<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static rules and Dynamic rules for the same networks in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250248#M771352</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Looks like they are all static. I am really wary about removing the NAT pools and something breaking however..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hmmm, not so sure ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global 172.16.1.5 Local 192.168.5.15 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what version of ASA software are you using ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't remove it based on the output above. Can ypou post the exact NAT statements off the ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 03 Nov 2009 21:20:42 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2009-11-03T21:20:42Z</dc:date>
    <item>
      <title>Static rules and Dynamic rules for the same networks</title>
      <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250245#M771293</link>
      <description>&lt;P&gt;i am working at a customer site whom has an ASA appliance on either side of their DMZ.  The inside perimeter ASA is first in the path from the inside networks into the dmz.  Then you cross the outside perimeter ASA to get to the Internet.&lt;/P&gt;&lt;P&gt;The inside perimeter ASA has an interesting configuration.  I see static statements for networks (ex. static (inside,outside) 192.168.5.0 192.168.5.0 netmask 255.255.255.0) and then they also have (ex. global (outside) 1 172.16.1.4-&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this not redundant?  Wont the static statement always override the dynamic global/nat combo?  Is it safe to delete the dynamic NAT translations that are already represented on the ASA by static statements?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:35:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250245#M771293</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2019-03-11T16:35:44Z</dc:date>
    </item>
    <item>
      <title>Re: Static rules and Dynamic rules for the same networks</title>
      <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250246#M771297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i agree, the dynamic statement should be redundant. You could have both if you were doing policy NAT but if there are no acls attached to NAT statements then the statics should override the dynamic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest way to check though is to look at the xlate table to see if there any of the dynamic translations in the table ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh xlate &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh running config xlate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Nov 2009 21:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250246#M771297</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-03T21:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Static rules and Dynamic rules for the same networks</title>
      <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250247#M771315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;check it out Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bhiasaip# sho xlate&lt;/P&gt;&lt;P&gt;15 in use, 188 most used&lt;/P&gt;&lt;P&gt;Global 206.248.224.1 Local 206.248.224.1&lt;/P&gt;&lt;P&gt;Global 192.168.10.0 Local 192.168.10.0&lt;/P&gt;&lt;P&gt;Global 192.168.11.0 Local 192.168.11.0&lt;/P&gt;&lt;P&gt;Global 10.20.0.0 Local 10.20.0.0&lt;/P&gt;&lt;P&gt;Global 192.168.3.0 Local 192.168.3.0&lt;/P&gt;&lt;P&gt;Global 192.168.12.0 Local 192.168.12.0&lt;/P&gt;&lt;P&gt;Global 192.168.6.0 Local 192.168.6.0&lt;/P&gt;&lt;P&gt;Global 192.168.14.0 Local 192.168.14.0&lt;/P&gt;&lt;P&gt;Global 192.168.4.0 Local 192.168.4.0&lt;/P&gt;&lt;P&gt;Global 172.16.1.0 Local 172.16.1.0&lt;/P&gt;&lt;P&gt;Global 172.16.1.5 Local 192.168.5.15&lt;/P&gt;&lt;P&gt;Global 192.168.50.0 Local 192.168.50.0&lt;/P&gt;&lt;P&gt;Global 192.168.5.0 Local 192.168.5.0&lt;/P&gt;&lt;P&gt;Global 198.100.100.0 Local 198.100.100.0&lt;/P&gt;&lt;P&gt;bhiasaip# sho xlate det&lt;/P&gt;&lt;P&gt;15 in use, 188 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, d - dump, I - identity, i - dynamic, n - no random,&lt;/P&gt;&lt;P&gt;       r - portmap, s - static&lt;/P&gt;&lt;P&gt;NAT from inside:206.248.224.1 to outside:206.248.224.1 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.10.0 to outside:192.168.10.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.11.0 to outside:192.168.11.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:10.20.0.0 to outside:10.20.0.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.3.0 to outside:192.168.3.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.12.0 to outside:192.168.12.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.6.0 to outside:192.168.6.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.14.0 to outside:192.168.14.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.4.0 to outside:192.168.4.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:172.16.1.0 to outside:172.16.1.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.5.15 to outside:172.16.1.5 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.50.0 to outside:192.168.50.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:192.168.5.0 to outside:192.168.5.0 flags s&lt;/P&gt;&lt;P&gt;NAT from inside:198.100.100.0 to outside:198.100.100.0 flags s&lt;/P&gt;&lt;P&gt;bhiasaip#&lt;/P&gt;&lt;P&gt;Looks like they are all static.  I am really wary about removing the NAT pools and something breaking however...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Nov 2009 21:13:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250247#M771315</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2009-11-03T21:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Static rules and Dynamic rules for the same networks</title>
      <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250248#M771352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Looks like they are all static. I am really wary about removing the NAT pools and something breaking however..."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hmmm, not so sure ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global 172.16.1.5 Local 192.168.5.15 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what version of ASA software are you using ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldn't remove it based on the output above. Can ypou post the exact NAT statements off the ASA ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Nov 2009 21:20:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250248#M771352</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-03T21:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Static rules and Dynamic rules for the same networks</title>
      <link>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250249#M771373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are running 8.2.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are the NAT's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.6.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.8.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.14.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.15.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 198.100.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt; Here are the statics&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 206.248.224.1 206.248.224.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.11.0 192.168.11.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.20.0.0 10.20.0.0 netmask 255.255.248.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.3.0 192.168.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.12.0 192.168.12.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.6.0 192.168.6.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.14.0 192.168.14.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.4.0 192.168.4.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.1.5 192.168.5.15 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.5.0 192.168.5.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 198.100.100.0 198.100.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your help on this.&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Nov 2009 15:13:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-rules-and-dynamic-rules-for-the-same-networks/m-p/1250249#M771373</guid>
      <dc:creator>Kevin Melton</dc:creator>
      <dc:date>2009-11-04T15:13:15Z</dc:date>
    </item>
  </channel>
</rss>

