<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT with 3 Interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407378#M734427</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. The public interface is 0, and both locals are 100. I logged the traffic and there is no NAT being applied. The repeating error is "asymmetric NAT rules mismatched for forward and reverse". Do you think that would have to do with the order the rules are being applied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Apr 2010 12:47:52 GMT</pubDate>
    <dc:creator>rwoerner1</dc:creator>
    <dc:date>2010-04-12T12:47:52Z</dc:date>
    <item>
      <title>NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407376#M734415</link>
      <description>&lt;P&gt;I wanted to see if something like this would work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The existing config works fine and works like so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list remoteT1_AL extended permit ip object-group remoteT1_NAT_local object-group remoteT1_NAT&lt;/P&gt;&lt;P&gt;global (local1) 30 10.3.90.55&lt;/P&gt;&lt;P&gt;nat (local) 30 access-list remoteT1_AL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is across 2 local interfaces, because we have a P2P T1 to a client and they're super strict with the IP range they allow, so I have to NAT everything from local to local1. I just dump the IPs I need into the object groups and I'm good to go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem that has just arisen, is we setup a VPN to a new office on the 'public' interface and the users there need to access this P2P T1 network. I want to try to do something like this (see below) and just dump those VPN IPs into the object groups. It didn't work needless to say. Problem is that I have them nat exempt for the VPN, but I obviously need to nat them for this connection. Also, I'm not sure if there is something inherent on the public interface that would make this infeasible to work. If anyone has any insight it would be much appreciated. Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (local1) 30 10.3.90.55&lt;/P&gt;&lt;P&gt;nat (local) 30 access-list remoteT1_AL&lt;/P&gt;&lt;P&gt;nat (public) 30 access-list&amp;nbsp; remoteT1_AL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rus&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS: Device is ASA 5510 w/ 8.2(1)11.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:31:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407376#M734415</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2019-03-11T17:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407377#M734420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should work.&lt;/P&gt;&lt;P&gt;Does the public and local1 interfaces have the same security level, because if so, you should manually allow the communication with the same security permit inter-interface command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When a VPN client tries to access the network on local1, do you see a translation being build?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will show us if the VPN client terminates on the Firewall, and then gets NATed to the local1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Apr 2010 19:54:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407377#M734420</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-09T19:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407378#M734427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply. The public interface is 0, and both locals are 100. I logged the traffic and there is no NAT being applied. The repeating error is "asymmetric NAT rules mismatched for forward and reverse". Do you think that would have to do with the order the rules are being applied?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 12:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407378#M734427</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-12T12:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407379#M734437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You will not be able to pass traffic between two interfaces with the same security level unless you have the following command configured:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same security permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check it out with: sh run same&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 12:52:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407379#M734437</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-12T12:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407380#M734441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is not recommended to apply the same access-list "remoteT1_AL" on 2 different NAT statements as follows:&lt;/P&gt;&lt;P&gt;nat (local) 30 access-list remoteT1_AL&lt;/P&gt;&lt;P&gt;nat (public) 30&amp;nbsp; access-list&amp;nbsp; remoteT1_AL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configure a different ACL for "nat (public) 30". I assume that "public" interface has security level 0, and that is the VPN termination interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is the case, you would need to configure the following instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list remoteT1-VPN permit ip &lt;VPN-POOL-SUBNET&gt; &lt;MASK&gt; &lt;REMOTET1-SUBNET&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/REMOTET1-SUBNET&gt;&lt;/MASK&gt;&lt;/VPN-POOL-SUBNET&gt;&lt;/P&gt;&lt;P&gt;nat (public) 30 access-list remoteT1-VPN outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to "clear xlate" after making all the changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 12:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407380#M734441</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-12T12:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407381#M734461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I checked it out and that command was in place. I'm able to pass traffic between the 2 local interfaces (same sec level), its just one the remote VPN network tries to nat across to the destination. I think the problem I'm running into is the order the NATs are being applied. I'm just not sure of the direction to head in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Rus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 13:06:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407381#M734461</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-12T13:06:32Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407382#M734468</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is all ready a ACL doing this for the VPN so that it is tunneled. Also, I didn't really specifiy (my mistake) but it is a L2L VPN. Is it getting angry because I have the ACLs matching the cryptomap, and then the ACL trying to apply this NAT?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 13:28:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407382#M734468</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-12T13:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407383#M734475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the "outside" keyword on the NAT statement on the public interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (public) 30 access-list remoteT1-VPN &lt;STRONG&gt;outside&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 13:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407383#M734475</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-12T13:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407384#M734479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't have the 'outside' keyword on the interface. I added it in but it didn't change the outcome, even after clearing xlate. I ran the packet tracer but that didn't tell me very much. Since this is a VPN connection, would the remote internal IPs be considered public? Or would they be local since its an established VPN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 18:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407384#M734479</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-12T18:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407385#M734487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, don't quite understand your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post config, and what you are trying to achieve.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 10:54:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407385#M734487</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-13T10:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407386#M734494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the relevant config I think:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.2.2.0/24 is our local network for int local&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network remoteT1_NAT_local&lt;BR /&gt; network-object 1.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 1.1.1.0 255.255.252.0 2.2.2.0 255.255.255.0 &lt;BR /&gt;access-list public_cryptomap_1090 extended permit ip 1.1.1.1 255.255.252.0 2.2.2.0 255.255.255.0 &lt;BR /&gt;access-list remoteT1_AL extended permit ip object-group remoteT1_NAT_local object-group remoteT1_NAT&lt;BR /&gt;access-list remoteT1_AL_VPN extended permit ip object-group remoteT1_NAT_local object-group remoteT1_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (public) 10 interface&lt;BR /&gt;global (local1) 30 10.3.90.55&lt;BR /&gt;nat (local) 30 access-list remoteT1_AL&lt;BR /&gt;nat (public) 30 access-list&amp;nbsp; remoteT1_AL_VPN outside&lt;BR /&gt;nat (local) 10 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map public_map 1090 match address public_cryptomap_1090&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If nothing stands out there is no need to worry, I'll start trying to figure out a different path. Thanks a ton for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 11:29:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407386#M734494</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-13T11:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407387#M734500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We just need to see what the logs show when the flow breaks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post syslogs in debug level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging buffered debug&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 11:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407387#M734500</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-13T11:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407388#M734504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, it looks all wrong. Nothing matches correctly, and still not too sure what you are trying to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I understand is VPN traffic terminate on "public" interface (security level 0), and you would like to NAT the VPN remote LAN to 10.3.90.55 when going towards "local1" interface (security level 100). Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please include the remote LAN subnet, local1 subnet, and the crypto ACL. Also, where is your nonat ACL applied? Please also share output of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and any access-list associated with the nat statement.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 11:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407388#M734504</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-13T11:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407389#M734509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to achive what you specified. Right now I NAT to the local1 subnet from the local subnet, but I also need to be able to NAT from the local IPs of the remote VPN network across the IPSec VPN tunnel to the local1&lt;/P&gt;&lt;P&gt;Log output:&lt;/P&gt;&lt;P&gt;5|Apr 13 2010|09:58:22|305013|10.20.2.29||||Asymmetric NAT rules matched for forward and reverse flows; Connection for icmp src public:remoteVPNnetwork dst local1e:remoteT1network (type 8, code 0) denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local &amp;amp; local 1 are sec level 100&lt;/P&gt;&lt;P&gt;public is 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto ACL:&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 1.1.1.1&amp;nbsp; 255.255.252.0 2.2.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Crypto ACL applied:&lt;/P&gt;&lt;P&gt;crypto map public_map 1090 match address public_cryptomap_1090&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;nat (local) 0 access-list nonat&lt;BR /&gt;nat (local) 40 access-list CHS_AL&lt;BR /&gt;nat (local) 30 access-list remoteT1_AL&lt;BR /&gt;nat (public) 30 access-list&amp;nbsp;&amp;nbsp; remoteT1_AL_VPN outside&lt;BR /&gt;nat (local) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (public) 0 access-list public_nat0_inbound outside&lt;BR /&gt;nat (public) 5 access-list public_pnat_inbound_V1 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global:&lt;/P&gt;&lt;P&gt;global (public) 40 192.168.11.25-192.168.11.28 netmask 255.255.255.0&lt;BR /&gt;global (public) 10 interface&lt;BR /&gt;global (local1) 30 10.3.90.55&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I was using icmp just for logging purposes, but regular tcp traffic has the same effect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Apr 2010 14:57:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407389#M734509</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-13T14:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407390#M734516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, you haven't included all the access-list which are associated with the NAT statement. It's difficult to help if you don't provide the whole picture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This statement:&lt;/P&gt;&lt;P&gt;nat (public) 0 access-list public_nat0_inbound outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will take precedence over:&lt;/P&gt;&lt;P&gt;nat (public) 30 access-list&amp;nbsp;&amp;nbsp; remoteT1_AL_VPN outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT exemption with ACL will take priority therefore, your "nat (public) 30" will never get invoke if the access-list overlaps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Further to that, you don't have NAT exemption on local1 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please share the whole config, OR/ provide output of the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run interface&lt;/P&gt;&lt;P&gt;show run route&lt;/P&gt;&lt;P&gt;show access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And please confirm, the traffic flow is from "public" interface towards "local1" interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Apr 2010 13:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407390#M734516</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-14T13:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407391#M734519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize, the reason why I didn't was because there aren't any ACLs pertaining to the nat (public) 0 and a few others. Someone else threw them on the config for no reason I suppose? I dropped that statement and a few others.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif local&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address w.w.w.w 255.255.255.0&lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif public&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address x.x.x.x 255.255.255.224 standby x.x.x.x&lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; nameif local1&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address y.y.y.31 255.255.255.0&lt;BR /&gt; ospf authentication-key password&lt;BR /&gt; ospf authentication null&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; description LAN Failover Interface&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt; nameif management&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0&lt;BR /&gt; management-only&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route public 0.0.0.0 0.0.0.0 x.x.x.x 1&lt;BR /&gt;route local1 10.2.1.89 255.255.255.255 y.y.y.1&lt;/P&gt;&lt;P&gt;(there are a few other routes pointing to the remote T1 network but they're all the same syntax &amp;amp; gateway)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the ACLs, there are about 800 so I'm going to go ahead and leave those out. Everything pertinent has been provided.&lt;/P&gt;&lt;P&gt;On a side note, I was going through the config line by line (I didn't set up this device so I don't know everything that was added) but I found the nat control statement. I'm not sure if this would affect going from a 0 int to a 100 int. I didn't quite understand the relevance. Could that be the problem? Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 14:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407391#M734519</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-16T14:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407392#M734524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, but x.x.x.x, y.y.y.y does not help when we are trying to match the subnet through the NAT statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please send through the following:&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And from the above "sh run nat" output, please share the access-list entries that you can see on the NAT entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you can't provide any configuration details on the forum, you should just open a TAC case.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 14:40:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407392#M734524</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-16T14:40:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407393#M734529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;object-group network INT_CHS&lt;BR /&gt; network-object 172.28.26.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network INT_NAT&lt;BR /&gt; description local IP group for INT NAT&lt;BR /&gt; network-object host 10.10.53.77&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network remotet1_NAT_local&lt;BR /&gt; description local hosts for remote T1 network NAT&lt;BR /&gt; network-object 172.28.26.0 255.255.255.0 (local interface subnet)&lt;/P&gt;&lt;P&gt; network-object 10.120.1.0 255.255.255.0 (remote VPN internal network)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network remotet1_NAT&lt;BR /&gt; description local IP group for remote hosts NAT&lt;BR /&gt; network-object host 10.20.1.57&lt;BR /&gt; network-object host 10.20.1.85&lt;BR /&gt; network-object host 10.20.1.86&lt;BR /&gt; network-object host 10.20.2.40&lt;BR /&gt; network-object host 10.20.4.28&lt;BR /&gt; network-object host 10.2.1.89&lt;BR /&gt; network-object host 10.20.2.29&lt;BR /&gt; network-object host 10.20.2.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map public_map 1090 match address public_cryptomap_1090&lt;BR /&gt;crypto map public_map 1090 set peer 123.1.10.15&lt;BR /&gt;crypto map public_map 1090 set transform-set ESP-3DES-MD5&lt;BR /&gt;crypto map public_map 1090 set security-association lifetime seconds 86400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tunnel-group 123.1.10.15 type ipsec-l2l&lt;BR /&gt;tunnel-group 123.1.10.15 ipsec-attributes&lt;BR /&gt; pre-shared-key xxxxx&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 172.28.26.0 255.255.255.0 10.121.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip host 10.20.1.57 10.121.1.0 255.255.255.0&amp;nbsp; (one of these for each host in the object group)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip 172.28.26.0 255.255.255.0 10.121.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list remoteT1_AL extended permit ip object-group remotet1_NAT_local object-group remotet1_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list CHS_AL extended permit ip object-group INT_CHS object-group INT_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (local) 0 access-list nonat&lt;BR /&gt;nat (local) 40 access-list CHS_AL&lt;BR /&gt;nat (local) 30 access-list remoteT1_AL&lt;/P&gt;&lt;P&gt;nat (local) 10 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (public) 50 access-list remoteT1_AL outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (public) 40 192.168.11.25-192.168.11.28 netmask 255.255.255.0&lt;BR /&gt;global (public) 10 interface&lt;BR /&gt;global (local1) 30 10.1.90.55&lt;BR /&gt;global (local1) 50 10.1.90.159&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static nats&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 15:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407393#M734529</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-16T15:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407394#M734533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Crypto ACL does not seem to match with the NATing that you have configured. Further to that, you also need to have NAT exemption for local1 interface which has not been configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You mention that 10.120.1.0 255.255.255.0&amp;nbsp; is the remote VPN internal network, but your crypto ACL has&amp;nbsp; 10.121.1.0 255.255.255.0 as the destination. I assume the vpn tunnel is not even up yet at this stage?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I assume that object-group "remotet1_NAT" is routed towards local1 interface, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, let me assume this then:&lt;/P&gt;&lt;P&gt;Remote VPN peer LAN - 10.120.1.0/24&lt;/P&gt;&lt;P&gt;You would like to NAT traffic from the remote VPN LAN (10.120.1.0/24) towards local1 (object-group remote1_NAT) subnets to 10.1.90.159&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So &lt;SPAN style="text-decoration: underline;"&gt;firstly&lt;/SPAN&gt;: configure the NATing first:&lt;/P&gt;&lt;P&gt;access-list local1-nonat permit ip object-group remote1_NAT host 10.1.90.31&lt;/P&gt;&lt;P&gt;nat (local1) 0 access-list local1-nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would leave the following in the configuration:&lt;/P&gt;&lt;P&gt;nat (public) 50 access-list remoteT1_AL outside&lt;/P&gt;&lt;P&gt;global (local1) 50 10.1.90.159&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Secondly&lt;/SPAN&gt;: configure the correct crypto ACL (and the peer VPN gateway needs to be configured with &lt;SPAN style="text-decoration: underline;"&gt;mirror image ACL&lt;/SPAN&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 10.20.1.0 255.255.255.0 10.120.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 10.20.2.0&amp;nbsp; 255.255.255.0 10.120.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 10.20.4.0&amp;nbsp; 255.255.255.0 10.120.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list public_cryptomap_1090 extended permit ip 10.2.1.0&amp;nbsp; 255.255.255.0 10.120.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope I haven't confused you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Apr 2010 10:19:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407394#M734533</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-04-17T10:19:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT with 3 Interfaces</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407395#M734538</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply, they Crypto ACL doesn't match completely, because the remote VPN needs to access items on the local int as well as off of the local1 int. As far as leaving the additional hosts out I just figured it would be redundant to have 10 almost identical ACLs, sorry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The tunnel itself is and has been working fine to the local, we have about 25 other VPN using the same ordered ACLs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I made the changes, I'm just waiting to hear back from the guy at the other site. I'll let you know. Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Apr 2010 11:53:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-3-interfaces/m-p/1407395#M734538</guid>
      <dc:creator>rwoerner1</dc:creator>
      <dc:date>2010-04-20T11:53:10Z</dc:date>
    </item>
  </channel>
</rss>

