Hello!&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;Just had to troubleshoot an issue where an internal firewall messed upp the network on its outside interface. The clients could not get addresses from the local DHCP server.&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;This is the network Layout:&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2019-03-08 11_50_37-Drawing1.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/31587iC88146B1DE9FDBE5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2019-03-08 11_50_37-Drawing1.png" alt="2019-03-08 11_50_37-Drawing1.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;On the "Internal ASA" there was this NAT rule:&lt;/P&gt;
&lt;PRE style="background-color: #f5f5f5; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-image-outset: 0; border-image-repeat: stretch; border-image-slice: 100%; border-image-source: none; border-image-width: 1; border-top-left-radius: 4px; border-top-right-radius: 4px; box-sizing: border-box; color: #626469; display: block; font-family: Menlo,Monaco,Consolas,&amp;amp;quot; courier new&amp;amp;quot;,monospace; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 25.71px; orphans: 2; overflow: auto; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: pre; word-break: break-all; word-spacing: 0px; word-wrap: break-word; padding: 13px; margin: 0px 0px 13.5px 0px; border: 1px solid #cccccc;"&gt;nat (inside,outside) source static any any no-proxy-arp route-lookup&lt;/PRE&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;which caused the clients on the 192.168.5.0 network to not get any addresses from the DHCP server.&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;default route on Internal ASA is configured as:&lt;/P&gt;
&lt;PRE style="background-color: #f5f5f5; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-image-outset: 0; border-image-repeat: stretch; border-image-slice: 100%; border-image-source: none; border-image-width: 1; border-top-left-radius: 4px; border-top-right-radius: 4px; box-sizing: border-box; color: #626469; display: block; font-family: Menlo,Monaco,Consolas,&amp;amp;quot; courier new&amp;amp;quot;,monospace; font-size: 15px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 25.71px; orphans: 2; overflow: auto; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: pre; word-break: break-all; word-spacing: 0px; word-wrap: break-word; padding: 13px; margin: 0px 0px 13.5px 0px; border: 1px solid #cccccc;"&gt;route outside 0.0.0.0 0.0.0.0 192.168.5.1&lt;/PRE&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;Why is that?&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;The key here is that the 172.16.0.0 network behind Internal ASA should not be accessible from 192.168.5.0 network at all.&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;Actually, that 172.16.0.0 network is an remote network for a site to site VPN Connection which is only used for lab purposes.&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;I cannot see why the Internal ASA would cause the DHCP server not being able to respond to broadcast DHCP requests..??&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: transparent; box-sizing: border-box; color: #58585b; font-family: &amp;amp;quot; ciscosans&amp;amp;quot;,&amp;amp;quot;helvetica neue&amp;amp;quot;,helvetica,arial,sans-serif; font-size: 16px; font-style: normal; font-variant: normal; font-weight: 300; letter-spacing: normal; line-height: 27.42px; orphans: 2; text-align: left; text-decoration: none; text-indent: 0px; text-transform: none; -webkit-text-stroke-width: 0px; white-space: normal; word-spacing: 0px; margin: 0px;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:55:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816232#M6582</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2020-02-21T16:55:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816266#M6583</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Have you configured DHCP relay in internal asa?&lt;BR /&gt;&lt;BR /&gt;Please check.below guide.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116265-configure-product-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116265-configure-product-00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Mar 2019 12:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816266#M6583</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2019-03-08T12:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816289#M6585</link>
      <description>Hi! &lt;BR /&gt;I've edited the original post. &lt;BR /&gt;Actually, the 172.16.0.0 network should not be considered in this, it is only used as a remote network in a site to site VPN. &lt;BR /&gt;The thing here is that the clients and DHCP server is on the same subnet so i cannot understand why the Internal ASA would cause the DHCP not being able to distribute addresses.. but something has to do with the NAT statement, because removing it get things working again..&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Mar 2019 13:28:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816289#M6585</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2019-03-08T13:28:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816308#M6587</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Normally asa not passing broadcasts to other side. I guess you have configured the&amp;nbsp; dhcp relay.&lt;/P&gt;
&lt;P&gt;In your case you can block these subnet communication with ACLs. Also asa will not reply to arp request because of 'no proxy arp'&lt;/P&gt;
&lt;P&gt;I am not sure whether it is having some affect. You can try removing that command and 'route lookup' too for testing.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 13:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816308#M6587</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2019-03-08T13:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816329#M6588</link>
      <description>But how can the Internal ASA have anything to with the 192.168.5.0/24 clients not receiving DHCP leases from the DHCP server on the same subnet?&lt;BR /&gt;The 172.16.0.0/29 clients is supposed to be isolated from 192.168.5.0/24.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Mar 2019 14:35:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816329#M6588</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2019-03-08T14:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816550#M6591</link>
      <description>Is it correct that when "nat (inside,outside) source static any any no-proxy-arp route-lookup" is removed" from Internal firewall, clients are able to get addresses from the DHCP server?&lt;BR /&gt;&lt;BR /&gt;If yes, then in terms of DHCP workflow and at packet level what specifically is the difference when this nat exists on Internal ASA?&lt;BR /&gt;It can be useful to analyze packet captures on ASA outside, DHCP server and clients in the non-working scenario.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 08 Mar 2019 21:27:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816550#M6591</guid>
      <dc:creator>Ilkin</dc:creator>
      <dc:date>2019-03-08T21:27:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816699#M6592</link>
      <description>Yes, when that is removed, clients in the 192.168.5.0/24 network gets its DHCP leases again. &lt;BR /&gt;&lt;BR /&gt;Would be interesting to see how that internal ASA really is connected, I don't have admin access to their LAN, just the internal ASA. But I am suspicious that it isn't connected as per the image in the original post.</description>
      <pubDate>Sat, 09 Mar 2019 08:42:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816699#M6592</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2019-03-09T08:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816938#M6593</link>
      <description>Hi&lt;BR /&gt;Try without 'no proxy arp' in nat command for testing.&lt;BR /&gt;&lt;BR /&gt;Also without clear understanding of other side its difficult to say issue point exactly. Can you get how they connected each device on that side?</description>
      <pubDate>Sun, 10 Mar 2019 10:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3816938#M6593</guid>
      <dc:creator>Kasun Bandara</dc:creator>
      <dc:date>2019-03-10T10:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3818436#M6595</link>
      <description>Solution was to remove the NAT statement all together as it wasn't really necessary.&lt;BR /&gt;&lt;BR /&gt;Exactly, did nog get a decent answer on how they all was connected, but as i understood, they where all connected to the same switch in a central location. &lt;BR /&gt;It should be impossible for the ASA to break anything on the 192.168.5.0/24 network, or am i missing something?</description>
      <pubDate>Tue, 12 Mar 2019 22:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/3818436#M6595</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2019-03-12T22:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/5142457#M1114154</link>
      <description>&lt;P&gt;I had similar issue but in my topology I had ISP routers between my firewalls. The DHCP offer was being dropped by Branch Firewall. I saw the advice above to remove the NAT statement and once I did such my PC got its IP assignment. I could the dhcp binding on the DHCP and the DHCP offer traversed from HQ FW to Branch FW.. However, when I set up the lab in packet tracer, I had no issues at all so just curious as to why it worked in packet tracer. I used gns3 and eveng to determined if it was a issue with my simulation environment but results was the same. Again, once I removed the NAT statement it works fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;p.s. HQ FW has two internal zones, a dmz zone and outside zone. Branch only has inside and outside zones so it this the case as to why NAT was not needed on the Branch firewall?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jul 2024 03:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/5142457#M1114154</guid>
      <dc:creator>KevA</dc:creator>
      <dc:date>2024-07-10T03:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT: any to any issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/5170261#M1115566</link>
      <description>&lt;P&gt;In my topology, the internal firewall was setting up a policy based site-to-site VPN to a off site firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There was no route pointing to the 172.16.0.0/29 network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This was some years ago now, and this network is now decommissoned. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But a too generous (any, any) NAT rule will cause the firewall to respond to ARPs. I think you would need to make the global address more precise or use another subnet for the global addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 18:45:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-any-to-any-issue/m-p/5170261#M1115566</guid>
      <dc:creator>andreas.dahlberg</dc:creator>
      <dc:date>2024-09-03T18:45:07Z</dc:date>
    </item>
  </channel>
</rss>

