<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reverse NAT on the ASA? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469728#M733465</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're trying to NAT the remote 10.0.2.176/28 when coming to your object-group vendor-inside correct?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So you're saying: &lt;BR /&gt;access-list outside_470_cryptomap line 2 extended permit ip 10.0.2.176 255.255.255.240 object-group vendor-inside &lt;BR /&gt;nat (external) 3 access-list outside_470_cryptomap&lt;BR /&gt;global (internal) 3 10.80.179.113-10.80.179.126 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're coming from computer 10.0.2.x, can you try a ''sh xlate'' and see if you get translations for that host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Jun 2010 13:55:22 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-06-03T13:55:22Z</dc:date>
    <item>
      <title>Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469725#M733457</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a VPN with a vendor, but he's using the same inside networks that I am, and he apparently can't NAT on his side so I'm trying to setup dynamic NAT for his incoming and outgoing traffic on the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the config I've come up with; can you let me know if this will work (see below picture)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network vendor-inside&lt;BR /&gt; network-object host 10.80.208.243&lt;BR /&gt; network-object host 10.80.88.47&lt;/P&gt;&lt;P&gt;access-list outside_470_cryptomap line 1 remark Vendor VPN Tunnel traffic&lt;BR /&gt;access-list outside_470_cryptomap line 2 extended permit ip 10.0.2.176 255.255.255.240 object-group vendor-inside &lt;BR /&gt;nat (external) 3 access-list outside_470_cryptomap&lt;BR /&gt;global (internal) 3 10.80.179.113-10.80.179.126 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/6/6/0/5066-Vendor%20reverse%20NAT.jpg" alt="Vendor reverse NAT.jpg" class="jive-image-thumbnail jive-image" onclick="" width="450" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:51:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469725#M733457</guid>
      <dc:creator>jspradli</dc:creator>
      <dc:date>2019-03-11T17:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469726#M733461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration seems fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that when you do outside NAT:&lt;/P&gt;&lt;P&gt;nat (external) 3 access-list outside_470_cryptomap&lt;/P&gt;&lt;P&gt;You do:&lt;/P&gt;&lt;P&gt;nat (external) 3 access-list outside_470_cryptomap outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know if you have any problems.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 May 2010 11:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469726#M733461</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-27T11:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469727#M733464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have connect partners company through L2L-IPSEC. I try use reverse NAT, like in that example to NAT partner's addresses in my private network. But no one hits exists in NAT. What wrong?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 09:17:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469727#M733464</guid>
      <dc:creator>DimonRonD</dc:creator>
      <dc:date>2010-06-03T09:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469728#M733465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're trying to NAT the remote 10.0.2.176/28 when coming to your object-group vendor-inside correct?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So you're saying: &lt;BR /&gt;access-list outside_470_cryptomap line 2 extended permit ip 10.0.2.176 255.255.255.240 object-group vendor-inside &lt;BR /&gt;nat (external) 3 access-list outside_470_cryptomap&lt;BR /&gt;global (internal) 3 10.80.179.113-10.80.179.126 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're coming from computer 10.0.2.x, can you try a ''sh xlate'' and see if you get translations for that host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 13:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469728#M733465</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T13:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469729#M733471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;coto.fusionet wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're trying to NAT the remote 10.0.2.176/28 when coming to your object-group vendor-inside correct?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So you're saying: &lt;BR /&gt;access-list outside_470_cryptomap line 2 extended permit ip 10.0.2.176 255.255.255.240 object-group vendor-inside &lt;BR /&gt;nat (external) 3 access-list outside_470_cryptomap&lt;BR /&gt;global (internal) 3 10.80.179.113-10.80.179.126 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you're coming from computer 10.0.2.x, can you try a ''sh xlate'' and see if you get translations for that host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Well, I try "sh xlate" and have no translations on this nat rule. I watch "sh nat" and no hits on this rule (translate_hits = 0, untranslate_hits = 0). &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Same rule on this ASA for external real IP's coming to another host works properly. This rule from L2L-IPSEC to inside not works. I use WireShark and see packets from real IP, NAT not work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;Why this NAT normally work from outside to inside and not work from IPSEC to inside?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 05:57:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469729#M733471</guid>
      <dc:creator>DimonRonD</dc:creator>
      <dc:date>2010-06-04T05:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469730#M733483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NAT works for non-encrypted traffic from outside to inside?&lt;BR /&gt;NAT does not work for encrypted traffic from outside to inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT should work for either unencrypted or encrypted traffic. &lt;BR /&gt;Could you post just your current NAT rule for both scenarios?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 16:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469730#M733483</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T16:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469731#M733490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;NAT works for non-encrypted traffic from outside to inside?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;EM&gt;NAT does not work for encrypted traffic from outside to inside?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;NAT should work for either unencrypted or encrypted traffic.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should be, yes. But, not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is nat rule for enctipted traffic. Integrator comes through IPSEC from outside and goes to inside. Nat not worked:&lt;/P&gt;&lt;P&gt;access-list Integrator2Local extended permit ip host 192.168.1.23 10.10.1.0 255.255.255.0 &lt;BR /&gt;global (inside) 3 10.10.0.3-10.10.0.14 netmask 255.255.255.240&lt;BR /&gt;nat (outside) 3 access-list Integrator2Local outside&lt;/P&gt;&lt;P&gt;I need translate host 192.168.1.23, when this host send packet in network 10.10.1.0/24 translate in address 10.10.0.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Same rule (except trafic goes in DMZ) but I think, this is not matter. This rule work good:&lt;BR /&gt;access-list REALHOSTS extended permit ip any host 19.17.9.26 &lt;BR /&gt;global (DMZ) 2 10.20.20.128-10.20.20.254 netmask 255.255.255.128&lt;BR /&gt;nat (outside) 2 access-list REALHOSTS outside&lt;/P&gt;&lt;P&gt;In this rule I need translate any real address, comes on&amp;nbsp; host 19.17.9.26 to network 10.20.20.128/25&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jun 2010 06:04:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469731#M733490</guid>
      <dc:creator>DimonRonD</dc:creator>
      <dc:date>2010-06-07T06:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469732#M733503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;DimonRonD wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have connect partners company through L2L-IPSEC. I try use reverse NAT, like in that example to NAT partner's addresses in my private network. But no one hits exists in NAT. What wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi DimonRonD,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure about your setup, but mine was backwards:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had:&lt;/P&gt;&lt;P&gt;access-list LUXATLASA01e_470_cryptomap extended permit ip 10.0.2.176 255.255.255.240 object-group Vendor-inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be:&lt;BR /&gt;access-list LUXATLASA01e_cryptomap_470 extended permit ip 10.80.0.0 255.255.0.0 10.0.2.176 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also had to add:&lt;BR /&gt;access-list LUXATLASA01i_nat0_outbound extended permit ip object-group Vendor-inside 10.0.2.176 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I highly recommend opening a ticket with TAC for configuration assistance so they can help you understand the config.&amp;nbsp; If they can teach me, they can teach anyone!'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jun 2010 20:47:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469732#M733503</guid>
      <dc:creator>jspradli</dc:creator>
      <dc:date>2010-06-07T20:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on the ASA?</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469733#M733515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply; see above for corrected config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jun 2010 20:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-the-asa/m-p/1469733#M733515</guid>
      <dc:creator>jspradli</dc:creator>
      <dc:date>2010-06-07T20:48:00Z</dc:date>
    </item>
  </channel>
</rss>

