<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT help with overlapping network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235726#M840904</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think this worked for me, I can still ping 10.100.0.61, but I just think it's because I'm not getting NAT'ed so everything is the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I added was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 192.168.3.0 255.255.255.0 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.3.0 255.255.255.0 10.100.0.32 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't add the last line you mentioned though as this isn't a VPN, just a serial connected WAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached some more info, the Pix/ASA config doesn't have the 2 lines above btw in the attachment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I pinged 10.100.0.61 from my laptop on 192.168.3.x I was sure what NAT debug commands I could use so I simply ran "sh nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mypix# sh nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface Inside:&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 Outside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 Inside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 1, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 DMZ3 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 10.100.0.32 255.255.255.252&lt;/P&gt;&lt;P&gt;    static translation to 192.168.90.0&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (10.0.0.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any DMZ3 any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Outside any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any DMZ3 any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface DMZ3:&lt;/P&gt;&lt;P&gt;  match ip DMZ3 10.100.0.32 255.255.255.224 Outside 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 192.168.2.0 255.255.255.0 Outside 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 10.100.0.32 255.255.255.224 DMZ3 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 192.168.2.0 255.255.255.0 DMZ3 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 any Outside any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;mypix#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 May 2009 19:30:40 GMT</pubDate>
    <dc:creator>jamesgonzo</dc:creator>
    <dc:date>2009-05-23T19:30:40Z</dc:date>
    <item>
      <title>NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235722#M840891</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Pix515 with a WAN link to a remote office.  The Pix has an ethernet port that plugs into a 3550 switch which is set a s a trunk.  The WAN router is plugged into VLAN 7 (subinterface).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My LAN is on 192.168.3.x/24 and I need to have the translate to something else before it gets to the remote WAN (10.100.0.32/27) as they have this LAN used elsewhere.  Can I get the pix to NAT my LAN to something else liek 192.168.90.x/24?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pix config is attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235722#M840891</guid>
      <dc:creator>jamesgonzo</dc:creator>
      <dc:date>2019-03-11T15:34:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235723#M840895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can NAT  to somthing else using policy NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;just follow the link above.. your nat exempt acl would look something as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 192.168.90.0 255.255.255.0 &lt;REMOTE_LAN_NETA&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETA&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 192.168.90.0 255.255.255.0 &lt;REMOTE_LAN_NETB&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETB&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 192.168.90.0 255.255.255.0 &lt;REMOTE_LAN_NETC&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.3.0 255.255.255.0 &lt;REMOTE_LAN_NETA&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETA&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.3.0 255.255.255.0 &lt;REMOTE_LAN_NETB&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETB&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.3.0 255.255.255.0 &lt;REMOTE_LAN_NETC&gt; &lt;MASK&gt; &lt;/MASK&gt;&lt;/REMOTE_LAN_NETC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.90.0  access-list policy-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;other end of tunnel will have to also permit 192.168.90.0/24 in their tunnel policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 May 2009 23:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235723#M840895</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-05-20T23:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235724#M840898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;James, is your requirements resolved with policy nat suggestions.. pls let us know to assist you fruther if problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 May 2009 15:37:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235724#M840898</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-05-21T15:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235725#M840901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been waiting all night and day for an email notify for this post and only just got it &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your example looks great, however I won't be able to do until tomorrow, can't wait! I will update you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never managed to get a NAT to work like this, although I have between 2 routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 May 2009 18:01:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235725#M840901</guid>
      <dc:creator>jamesgonzo</dc:creator>
      <dc:date>2009-05-21T18:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235726#M840904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think this worked for me, I can still ping 10.100.0.61, but I just think it's because I'm not getting NAT'ed so everything is the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I added was:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list Inside_nat0_outbound extended permit ip 192.168.3.0 255.255.255.0 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.3.0 255.255.255.0 10.100.0.32 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't add the last line you mentioned though as this isn't a VPN, just a serial connected WAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attached some more info, the Pix/ASA config doesn't have the 2 lines above btw in the attachment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I pinged 10.100.0.61 from my laptop on 192.168.3.x I was sure what NAT debug commands I could use so I simply ran "sh nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mypix# sh nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface Inside:&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 Outside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Inside 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 Inside 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 1, untranslate_hits = 1&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 DMZ3 172.16.1.0 255.255.255.252&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.90.0 255.255.255.0 DMZ3 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside 192.168.3.0 255.255.255.0 Outside 10.100.0.32 255.255.255.252&lt;/P&gt;&lt;P&gt;    static translation to 192.168.90.0&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (10.0.0.1 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any DMZ3 any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any Outside any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;  match ip Inside any DMZ3 any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface DMZ3:&lt;/P&gt;&lt;P&gt;  match ip DMZ3 10.100.0.32 255.255.255.224 Outside 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 192.168.2.0 255.255.255.0 Outside 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 10.100.0.32 255.255.255.224 DMZ3 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 192.168.2.0 255.255.255.0 DMZ3 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;    NAT exempt&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip DMZ3 any Outside any&lt;/P&gt;&lt;P&gt;    no translation group, implicit deny&lt;/P&gt;&lt;P&gt;    policy_hits = 0&lt;/P&gt;&lt;P&gt;mypix#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 May 2009 19:30:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235726#M840904</guid>
      <dc:creator>jamesgonzo</dc:creator>
      <dc:date>2009-05-23T19:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with overlapping network</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235727#M840907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wondered if you might be able to have a quick look at why my NAT isn't working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 May 2009 19:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-overlapping-network/m-p/1235727#M840907</guid>
      <dc:creator>jamesgonzo</dc:creator>
      <dc:date>2009-05-26T19:32:45Z</dc:date>
    </item>
  </channel>
</rss>

