<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Policy NAT Rule problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373733#M735591</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you need is Static PAT. Take a look at the Cmd ref for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows you to use the same mapped (translated) address for multiple statics statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I see here in your example and might be why your getting an overlap error, is the translated port in PAT must always be unique.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also bear in mind that if the translated address is the address of you external interface then you need to use the 'Interface' keyword instead of the ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still having an issue let me know and i'll see if I can put the cli config together for you to test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 Mar 2010 20:01:30 GMT</pubDate>
    <dc:creator>stuart</dc:creator>
    <dc:date>2010-03-09T20:01:30Z</dc:date>
    <item>
      <title>Static Policy NAT Rule problem</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373732#M735582</link>
      <description>&lt;P&gt;I'm trying to create a NAT rule that exists on our decommissioned Watchguard firewall but which I can't seem to create on the new Cisco ASA. The rule is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;Internal IP Add&lt;/SPAN&gt;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;Port&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;NAT Address&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;Destination IP Add&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="text-decoration: underline;"&gt;Port &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Rule1: 192.168.10.13&amp;nbsp;&amp;nbsp; 13001&amp;nbsp; 195.216.165.243&amp;nbsp; 161.20.1.1 to 161.20.2.1&amp;nbsp;&amp;nbsp; 12001&lt;/P&gt;&lt;P&gt;Rule2: 192.168.10.13&amp;nbsp;&amp;nbsp; 14002&amp;nbsp; 195.216.165.243&amp;nbsp; 171.10.3.1 to 171.10.5.1&amp;nbsp;&amp;nbsp; 12001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;RULE-1 Static Policy NAT Rule:&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Original&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Interface: DMZ&lt;/P&gt;&lt;P&gt;Source Address: 192.168.10.13&lt;/P&gt;&lt;P&gt;Destination Address: 161.20.1.1 to 161.20.2.1 (&lt;STRONG&gt;RULE1_OG&lt;/STRONG&gt; object group for clarity)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Translated&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Interface: External&lt;/P&gt;&lt;P&gt;Use IP Address: 195.216.165.243&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Port Address Translation&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Original Port: 13001&lt;/P&gt;&lt;P&gt;Translated Port: 12001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;RULE-2 Static Policy NAT Rule:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Original&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Interface: DMZ&lt;/P&gt;&lt;P&gt;Source Address: 192.168.10.13&lt;/P&gt;&lt;P&gt;Destination Address: 171.10.3.1 to 171.10.5.1 (&lt;STRONG&gt;RULE1_OG&lt;/STRONG&gt; object group for clarity)&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Translated&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Interface: External&lt;/P&gt;&lt;P&gt;Use IP Address: 195.216.165.243&lt;/P&gt;&lt;P&gt;&lt;STRONG style="text-decoration: underline; "&gt;Port Address Translation&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Original Port: 14002&lt;/P&gt;&lt;P&gt;Translated Port: 12001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought i could use a Static Policy NAT Rule in ASDM. I can create RULE-1 ok, but when i create RULE-2, it overlaps with RULE-1 and while it does add it into the configuration(with warnings) when i test the rules the ASA always translates the ports as per Rule-1 whether destination address is RULE1_OG or RULE2_OG.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any idea how I can do this?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:19:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373732#M735582</guid>
      <dc:creator>bgl-group</dc:creator>
      <dc:date>2019-03-11T17:19:05Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule problem</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373733#M735591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you need is Static PAT. Take a look at the Cmd ref for the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/s8.html#wp1414075&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows you to use the same mapped (translated) address for multiple statics statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem I see here in your example and might be why your getting an overlap error, is the translated port in PAT must always be unique.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also bear in mind that if the translated address is the address of you external interface then you need to use the 'Interface' keyword instead of the ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are still having an issue let me know and i'll see if I can put the cli config together for you to test.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 20:01:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373733#M735591</guid>
      <dc:creator>stuart</dc:creator>
      <dc:date>2010-03-09T20:01:30Z</dc:date>
    </item>
    <item>
      <title>Re: Static Policy NAT Rule problem</title>
      <link>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373734#M735602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is interesting because if I apply the same concept via CLI:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test1 permit tcp host 192.168.10.13 eq 13001 object-group RULE1_OG eq 12001&lt;BR /&gt;static (inside,outside) tcp 195.216.165.243 12001 access-list test1 13001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test2 permit tcp host 192.168.10.13 eq 14002 object-group RULE1_OG eq 12001&lt;BR /&gt;static (inside,outside) tcp 195.216.165.243 12001 access-list test1 13001&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the Object Groups defined... I get the same overlapping error...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that because you're mapping statically the same source IP to the same NATed IP using the same destination port that's where you get the error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Mar 2010 20:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-policy-nat-rule-problem/m-p/1373734#M735602</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-03-09T20:05:35Z</dc:date>
    </item>
  </channel>
</rss>

