<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: source NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450112#M766001</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HBG-ASA(config)# sh cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 08:35:38.499943 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: S 3132904649:3132904649(0) win 64512 &lt;MSS 1260=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 08:35:38.500172 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: S 3966946819:3966946819(0) ack 3132904650 win 64512 &lt;MSS 1260=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 08:35:38.528415 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 08:35:38.535037 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . 3132904650:3132905910(1260) ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 08:35:38.535082 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: P 3132905910:3132906067(157) ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 08:35:38.535220 802.1Q vlan#550 P1 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132905910 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 08:35:38.535281 802.1Q vlan#550 P4 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 08:35:38.535311 802.1Q vlan#550 P5 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: P 3966946820:3966946938(118) ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 08:35:38.535342 802.1Q vlan#550 P5 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: F 3966946938:3966946938(0) ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp; 10: 08:35:38.564393 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . ack 3966946939 win 64394 &lt;BR /&gt;&amp;nbsp; 11: 08:35:38.569871 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: F 3132906067:3132906067(0) ack 3966946939 win 64394 &lt;BR /&gt;&amp;nbsp; 12: 08:35:38.569947 802.1Q vlan#550 P1 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132906068 win 7560&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I don't understand it entirely.&amp;nbsp; If a user comes from the Interent (any) it will get translated to 10.21.5.5 when its destination is 21.21.24.25, which is then translated to the object, 10.21.5.13, and the object has object nat applied to it, which translates its real IP to a public IP.&amp;nbsp; I'm a little dizzy, but thank you very much Nagaraja.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 12 Aug 2010 12:45:20 GMT</pubDate>
    <dc:creator>WILLIAM STEGMAN</dc:creator>
    <dc:date>2010-08-12T12:45:20Z</dc:date>
    <item>
      <title>source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450104#M765993</link>
      <description>&lt;P&gt;I thought I had this figured out in a previous discussion board, but I haven't been able to get it to work. The configuration below is supposed to turn Internet clients into the address 10.21.5.5, which would be local to the DMZ and allow a load balancer to route return traffic using the connected interface route rather than the default route, which points to another interface and would cause an asymetric routing pattern through the firewall.&amp;nbsp; I was expecting to see the connection from a show conn to be between 10.21.5.5 and 10.21.5.13, but instead the client will show as its real Internet address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,CustDMZ_1) source static any PNAT-A10_10.21.5.5 destination static AXA-Citrix-A10_21.21.24.25 AXA-Citrix-A10_21.21.24.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network AXA-Citrix-A10_10.21.5.13 &lt;BR /&gt; host 10.21.5.13&lt;/P&gt;&lt;P&gt;nat (CustDMZ_1,outside) static 21.21.24.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PNAT-A10_10.21.5.5 &lt;BR /&gt; host 10.21.5.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network AXA-Citrix-A10_21.21.24.25 &lt;BR /&gt; host 216.21.248.251&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP outside 74.92.84.70:25008 CustDMZ_1 10.21.5.13:80, idle 0:00:03, bytes 0, flags SaAB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT from CustDMZ_1:10.21.5.13 to outside:21.21.24.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450104#M765993</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2019-03-11T18:23:14Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450105#M765994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per your configuration, you are trying to statically map entire internet&lt;/P&gt;&lt;P&gt;IP address range to one host IP on the inside. This is incorrect. You need&lt;/P&gt;&lt;P&gt;to use dynamic as the translations will have to pick dynamic ports for every&lt;/P&gt;&lt;P&gt;internet address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,CustDMZ_1) source dynamic any PNAT-A10_10.21.5.5 destination&lt;/P&gt;&lt;P&gt;static AXA-Citrix-A10_10.21.5.13 AXA-Citrix-A10_10.21.5.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will ensure that the internet hosts use 10.21.5.5 when coming into your&lt;/P&gt;&lt;P&gt;network. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 13:28:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450105#M765994</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-10T13:28:41Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450106#M765995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see you switched the destination to be the 10.21.5.13 object instead of the public 21.21.24.25 object, is that correct?&lt;/P&gt;&lt;P&gt;I tried both nat commands anyway though, but it still doesn't work. It doesn't look like the 3 way handshake can complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TCP outside 74.92.84.70:25024 CustDMZ_1 10.21.5.13:80, idle 0:00:02, bytes 0, flags SaAB&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do get this warning when configuring the nat command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WARNING: Pool (10.21.5.5) overlap with existing pool&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 13:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450106#M765995</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-10T13:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450107#M765996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you remove the old configuration before configuring the new one? If not,&lt;/P&gt;&lt;P&gt;can you try that?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 14:27:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450107#M765996</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-10T14:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450108#M765997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I removed all the objects and the twice nat config, re-added, but no change.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 15:10:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450108#M765997</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-10T15:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450109#M765998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you put a capture and see if the traffic is actually hitting the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list cap permit tcp any host 10.21.5.13 eq 80&lt;/P&gt;&lt;P&gt;access-list cap permit tcp host 10.21.5.13 eq 80 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;capture capdmz access-list cap interface CustDMZ_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After the above configuration, try accessing the web page from internet and&lt;/P&gt;&lt;P&gt;then collect the capture output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show capture capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, can you run a packet tracer to see if the traffic is taking the NAT&lt;/P&gt;&lt;P&gt;rule that you have configured (one that I had suggested):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 100.1.1.1 1024 21.21.24.25 80 detailed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please post the corresponding outputs here so we can take a look at it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Aug 2010 04:45:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450109#M765998</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-11T04:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450110#M765999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HBG-ASA(config)# sh cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 08:42:56.927243 802.1Q vlan#550 P0 98.11.11.10.50483 &amp;gt; 10.21.5.13.80: S 1303442613:1303442613(0) win 5840 &lt;MSS 1380=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 08:42:56.927396 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 98.11.11.10.50483: S 893564468:893564468(0) ack 1303442614 win 5840 &lt;MSS 1380=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 08:42:56.961788 802.1Q vlan#550 P0 98.11.11.10.50483 &amp;gt; 10.21.5.13.80: . ack 893564469 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 08:42:56.964442 802.1Q vlan#550 P0 98.11.11.10.50483 &amp;gt; 10.21.5.13.80: P 1303442614:1303443024(410) ack 893564469 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 08:42:56.964641 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 98.11.11.10.50483: . ack 1303443024 win 54 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 08:42:56.964702 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 98.11.11.10.50483: P 893564469:893564572(103) ack 1303443024 win 54 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 08:42:56.964732 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 98.11.11.10.50483: F 893564572:893564572(0) ack 1303443024 win 54 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 08:42:56.999170 802.1Q vlan#550 P0 98.11.11.10.50483 &amp;gt; 10.21.5.13.80: . ack 893564572 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 08:42:56.999826 802.1Q vlan#550 P0 98.11.11.10.50483 &amp;gt; 10.21.5.13.80: F 1303443024:1303443024(0) ack 893564573 win 46 &lt;NOP&gt; &lt;BR /&gt;&amp;nbsp; 10: 08:42:57.000000 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 98.11.11.10.50483: . ack 1303443025 win 54 &lt;NOP&gt; &lt;BR /&gt;10 packets shown&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/NOP&gt;&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HBG-ASA(config)# packet-tracer input outside tcp 98.11.11.10 1024 216.21.24$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xace4bf20, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=416724451, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;object network AXA-Citrix-A10_10.21.5.13&lt;BR /&gt; nat (CustDMZ_1,outside) static 21.21.24.25&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface CustDMZ_1&lt;BR /&gt;Untranslate 21.21.24.25/80 to 10.21.5.13/80&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-list outside_access_in extended permit tcp any object-group Web_Public object-group HTTP_HTTPS &lt;BR /&gt;object-group network Web_Public&lt;BR /&gt; group-object Comm_Public&lt;BR /&gt; group-object Crump_Public&lt;BR /&gt;object-group service HTTP_HTTPS tcp&lt;BR /&gt; port-object eq www&lt;BR /&gt; port-object eq https&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xae528950, priority=13, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=5, user_data=0xa907d4c0, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.21.5.13, mask=255.255.255.255, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map http-map1&lt;BR /&gt; match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class http-map1&lt;BR /&gt;&amp;nbsp; set connection advanced-options mss-map&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xadf59490, priority=7, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=3121678, user_data=0xadf56dc8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xace4e718, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=6183745, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect http &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xadf50d08, priority=70, domain=inspect-http, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=657295, user_data=0xadf4ef30, cs_id=0x0, use_real_addr, flags=0x0, protocol=6&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=80, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;BR /&gt;Type: VPN&lt;BR /&gt;Subtype: ipsec-tunnel-flow&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xad939da0, priority=13, domain=ipsec-tunnel-flow, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1390002, user_data=0x0, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map CustDMZ_1-class&lt;BR /&gt; match any&lt;BR /&gt;policy-map CustDMZ_1-policy&lt;BR /&gt; class CustDMZ_1-class&lt;BR /&gt;&amp;nbsp; set connection conn-max 0 embryonic-conn-max 0 random-sequence-number disable&lt;BR /&gt;&amp;nbsp; set connection timeout idle 0:00:00 embryonic 0:00:30 half-closed 0:10:00 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; idle 0:00:00 &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: disabled, retry-interval 0:00:15, max-retries 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DCD: client-probe 0, server-probe 0, conn-expiration 0&lt;BR /&gt;service-policy CustDMZ_1-policy interface CustDMZ_1&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xadf5e2a8, priority=8, domain=conn-set, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=242230, user_data=0xadf5d3c8, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=any, output_ifc=CustDMZ_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW &lt;BR /&gt;Config:&lt;BR /&gt;object network AXA-Citrix-A10_10.21.5.13&lt;BR /&gt; nat (CustDMZ_1,outside) static 21.21.24.25&lt;BR /&gt;Additional Information:&lt;BR /&gt; Forward Flow based lookup yields rule:&lt;BR /&gt; out id=0xafc04ca8, priority=6, domain=nat-reverse, deny=false&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=75, user_data=0xaea61348, cs_id=0x0, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=10.21.5.13, mask=255.255.255.255, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=outside, output_ifc=CustDMZ_1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt; Reverse Flow based lookup yields rule:&lt;BR /&gt; in&amp;nbsp; id=0xaccab170, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=439017, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=CustDMZ_1, output_ifc=any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;Phase: 12&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 6779869, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_translate&lt;BR /&gt;snp_fp_tcp_normalizer&lt;BR /&gt;snp_fp_inspect_http&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: outside&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: CustDMZ_1&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Aug 2010 12:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450110#M765999</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-11T12:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450111#M766000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please remove &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,CustDMZ_1) source dynamic any PNAT-A10_10.21.5.5 destination&lt;/P&gt;&lt;P&gt;static AXA-Citrix-A10_10.21.5.13 AXA-Citrix-A10_10.21.5.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (CustDMZ_1,outside) static 21.21.24.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Instead, add the following line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network AXA-CITRIX-A_21.21.24.25&lt;/P&gt;&lt;P&gt;host 21.21.24.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,CustDMZ_1) source dynamic any PNAT-A10_10.21.5.5 destination&lt;/P&gt;&lt;P&gt;static AXA-CITRIX-A10_21.21.24.25 AXA-Citrix-A10_10.21.5.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 04:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450111#M766000</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-12T04:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: source NAT</title>
      <link>https://community.cisco.com/t5/network-security/source-nat/m-p/1450112#M766001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HBG-ASA(config)# sh cap capdmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;12 packets captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; 1: 08:35:38.499943 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: S 3132904649:3132904649(0) win 64512 &lt;MSS 1260=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 2: 08:35:38.500172 802.1Q vlan#550 P0 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: S 3966946819:3966946819(0) ack 3132904650 win 64512 &lt;MSS 1260=""&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 3: 08:35:38.528415 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 4: 08:35:38.535037 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . 3132904650:3132905910(1260) ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 5: 08:35:38.535082 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: P 3132905910:3132906067(157) ack 3966946820 win 64512 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 6: 08:35:38.535220 802.1Q vlan#550 P1 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132905910 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 7: 08:35:38.535281 802.1Q vlan#550 P4 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 8: 08:35:38.535311 802.1Q vlan#550 P5 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: P 3966946820:3966946938(118) ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp;&amp;nbsp; 9: 08:35:38.535342 802.1Q vlan#550 P5 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: F 3966946938:3966946938(0) ack 3132906067 win 7560 &lt;BR /&gt;&amp;nbsp; 10: 08:35:38.564393 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: . ack 3966946939 win 64394 &lt;BR /&gt;&amp;nbsp; 11: 08:35:38.569871 802.1Q vlan#550 P0 10.21.5.5.32318 &amp;gt; 10.21.5.13.80: F 3132906067:3132906067(0) ack 3966946939 win 64394 &lt;BR /&gt;&amp;nbsp; 12: 08:35:38.569947 802.1Q vlan#550 P1 10.21.5.13.80 &amp;gt; 10.21.5.5.32318: . ack 3132906068 win 7560&lt;/MSS&gt;&lt;/MSS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Though I don't understand it entirely.&amp;nbsp; If a user comes from the Interent (any) it will get translated to 10.21.5.5 when its destination is 21.21.24.25, which is then translated to the object, 10.21.5.13, and the object has object nat applied to it, which translates its real IP to a public IP.&amp;nbsp; I'm a little dizzy, but thank you very much Nagaraja.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Aug 2010 12:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/source-nat/m-p/1450112#M766001</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-08-12T12:45:20Z</dc:date>
    </item>
  </channel>
</rss>

