<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy NAT Assistance in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567531#M705764</link>
    <description>&lt;P&gt;We have an ASA5510s which has a VPN to a remote client with networks of 192.168.61.0/24 and 192.168.62.0/24 (note that these are the actual network IP ranges and not used here to substitute for public IPs).&amp;nbsp; One of our internal networks is 10.2.1.0/24.&amp;nbsp; We used to include this in the VPN but the remote client's company has recently implemented 10.2.0.0/16 at their location and cannot readily change it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to NAT all of our 10.2.1.0/24 network into a single address, say 10.10.20.200, to be able to pass it on to the remote user.&amp;nbsp; I have tentatively recommended:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Internal_nat_outbound line 1 extended permit ip 10.2.1.0 255.255.255.0 host 10.10.20.200&lt;BR /&gt;nat (Internal) 1 access-list Internal_nat_outbound tcp 0 0 udp 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise if this will do what I need, based on the above explanation or if I'm missing something.&amp;nbsp; This special application of NAT is new to me and I have no experience in doing it.&amp;nbsp; Thanx!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 18:53:23 GMT</pubDate>
    <dc:creator>pootboy69</dc:creator>
    <dc:date>2019-03-11T18:53:23Z</dc:date>
    <item>
      <title>Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567531#M705764</link>
      <description>&lt;P&gt;We have an ASA5510s which has a VPN to a remote client with networks of 192.168.61.0/24 and 192.168.62.0/24 (note that these are the actual network IP ranges and not used here to substitute for public IPs).&amp;nbsp; One of our internal networks is 10.2.1.0/24.&amp;nbsp; We used to include this in the VPN but the remote client's company has recently implemented 10.2.0.0/16 at their location and cannot readily change it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to be able to NAT all of our 10.2.1.0/24 network into a single address, say 10.10.20.200, to be able to pass it on to the remote user.&amp;nbsp; I have tentatively recommended:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Internal_nat_outbound line 1 extended permit ip 10.2.1.0 255.255.255.0 host 10.10.20.200&lt;BR /&gt;nat (Internal) 1 access-list Internal_nat_outbound tcp 0 0 udp 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please advise if this will do what I need, based on the above explanation or if I'm missing something.&amp;nbsp; This special application of NAT is new to me and I have no experience in doing it.&amp;nbsp; Thanx!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:53:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567531#M705764</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2019-03-11T18:53:23Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567532#M705765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;follow this :-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b37d0b.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a0080b37d0b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;see if this helps you.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 17:14:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567532#M705765</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-10-12T17:14:38Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567533#M705768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the suggested document!&amp;nbsp; However, this does not solve the issue.&amp;nbsp; I need to find a way to NAT our 10.2.1.0/24 network into a single 10.10.20.200 address with NAT overload.&amp;nbsp; Thanx!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 14:40:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567533#M705768</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2010-10-13T14:40:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567534#M705769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way you have suggested will not work. What you need to do is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Internal_nat_outbound line 1 extended permit ip 10.2.1.0 255.255.255.0 10.2.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Internal) 1 access-list Internal_nat_outbound&lt;/P&gt;&lt;P&gt;global (External) 1 10.10.20.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, your crypto ACL should point from 10.10.20.200&amp;nbsp; -----&amp;gt; 10.2.0.0 255.255.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should PAT if traffic is flowing according to the access-list Internal_nat_outbound. I have assumed here that "External" is the name of your outside interface. Let me know if this works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 15:11:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567534#M705769</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-13T15:11:57Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567535#M705771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply!&amp;nbsp; However, there are two things I do not understand (I am new to ASA, having only worked with Juniper and Nokia firewalls in the past).&amp;nbsp; Why is the access-list using the 16-bit network of 10.2.0.0 and how (and why) do I "point" the crypto ACL to it?&amp;nbsp; There are two other networks currently defined in the current l2l IPsec tunnel.&amp;nbsp; Thanx!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 15:19:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567535#M705771</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2010-10-13T15:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567536#M705773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was under the impression based on the original post that the remote end network is a 10.2.0.0/16. Is that right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, then the access-list for the NAT says that (when packet is going from 10.2.1.0/24 to 10.2.0.0/16 and is to be routed out the External interface, dynamically PAT (overload) the source IP addresses to the 10.10.20.200 IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The crypto ACL has to be configured that way because the we need this to be encrypted and sent across the tunnel and hence it is from 10.2.1.0/24 -----&amp;gt; 10.10.20.200.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that clears things!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 15:26:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567536#M705773</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-13T15:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567537#M705775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you and my apologies for not being clear enough.&amp;nbsp; The current configuration for this VPN is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network LakerMN-NavMAD&lt;BR /&gt; description trusted networks from Laker MN to Navitus Madison&lt;BR /&gt; network-object 10.10.20.0 255.255.255.0&lt;BR /&gt; network-object 10.2.1.0 255.255.255.0&lt;BR /&gt;object-group network NavMAD-LakerMN&lt;BR /&gt; description Navitus IPs that can get to Laker MN&lt;BR /&gt; network-object 192.168.82.0 255.255.255.0&lt;BR /&gt; network-object 192.168.61.0 255.255.255.0&lt;BR /&gt; network-object 192.168.62.0 255.255.255.0&lt;BR /&gt; network-object 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn-NavMD-Laker extended permit ip object-group LakerMN-NavMAD object-group NavMAD-LakerMN &lt;BR /&gt;access-list vpn-NavMD-Laker extended permit ip object-group NavMAD-LakerMN object-group LakerMN-NavMAD&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to remove the line "network-object 10.2.1.0 255.255.255.0" in the "object-group network LakerMN-NavMAD" and replace it with the correct policy NAT to translate our 10.2.1.0/24 network into a single (NAT overload) address of 10.2.1.200.&amp;nbsp; So, per your suggestion, using my ACL name for this VPN, is this correct and complete?:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn-NavMD-Laker line 1 extended permit ip 10.2.1.0 255.255.255.0 10.2.0.0 255.255.0.0&lt;BR /&gt;nat (Internal) 1 access-list vpn-NavMD-Laker&lt;BR /&gt;global (External) 1 10.10.20.200&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I genuinely appreciate your patience!!&amp;nbsp; Thanx!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 15:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567537#M705775</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2010-10-13T15:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567538#M705777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well we have 2 options. If you are going to substitue the network 10.2.1.0/24 with the PAT IP address, the ACL that you will have then &lt;STRONG&gt;vpn-NavMD-Laker &lt;/STRONG&gt;will be the crypto ACL. For the NAT, you will need another ACL from 10.2.1.0/24 to 10.2.0.0/16 and you can not use the same ACL in the nat as you have mentioned here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 16:32:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567538#M705777</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2010-10-13T16:32:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT Assistance</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567539#M705779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the support and patience.&amp;nbsp; I'll try this tomorrow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Oct 2010 19:17:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat-assistance/m-p/1567539#M705779</guid>
      <dc:creator>pootboy69</dc:creator>
      <dc:date>2010-10-13T19:17:28Z</dc:date>
    </item>
  </channel>
</rss>

