<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 NAT issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443378#M732677</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok , so you are trying to ping from inside to dmz interface or vice versa. since DMZ is security 50 .., so you need to allow that range to have access to inside interface using access-list inside permit dmz any any and applying it to out direction of the inside interface. also add no nat for&lt;/P&gt;&lt;P&gt;nat ( DMZ) 0 access-list nonat1&lt;/P&gt;&lt;P&gt;nat ( DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will follow up in more detail later on.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Jul 2010 02:12:26 GMT</pubDate>
    <dc:creator>manish arora</dc:creator>
    <dc:date>2010-07-28T02:12:26Z</dc:date>
    <item>
      <title>ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443375#M732653</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried searching for the answer but I couldn't relevant data, so I apologize if this is a repost.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyways, I have an ASA 5505 base model. On the inside vlan I have directly connected another router. The ASA and the router are OSPF peers. I can ping the router's interfaces from the ASA, but I can't ping them from a pc that is connected to the inside vlan. I did notice that if I take out the statement &lt;STRONG&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/STRONG&gt;then the ping goes ok, but I have no internet connectivity. How can I enable NAT for all devices outbound the internet interface but still disable NAT for all internal networks?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 7.2(4)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;description Default internal vlan on max&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;description Internet vlan on max&lt;/P&gt;&lt;P&gt;nameif Internet&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address dhcp setroute&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt;description DMZ vlan on max&lt;/P&gt;&lt;P&gt;no forward interface Vlan1&lt;/P&gt;&lt;P&gt;nameif DMZ&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip address 10.100.100.1 255.0.0.0&lt;/P&gt;&lt;P&gt;ospf cost 10&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;switchport access vlan 3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt;domain-name default.domain.invalid&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group protocol TCPUDP&lt;/P&gt;&lt;P&gt;protocol-object udp&lt;/P&gt;&lt;P&gt;protocol-object tcp&lt;/P&gt;&lt;P&gt;object-group service Xbox_port tcp-udp&lt;/P&gt;&lt;P&gt;description TCP-UDP 3074&lt;/P&gt;&lt;P&gt;port-object eq 3074&lt;/P&gt;&lt;P&gt;object-group service Xbox_port_2 udp&lt;/P&gt;&lt;P&gt;description UDP port 88&lt;/P&gt;&lt;P&gt;port-object eq 88&lt;/P&gt;&lt;P&gt;object-group network Internal_Networks&lt;/P&gt;&lt;P&gt;network-object 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 10.1.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit udp any interface Internet eq 3074 inactive&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit tcp any interface Internet eq 3074 inactive&lt;/P&gt;&lt;P&gt;access-list Internet_access_in extended permit udp any interface Internet eq 88 inactive&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit icmp any any unreachable&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit icmp any any traceroute&lt;/P&gt;&lt;P&gt;access-list acl-outside extended permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging buffer-size 10000&lt;/P&gt;&lt;P&gt;logging buffered critical&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;logging debug-trace&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu Internet 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;icmp permit any inside&lt;/P&gt;&lt;P&gt;icmp deny any Internet&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-524.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (Internet) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group acl-outside in interface Internet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;router ospf 1&lt;/P&gt;&lt;P&gt;router-id 192.168.1.1&lt;/P&gt;&lt;P&gt;network 192.168.1.0 255.255.255.0 area 0&lt;/P&gt;&lt;P&gt;log-adj-changes&lt;/P&gt;&lt;P&gt;redistribute static subnets&lt;/P&gt;&lt;P&gt;default-information originate&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa authentication enable console LOCAL&lt;/P&gt;&lt;P&gt;aaa authentication ssh console LOCAL&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;ssh 76.10.192.197 255.255.255.255 Internet&lt;/P&gt;&lt;P&gt;ssh timeout 30&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd auto_config Internet&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.2-192.168.1.33 inside&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt;match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;parameters&lt;/P&gt;&lt;P&gt;&amp;nbsp; message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;class inspection_default&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect ftp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 h225&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect h323 ras&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rsh&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect rtsp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect esmtp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sqlnet&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect skinny&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sunrpc&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect xdmcp&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect sip&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect netbios&lt;/P&gt;&lt;P&gt;&amp;nbsp; inspect tftp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:17:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443375#M732653</guid>
      <dc:creator>darin.miller</dc:creator>
      <dc:date>2019-03-11T18:17:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443376#M732662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need an Nat Exempt statement :-&lt;/P&gt;&lt;P&gt;access-list nonat ext permit ip x.x.x.x 255.255.255.0 x.x.x.x 255.255.255.0&lt;/P&gt;&lt;P&gt;{ x.x.x.x are the subnets you dont want any natting to be done }&lt;/P&gt;&lt;P&gt;then add a statement&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 00:19:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443376#M732662</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-07-28T00:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443377#M732672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Manish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried that but still same result. It still keeps pointing to that dynamic NAT statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;max# packet-tracer input inside icmp 192.168.1.2 0 8 10.0.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in&amp;nbsp;&amp;nbsp; 10.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit ip any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT-EXEMPT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside 192.168.1.0 255.255.255.0 inside 10.0.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; NAT exempt&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;/P&gt;&lt;P&gt;Type: HOST-LIMIT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; match ip inside any inside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 2, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 00:46:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443377#M732672</guid>
      <dc:creator>darin.miller</dc:creator>
      <dc:date>2010-07-28T00:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443378#M732677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok , so you are trying to ping from inside to dmz interface or vice versa. since DMZ is security 50 .., so you need to allow that range to have access to inside interface using access-list inside permit dmz any any and applying it to out direction of the inside interface. also add no nat for&lt;/P&gt;&lt;P&gt;nat ( DMZ) 0 access-list nonat1&lt;/P&gt;&lt;P&gt;nat ( DMZ) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i will follow up in more detail later on.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Manish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 02:12:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443378#M732677</guid>
      <dc:creator>manish arora</dc:creator>
      <dc:date>2010-07-28T02:12:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443379#M732699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, the DMZ is not touched in this example. The PC(192.168.1.2) attached at eth0/1 on the ASA, is attempting to ping an interface(10.0.0.1) on a router that is reached thru the same vlan(192.168.1.0/24) via eth0/2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The router has an IP of 192.168.1.30 on the near interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;max# traceroute 10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Type escape sequence to abort.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Tracing the route to 10.0.0.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; 1&amp;nbsp; 192.168.1.30 0 msec *&amp;nbsp; 0 msec&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 02:25:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443379#M732699</guid>
      <dc:creator>darin.miller</dc:creator>
      <dc:date>2010-07-28T02:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443380#M732708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,inside) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security permit intra interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sysopt noproxy-arp inside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 05:01:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443380#M732708</guid>
      <dc:creator>Jitendriya Athavale</dc:creator>
      <dc:date>2010-07-28T05:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443381#M732722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I figured it out!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First thing I did was take out this statement: &lt;STRONG&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This temporarily killed my Internet access but no big deal for now. Then I created an object group of my internal networks adjacent to my ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network Internal_Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.0.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 10.1.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object 172.16.0.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I created an ACL exemption that permitted nonat from my ASA vlan to the internal networks:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list nonat extended permit ip 192.168.1.0 255.255.255.0 object-group Internal_Networks&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I added this statement: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list nonat&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connectivity between the internal networks has been established! However, Internet access is still limited because I'm not natting data passing thru the Internet interface, so I put in this statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This returns internet connectivity. At this point all internal interfaces can ping each other, as well as internet IP's. I'm not entirely sure why this works, but it does. If anybody can explain the logic behind this, I'd love to hear it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, Manish!&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 05:17:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443381#M732722</guid>
      <dc:creator>darin.miller</dc:creator>
      <dc:date>2010-07-28T05:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 NAT issue</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443382#M732734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The issue is due to asymmetric routing in the network. The easiest/best solution would be to make the router the default gateway for 192.168.1.0 subnet. This will ensure that you have two-way connectivity between the 192.168.1.0 subnet and 10.0.0.0 subnet. If you are not worried about two-way communication and all you are looking for is ICMP connectivity, then you could do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will ensure that all traffic originated from 192.168.1.0 subnet towards 10.0.0.0 subnet will go to the router with ASA's inside interface IP address. In this way, the return traffic will come to the firewall and then the firewall will deliver it to the actual host. This way, you can also initiate TCP sessions from 192.168.1.0 subnet to 10.0.0.0 subnet (not vice versa) and have successful communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand, if you configure the router as the default gateway for 192.168.1.0 subnet and then configure ASA as the default gateway for the router, then all the 10.0.0.0 subnet will be locally routed by the router and all other traffic will be sent to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jul 2010 05:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-nat-issue/m-p/1443382#M732734</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-28T05:24:25Z</dc:date>
    </item>
  </channel>
</rss>

