<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Exempt rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197577#M876517</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just need someones advise on the adding a NAT exempt rle on my ASA 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I add an exempt from an IP to another IP it works, if I add a NAT exempt for a group name to a group range it won't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the ASDM and I have created a group for a range of IP addresses and another group for some other IP ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any particular methods I should be following here?  If I add all the exempt rules individually then they all work. &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:49:32 GMT</pubDate>
    <dc:creator>whiteford</dc:creator>
    <dc:date>2019-03-11T14:49:32Z</dc:date>
    <item>
      <title>NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197577#M876517</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just need someones advise on the adding a NAT exempt rle on my ASA 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I add an exempt from an IP to another IP it works, if I add a NAT exempt for a group name to a group range it won't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using the ASDM and I have created a group for a range of IP addresses and another group for some other IP ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any particular methods I should be following here?  If I add all the exempt rules individually then they all work. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197577#M876517</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2019-03-11T14:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197578#M876518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the IP to IP you use static, but for a network to network you can use static but you will have to hardcode the netmask to whatever the network is, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;otherwise, if you do not specify the netmask it will take the default which is 255.255.255.255.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for a particular group of IP addresses, you may use policy natting or identity nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Policy Nat:&lt;/P&gt;&lt;P&gt;access-list test permit ip 10.10.10.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list test permit ip 10.20.20.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list test permit ip 10.30.30.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identity NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.20.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.30.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this should work fine...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please vote for me if it is helpful!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 20:16:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197578#M876518</guid>
      <dc:creator>oabduo983</dc:creator>
      <dc:date>2009-02-12T20:16:18Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197579#M876520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tHANKS FOR THE VAL INFO. lATER&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 21:02:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197579#M876520</guid>
      <dc:creator>sdoremus33</dc:creator>
      <dc:date>2009-02-12T21:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197580#M876522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, what is the NAT Exempt used for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if I have 5 IP address of servers that I didn't want to get NAT'ed between an interface (DMZ) to a network range, how would I fo this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.1/32&lt;/P&gt;&lt;P&gt;192.168.1.2/32&lt;/P&gt;&lt;P&gt;192.168.1.3/32&lt;/P&gt;&lt;P&gt;192.168.1.4/32&lt;/P&gt;&lt;P&gt;192.168.1.5/32&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not to get NAT'ed to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.0.0/16 (DMZ interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Feb 2009 21:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197580#M876522</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-02-12T21:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197581#M876523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a couple ways of performing this &lt;/P&gt;&lt;P&gt;Assuming the network range (inside)connections initiated to 172.06.0.0/16 network in the DMZ range&lt;/P&gt;&lt;P&gt;Nat exemption&lt;/P&gt;&lt;P&gt;access-list exemptrffc permit ip 192.168.1.0 255.255.255.248 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;nat (inside)0 access-list exempttrffc &lt;/P&gt;&lt;P&gt;nat (inside) 1 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;This will provide nat exemption for any traffic srced from  192.168.1/29 initiated to 172.16.0.0 /16&lt;/P&gt;&lt;P&gt;while all other inside traffic will be patted to the outside interface address &lt;/P&gt;&lt;P&gt;Nat exemptions are always performed first in the NAT order of operations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2009 03:58:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197581#M876523</guid>
      <dc:creator>sdoremus33</dc:creator>
      <dc:date>2009-02-13T03:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197582#M876524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One last note: With NAT exemption you can initiate both inbound or outbound connections &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2009 04:02:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197582#M876524</guid>
      <dc:creator>sdoremus33</dc:creator>
      <dc:date>2009-02-13T04:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Exempt rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197583#M876525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your NAT Exempt example, how would I do this for say individual IP's only to the DMZ like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.10&lt;/P&gt;&lt;P&gt;192.168.1.150&lt;/P&gt;&lt;P&gt;192.168.1.225&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Feb 2009 08:28:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-rule/m-p/1197583#M876525</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2009-02-13T08:28:58Z</dc:date>
    </item>
  </channel>
</rss>

