<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Single host with static NAT inbound, dynamic NAT outbound in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352114#M704407</link>
    <description>&lt;P&gt;I need to find out how to configure an ASA 5520 to accomodate an outbound xlate using the normal global pool, if it has an outside to inside static xlate defined.&amp;nbsp; The outside to inside static translate uses a phantom global address and the inside hosts physical address to accomodate inbound traffic from a remote L2L VPN connection.&amp;nbsp; This works fine.&amp;nbsp; My problem is that when the host attempts sending internet bound traffic that is not traversing the VPN, it is using the static NAT.&amp;nbsp; As the traffic egresses to the internet, the newly translated source address is the phantom, (10.x.x.x) address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to determine how to force internet bound traffic from this host to use the normal NAT/Global configuration that is in place listed here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 12.11.11.11-12.11.11.111 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would appreciate any ideas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;david...&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:27:54 GMT</pubDate>
    <dc:creator>dschraudt</dc:creator>
    <dc:date>2019-03-11T17:27:54Z</dc:date>
    <item>
      <title>Single host with static NAT inbound, dynamic NAT outbound</title>
      <link>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352114#M704407</link>
      <description>&lt;P&gt;I need to find out how to configure an ASA 5520 to accomodate an outbound xlate using the normal global pool, if it has an outside to inside static xlate defined.&amp;nbsp; The outside to inside static translate uses a phantom global address and the inside hosts physical address to accomodate inbound traffic from a remote L2L VPN connection.&amp;nbsp; This works fine.&amp;nbsp; My problem is that when the host attempts sending internet bound traffic that is not traversing the VPN, it is using the static NAT.&amp;nbsp; As the traffic egresses to the internet, the newly translated source address is the phantom, (10.x.x.x) address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to determine how to force internet bound traffic from this host to use the normal NAT/Global configuration that is in place listed here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 12.11.11.11-12.11.11.111 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would appreciate any ideas&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;david...&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:27:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352114#M704407</guid>
      <dc:creator>dschraudt</dc:creator>
      <dc:date>2019-03-11T17:27:54Z</dc:date>
    </item>
    <item>
      <title>Re: Single host with static NAT inbound, dynamic NAT outbound</title>
      <link>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352115#M704409</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem here is the NAT order of operation on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. NAT 0&lt;/P&gt;&lt;P&gt;2. STATIC NAT/PAT&lt;/P&gt;&lt;P&gt;3. Policy NAT&lt;/P&gt;&lt;P&gt;4. Regular dynamic NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1079279"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html#wp1079279&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, if you have a STATIC NAT defined for a local IP, then the STATIC rule will always take precedence over the regular dynamic NAT that you specified:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 12.11.11.11-12.11.11.111 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said that you use the STATIC NAT for VPN? And you want the regular NAT for Internet access?&lt;/P&gt;&lt;P&gt;Is an option for you to change these NAT rules?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Mar 2010 22:24:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352115#M704409</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-03-31T22:24:30Z</dc:date>
    </item>
    <item>
      <title>Re: Single host with static NAT inbound, dynamic NAT outbound</title>
      <link>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352116#M704410</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your response.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't necessarily need to use a dynamic xlate outbound so much as just come up with something that will allow the internal server to be able to access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The basic requirments of the vendor VPN connection is that they need to route traffic to us over the ipsec tunnel using a specific 10.x.x.x address whose subnet does not exist on the firewall.&amp;nbsp; I am just statically translating this 10.x.x.x address to the correct inside address, which works fine for the vendor to access our internal server.&amp;nbsp; The problem is that when the internal server sends outbound traffic to the internet instead of the vendor VPN tunnel, the source IP is translated to the non-routable 10.x.x.x address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I looked at policy static nat, using an ACL to determine vendor vs. internet traffic, but there are two issues that I am unsure of.&amp;nbsp; 1.&amp;nbsp; Will these NATs allow outside to inside traffic based on the ACL applied to the interface, and 2.&amp;nbsp; Since no "deny" statements are allowed in the ACL, I am doing two ACLs, one with a /32 match on the vendor VPN traffic and another ACL with a match on 0.0.0.0/0, hoping the vendor will take the more specific ACL match.&amp;nbsp; I am putting the policy static nat commands in this order.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a time scheduled next week to try this config and see if it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;david...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 19:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352116#M704410</guid>
      <dc:creator>dschraudt</dc:creator>
      <dc:date>2010-04-01T19:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Single host with static NAT inbound, dynamic NAT outbound</title>
      <link>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352117#M704411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What about trying the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that the server is a web server listening on port 80, you can do (as you say) STATIC PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) tcp x.x.x.x 80 y.y.y.y 80&lt;/P&gt;&lt;P&gt;nat (inside) 1 y.y.y.y&lt;/P&gt;&lt;P&gt;global (outside) 1 z.z.z.z&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way, the VPN can access the server using x.x.x.x only on port 80.&lt;/P&gt;&lt;P&gt;If the server wants to get out to the Internet it will be translated to the dynamic NAT/PAT since it does not match the STATIC statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Apr 2010 20:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/single-host-with-static-nat-inbound-dynamic-nat-outbound/m-p/1352117#M704411</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-01T20:59:06Z</dc:date>
    </item>
  </channel>
</rss>

