<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA (policy) NAT help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159892#M860042</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried this but it didn't work, this my fault the interface where this network lives is off acn interface on the ASA called "DMZ3":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat-2 permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;global (outside) 2 192.168.90.240&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list policy-nat-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 May 2009 11:34:10 GMT</pubDate>
    <dc:creator>whiteford</dc:creator>
    <dc:date>2009-05-08T11:34:10Z</dc:date>
    <item>
      <title>ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159881#M860025</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this might a be policy NAT required, but I have never tried this before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On our LAN we have a subnet 192.168.100.x/24 and this need to get to an IP range of 10.100.0.32/27 which is a remote company network, tyhe thing is they also have a network on 192.168.100.x/24 so I want 192.168.100.x/24 to be NAT'ed to 192.168.90.0/24 only if going to this netork.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Possible&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159881#M860025</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2019-03-11T15:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159882#M860027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes this is possible - you need to use PolicyBased NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 09:39:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159882#M860027</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T09:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159883#M860030</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have an example of this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside range he is on is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.100.x/24 and he need to get to 10.100.0.32/27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want him to be seen as 192.168.90.x/24 or 192.168.90.240 if easier?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 09:50:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159883#M860030</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T09:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159884#M860032</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The config would be something like:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list &amp;lt;&lt;ACL name=""&gt;&amp;gt; extended permit ip &amp;lt;&lt;ORIGINAL source="" ip="" subnet=""&gt;&amp;gt; &amp;lt;&lt;DESTINATION ip="" subnet=""&gt;&lt;/DESTINATION&gt;&lt;/ORIGINAL&gt;&lt;/ACL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) &amp;lt;&lt;NAT ip="" subnet=""&gt;&amp;gt; access-list &amp;lt;&lt;ACL name=""&gt;&amp;gt;&lt;/ACL&gt;&lt;/NAT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&amp;gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 09:57:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159884#M860032</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T09:57:46Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159885#M860035</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;access-list policy_NAT permit ip 192.168.100.0 255.255.255.0 host 10.100.0.32&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.90.240 access-list policy_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there is a match in the ACL 'policy_NAT' then the 192.168.100.x address will be translated to 192.168.90.240&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 10:26:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159885#M860035</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-08T10:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159886#M860036</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When adding "static (inside,outside) 192.168.90.240 access-list policy_NAT &lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I seem to get the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global address overlaps with mask&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159886#M860036</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T11:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159887#M860037</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check your ACL.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:08:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159887#M860037</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T11:08:49Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159888#M860038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Use NAT instead:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy_NAT permit ip 192.168.100.0 255.255.255.0 host 10.100.0.32 &lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.90.240&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list policy_NAT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159888#M860038</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-08T11:10:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159889#M860039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can host 10.100.0.32  be a range 10.100.0.32/27 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159889#M860039</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T11:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159890#M860040</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159890#M860040</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T11:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159891#M860041</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, just take out :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;host 10.100.0.32 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and replace with&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.100.0.32 255.255.255.224&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:20:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159891#M860041</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-08T11:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159892#M860042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tried this but it didn't work, this my fault the interface where this network lives is off acn interface on the ASA called "DMZ3":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat-2 permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224&lt;/P&gt;&lt;P&gt;global (outside) 2 192.168.90.240&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list policy-nat-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:34:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159892#M860042</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T11:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159893#M860043</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to detail the error, or why you say it didn't work.&lt;/P&gt;&lt;P&gt;Have you forced the connection from the 192.168.100.0/24 to the 10.100.0.32/27 network?&lt;/P&gt;&lt;P&gt;Does 'show xla' give you a translation?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159893#M860043</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-08T11:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159894#M860044</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you need to change nat (&amp;lt;&lt;INTERFACE name=""&gt;&amp;gt;) 2 access-list policy-nat-2 &lt;/INTERFACE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159894#M860044</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T11:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159895#M860045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry that was very brief of me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have added this as you know:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat-2 permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;global (outside) 2 192.168.90.240 &lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list policy-nat-2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the 192.168.100.x is on the inside and 10.100.0.32/27 is on the DMZ3 interfcae on the ASA which is were this WAN is installed to this remote network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me look at the NAT translations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 11:50:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159895#M860045</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T11:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159896#M860047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I didn't see any translations:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this look ok to you guys, sorry for all the silly confusion I have created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat-2 permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;global (outside) 2 192.168.90.240 &lt;/P&gt;&lt;P&gt;nat (DMZ3) 2 access-list policy-nat-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I went to the PC with 192.168.100.x amd pinged 10.100.0.61 which I know is live and got a request timeout.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 12:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159896#M860047</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T12:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159897#M860050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Config looks OK - can you confirm that layer 3 deivces on the 10.100.0.32/27 subnet know "how" to get "back" to 192.168.90.x thru 192.168.100.x ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you allowing icmp - echo-replies back into the outside interface of the ASA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 12:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159897#M860050</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-05-08T12:23:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159898#M860052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;192.168.90.x can ping 10.100.0.32/27 as I'm pinging from that subnet.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess they will just send replies to 192.168.90.240 that translates to 192.168.100.x? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this staic NAT better than a policy NAT?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 12:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159898#M860052</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T12:25:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159899#M860054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think you have your bracketed interfaces the wrong way round for global and nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ3)&lt;/P&gt;&lt;P&gt;nat (inside)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 12:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159899#M860054</guid>
      <dc:creator>handsy</dc:creator>
      <dc:date>2009-05-08T12:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA (policy) NAT help</title>
      <link>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159900#M860056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sadley, I couldn't get this to work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried these 2 configs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.)&lt;/P&gt;&lt;P&gt;access-list policy-nat-2 permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;global (DMZ3) 2 192.168.90.240 &lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list policy-nat-2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i do a packet trace I get a drop:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; packet-tracer input inside icmp 192.168.100.32 0 1 1 10.100$&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   Remotesvr_Servers  255.255.255.224 DMZ3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ROUTE-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype: input&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;in   VLAN100         255.255.255.0   inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit icmp any any&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: INSPECT&lt;/P&gt;&lt;P&gt;Subtype: np-inspect&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: DROP&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside any DMZ3 any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 137, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: inside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: drop&lt;/P&gt;&lt;P&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2.)&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;access-list policy-nat-2 extended permit ip 192.168.100.0 255.255.255.0 10.100.0.32 255.255.255.224 &lt;/P&gt;&lt;P&gt;static (inside,DMZ3) 192.168.90.240 access-list policy-nat-2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On this one I get the error "global address overlaps with mask"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 May 2009 14:18:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-policy-nat-help/m-p/1159900#M860056</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-05-08T14:18:38Z</dc:date>
    </item>
  </channel>
</rss>

