<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 - implicit NAT rule? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-implicit-nat-rule/m-p/1396228#M703760</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;should have posted the routes and few static nats inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (SKYHAWK,CTC) tcp interface ftp 10.9.1.3 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (SKYHAWK,CTC) tcp interface www 10.9.1.3 www netmask 255.255.255.255 &lt;BR /&gt;access-group SBC_access_in in interface CTC&lt;BR /&gt;route CTC 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;route SKYHAWK 10.10.0.0 255.255.0.0 10.9.1.2 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Apr 2010 14:56:51 GMT</pubDate>
    <dc:creator>ISCONTACT</dc:creator>
    <dc:date>2010-04-08T14:56:51Z</dc:date>
    <item>
      <title>ASA 5510 - implicit NAT rule?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-implicit-nat-rule/m-p/1396227#M703758</link>
      <description>&lt;P&gt;verions 7.0(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had 1 internal server that is getting out through asa. I added a 2nd server but it does not have access. I've read that the implicit nat rule should work for both and I see nothing in the config that would show otherwise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.9.1.3 can currently ping out, browse , etc.&amp;nbsp; 10.9.1.4 cannot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.9.1.4 can ping the inside interface and leave the asa, but it does not return.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when I ping with 10.9.1.3 the ping message returns and includes the outside interface in the message.&lt;/P&gt;&lt;P&gt;when the 10.9.1.4 pings, it tries to return, but the outside interface isnt included in the messae.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pertinent lines on the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif CTC&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address xxx.xxx.xxx.xxx 255.255.xxx.xxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asdm location 10.9.1.0 255.255.255.0 SKYHAWK&lt;BR /&gt;asdm location 10.9.1.2 255.255.255.255 SKYHAWK&lt;BR /&gt;asdm location 10.9.1.4 255.255.255.255 SKYHAWK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service Internet tcp&lt;BR /&gt; description HTTP; DNS; HTTPS&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq domain&lt;BR /&gt; port-object eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SBC_access_in extended permit tcp any interface CTC eq https &lt;BR /&gt;access-list SBC_access_in extended permit tcp any interface CTC eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list site-tosite1 extended permit ip 10.10.0.0 255.255.0.0 172.17.3.0 255.255.255.0 &lt;BR /&gt;access-list site-to-stie1 extended permit ip 10.9.1.0 255.255.255.0 172.17.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list site-tosite2 extended permit ip 10.10.0.0 255.255.0.0 172.17.4.0 255.255.255.0 &lt;BR /&gt;access-list site-to-stie2 extended permit ip 10.9.1.0 255.255.255.0 172.17.4..0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SKYHAWK_nat0_outbound extended permit ip 10.10.0.0 255.255.0.0 172.17.3.0 255.255.255.0 &lt;BR /&gt;access-list SKYHAWK_nat0_outbound extended permit ip 10.10.0.0 255.255.0.0 172.17.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (CTC) 10 interface&lt;BR /&gt;nat (SKYHAWK) 0 access-list SKYHAWK_nat0_outbound&lt;BR /&gt;nat (management) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;icmp permit any CTC&lt;BR /&gt;icmp permit any echo SKYHAWK&lt;BR /&gt;icmp permit any echo-reply SKYHAWK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;these 2 lines bother me, Ive had technicians look at the device before, these appear left over, there is no other reference to the names.&lt;/P&gt;&lt;P&gt;access-list SKYHAWK_access_out extended permit ip any any &lt;BR /&gt;access-list SKYHAWK_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;should they be deleted?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:30:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-implicit-nat-rule/m-p/1396227#M703758</guid>
      <dc:creator>ISCONTACT</dc:creator>
      <dc:date>2019-03-11T17:30:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 - implicit NAT rule?</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-implicit-nat-rule/m-p/1396228#M703760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;should have posted the routes and few static nats inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (SKYHAWK,CTC) tcp interface ftp 10.9.1.3 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (SKYHAWK,CTC) tcp interface www 10.9.1.3 www netmask 255.255.255.255 &lt;BR /&gt;access-group SBC_access_in in interface CTC&lt;BR /&gt;route CTC 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;route SKYHAWK 10.10.0.0 255.255.0.0 10.9.1.2 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2010 14:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-implicit-nat-rule/m-p/1396228#M703760</guid>
      <dc:creator>ISCONTACT</dc:creator>
      <dc:date>2010-04-08T14:56:51Z</dc:date>
    </item>
  </channel>
</rss>

