<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic XLATE NAT from inside to inside issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454124#M733820</link>
    <description>&lt;P&gt;Hi All:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We experienced an outage which was later discovered as a result of xlate table entry containing a dynamic NAT for a given IP.&lt;/P&gt;&lt;P&gt;I've perform additional research and found that NAT table contains additional 3-4 other entries with similar cases as I've provided below.&amp;nbsp; In my samples, both hosts belong to a remote site which are reachable via an IPSEC tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT from inside:10.5.22.45 to inside:10.5.22.45 flags iI&lt;/P&gt;&lt;P&gt;NAT from inside:172.11.10.167 to inside:172.11.10.167 flags iI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upoin issuing "clear xlate global 10.5.22.45", the problem get's resolved&amp;nbsp; immidiately but the root-cause hasn't been determined yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the FW, I'm enforcing NAT control therefore the NAT-0 ACLs include entries to prevent the FW from translating the traffic.&lt;/P&gt;&lt;P&gt;I also have ACLs built for the above IPs as part of the crypto-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone could shed some light on what could be causing the FW to built a dynamic NAT rules?&lt;/P&gt;&lt;P&gt;Could it be a configuration or routing issue on the FW?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW version:&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.0(4)43&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:44:09 GMT</pubDate>
    <dc:creator>seltser_michael</dc:creator>
    <dc:date>2019-03-11T17:44:09Z</dc:date>
    <item>
      <title>XLATE NAT from inside to inside issue</title>
      <link>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454124#M733820</link>
      <description>&lt;P&gt;Hi All:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We experienced an outage which was later discovered as a result of xlate table entry containing a dynamic NAT for a given IP.&lt;/P&gt;&lt;P&gt;I've perform additional research and found that NAT table contains additional 3-4 other entries with similar cases as I've provided below.&amp;nbsp; In my samples, both hosts belong to a remote site which are reachable via an IPSEC tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT from inside:10.5.22.45 to inside:10.5.22.45 flags iI&lt;/P&gt;&lt;P&gt;NAT from inside:172.11.10.167 to inside:172.11.10.167 flags iI&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upoin issuing "clear xlate global 10.5.22.45", the problem get's resolved&amp;nbsp; immidiately but the root-cause hasn't been determined yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the FW, I'm enforcing NAT control therefore the NAT-0 ACLs include entries to prevent the FW from translating the traffic.&lt;/P&gt;&lt;P&gt;I also have ACLs built for the above IPs as part of the crypto-map.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am hoping someone could shed some light on what could be causing the FW to built a dynamic NAT rules?&lt;/P&gt;&lt;P&gt;Could it be a configuration or routing issue on the FW?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW version:&lt;/P&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 8.0(4)43&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:44:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454124#M733820</guid>
      <dc:creator>seltser_michael</dc:creator>
      <dc:date>2019-03-11T17:44:09Z</dc:date>
    </item>
    <item>
      <title>Re: XLATE NAT from inside to inside issue</title>
      <link>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454125#M733822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both 10.5.22.45 and 172.11.10.167 belongs to a remote site that is reachable via an IPsec tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there's a NAT 0 access-list for this traffic, there should not be a translation (XLATE) for these hosts (for traffic flowing through the tunnel).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One possibility is that, the hosts are reaching the ASA through the tunnel, and they are doing U-turn?&lt;/P&gt;&lt;P&gt;Do you provide Internet access for these hosts through the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depending on your statement for the NAT 0 ACL and the Crypto ACL for interesting traffic, the host might be trying to establish a legitimate connection (that leads to a translation on the ASA).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you share the ACLs for NAT and VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 May 2010 15:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454125#M733822</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-12T15:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: XLATE NAT from inside to inside issue</title>
      <link>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454126#M733824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you've mentioned, both IPs belong to the remote-end and are reachable via IPSEC or GRE tunnels.&lt;/P&gt;&lt;P&gt;There is an existing ALCs built for traffic heading out via IPSEC tunnel which should be excluded from the NAT.&amp;nbsp; Therefore, the "inside_nat0_outbound" ALC is populated with subnet which these hosts belong to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 10.0.0.0 255.255.255.0 10.5.22.0 255.255.255.0 (hitcnt=0)&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 172.14.0.0 255.255.0.0 172.11.10.0 255.255.255.0 (hitcnt=0)&lt;/P&gt;&lt;P&gt;For some reason, all of the (hitcounts) are showing up as null but&amp;nbsp; that's a different issue all together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list crypto-vpn extended permit ip 10.0.0.0 255.255.255.0&amp;nbsp; 10.5.22.0 255.255.255.0 (hitcnt=18)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We don't provide Internet access for these hosts.&amp;nbsp; These are stricly services between sites.&lt;/P&gt;&lt;P&gt;I also don't have any static NATs created for the interesting traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.&amp;nbsp; Here are a couple of additional details about hosts in question here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.5.22.45 - resides behind IPSEC tunnel which originates on the same ASA FW.&amp;nbsp; ASA doesn't have any static routes for this host/network.&lt;/P&gt;&lt;P&gt;172.11.10.167 - resides behind GRE tunnel on the access router which is upsteam from the ASA FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 04:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454126#M733824</guid>
      <dc:creator>seltser_michael</dc:creator>
      <dc:date>2010-05-13T04:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: XLATE NAT from inside to inside issue</title>
      <link>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454127#M733825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The ACL applied to the NAT0 is exactly to bypass NAT. &lt;BR /&gt;I'm not sure about seeing these messages:&lt;BR /&gt;NAT from inside:10.5.22.45 to inside:10.5.22.45 flags iI&lt;BR /&gt;NAT from inside:172.11.10.167 to inside:172.11.10.167 flags iI&lt;BR /&gt;but, there's no translation happening (the IPs are conserving their real IPs).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The question that I have is the following: &lt;BR /&gt;What kind of problem was caused by a remote host being NATed to itself on the ASA?&lt;/P&gt;&lt;P&gt;(This is the expected behavior according to the NAT0 rule anyway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 May 2010 14:45:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/xlate-nat-from-inside-to-inside-issue/m-p/1454127#M733825</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-13T14:45:19Z</dc:date>
    </item>
  </channel>
</rss>

