<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy NAT / Conditional NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496145#M676464</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the below document for information about configuring Static policy NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_static.html#wp1074755"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_static.html#wp1074755&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For information about Policy NAT in general (dynamic and static), refer to the below page:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1088419"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1088419&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error message you are seeing is because the way you are configuring Static policy NAT is incorrect. The ACL "outside-inside" is alright but the access list being used for the NAT, that is, "conditional-nat" is configured the reverse of the way it should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, you will need an ACL specifying IP traffic from the SIte A server's real IP (in the 10.x.x.x) range destined to the Site B server's IP addresses (&lt;SPAN style="font-size: 8pt;"&gt;SITE_B_CLUSTER).&lt;SPAN style="font-size: 10pt;"&gt; Once you have such an ACL ready, create the static with this ACL and the PUBLIC_IP as the translated IP.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this information helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Aug 2010 14:08:08 GMT</pubDate>
    <dc:creator>praprama</dc:creator>
    <dc:date>2010-08-17T14:08:08Z</dc:date>
    <item>
      <title>Policy NAT / Conditional NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496144#M676462</link>
      <description>&lt;P&gt;Hi Guys, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I need your help in getting a resolution to the Natting problem mentioned below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I have a 10.x.x.x network in place(site A). Another partner who also houses a 10.x.x.x subnet(site B) needs to access a particular server within Site A. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Site B has a group of 6 servers which need to communicate with the server in Site A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. The 6 servers at site B would be statically natted and the requests from Site B -&amp;gt; Site A will be unidirectional in nature. The public ip at Site A would also be Natted to permit these 6 ip's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. The server housed in Site A caters to requests both from Site B as well as from other sites via the same public ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. A simple straightforward static nat causes every request coming to the public ip to get natted. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &lt;SPAN style="color: #0000ff;"&gt;&amp;nbsp; static (inside,outside) public_ip Server_ip netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. To solve this a policy / conditional NAT has been configured as follows...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;STRONG&gt;NOTE&lt;/STRONG&gt;: PUBLIC_IP = public ip pointing to the Site A server; SITE_B_CLUSTER=6 servers at Site B&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;access-list outside-incoming extended permit tcp object-group SITE_B-CLUSTER host PUBLIC_IP object-group TCP-PORTS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list conditional-nat extended permit &lt;/SPAN&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;t&lt;/SPAN&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;cp object-group SITE_B-CLUSTER host PUBLIC_IP object-group TCP-PORTS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 8pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #0000ff;"&gt;static (inside,outside) PUBLIC_IP &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #0000ff; font-size: 8pt; "&gt;access-list conditional-nat &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. Now when i am configuring this i am encountering the following errors...&lt;/P&gt;&lt;UL&gt;&lt;UL&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #ff0000;"&gt;Protocol mismatch between the static and access-list - &lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;Solved this by making my conditional-nat acl into ip based.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #ff0000;"&gt;access-list used in static has different local addresses&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am not able to solve the 2nd error. Could someone please help? &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; I would also like to know what are my alternatives if i have to maintain the conditonal-nat access-list at a tcp based ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also like some material which i could read on policy Nat &amp;amp; Nat Basics.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thanking You,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Uzair Syed Naveed&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496144#M676462</guid>
      <dc:creator>uzair syed naveed</dc:creator>
      <dc:date>2019-03-11T18:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT / Conditional NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496145#M676464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please refer to the below document for information about configuring Static policy NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_static.html#wp1074755"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_static.html#wp1074755&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For information about Policy NAT in general (dynamic and static), refer to the below page:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1088419"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1088419&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The error message you are seeing is because the way you are configuring Static policy NAT is incorrect. The ACL "outside-inside" is alright but the access list being used for the NAT, that is, "conditional-nat" is configured the reverse of the way it should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, you will need an ACL specifying IP traffic from the SIte A server's real IP (in the 10.x.x.x) range destined to the Site B server's IP addresses (&lt;SPAN style="font-size: 8pt;"&gt;SITE_B_CLUSTER).&lt;SPAN style="font-size: 10pt;"&gt; Once you have such an ACL ready, create the static with this ACL and the PUBLIC_IP as the translated IP.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this information helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Aug 2010 14:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496145#M676464</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-08-17T14:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT / Conditional NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496146#M676468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;uzair,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;firstly let me start with the erro message&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second error message you are concerned about, you are getting this because what you are telling the firewall that the local ip address are on your inside and they all need to statically translated to one public ip. as you can see this does not make much sense&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;secondly as prapanch pointed out you have the static wrongly configured as this gives the firewall a feeling that the local hots are on your inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lastly, i do not understand why you are concerned about using&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;static (inside,outside) public_ip Server_ip netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please note this is destination nat, which mean the destination ip is translated. this does not mean that the source ip of all the hosts from internet is translated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope this clears your doubt&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Aug 2010 14:46:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496146#M676468</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-08-17T14:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT / Conditional NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496147#M676472</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Prapanch,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you for your response. This clarifies things quite a bit. i do have a doubt here...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If i have an ACL specifying IP traffic from the SIte A server's real IP (in the 10.x.x.x) range destined to the Site B server's IP addresses (&lt;SPAN&gt;SITE_B_CLUSTER). then how would that help, and why would it be required logically? &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I mean, the requests are only unidirectional from site b -&amp;gt; site A and the reason we are applying the acl&amp;nbsp; is to implement the condition that, only specific requests from the SITE_B_CLUSTER get translated to SITE_A_public ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ohh and before i forget...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANK YOU for all your help. &lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;you have been a big help. Ill be implementing this tomorrow morning. Ill get back in case i do have some problem here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Uzair Syed Naveed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Aug 2010 16:42:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496147#M676472</guid>
      <dc:creator>uzair syed naveed</dc:creator>
      <dc:date>2010-08-17T16:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT / Conditional NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496148#M676477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Uzair,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Well, frankly speaking, the fact is that this is the way we are supposed ot configure Policy NAT on the ASA. This is how it works practically:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) PUBLIC_IP access-list conditional-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list condition-nat permit ip host SITEA-SERVER object-group SITEB_SERVERS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now when the ASA sees a request coming in on the "outside" interface for the PUBLIC_IP and it is sourced from the one of the IP addresses in the "object-group SITEB_SERVERS", then ASA will match this against this Static policy NAT that we have configured and will &lt;STRONG&gt;untranslate&lt;/STRONG&gt; the PUBLIC_IP to the real ip of the server SITEA_SERVER and route the traffic out the "inside" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if the ASA receives a request on the "outside" interface for the PUBLIC_IP but the packet's source IP is not in the object-group SITEB_SERVERS, then the ASA will not match this packet against this STatic NAT and will try to match it against the rest of the config that we have on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes things clear. Let me know if there are any gray areas &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Aug 2010 00:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-conditional-nat/m-p/1496148#M676477</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-08-18T00:59:03Z</dc:date>
    </item>
  </channel>
</rss>

