<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Nat 0 vs static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222315#M876992</link>
    <description>&lt;P&gt;We have a cisco 5510 connected to a LAN segment with a cisco 6500 and multiple vlan's. and using Class B address range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a NAT device (Non-cisco product ) on top of the Cisco ASA-5510 handling all the static and Dynamic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have lots of internet users and about 50-60 servers all in the Lan segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since the ASA is not doing the NAT i can use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 172.16.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to exempt all traffic from NAT right??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when i do this i am having issues accessing a few servers from the outside that have been Static NAT on my NAT device. ( this is the problem only with few servers, all others are fine and normal internet users also have no issues to the best of my knowledge).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have found a remedy by using something like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything is working perfect with this instead of the "NAT 0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could be causing the access issue with NAT 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 14:44:32 GMT</pubDate>
    <dc:creator>victor_87</dc:creator>
    <dc:date>2019-03-11T14:44:32Z</dc:date>
    <item>
      <title>Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222315#M876992</link>
      <description>&lt;P&gt;We have a cisco 5510 connected to a LAN segment with a cisco 6500 and multiple vlan's. and using Class B address range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a NAT device (Non-cisco product ) on top of the Cisco ASA-5510 handling all the static and Dynamic NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have lots of internet users and about 50-60 servers all in the Lan segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;since the ASA is not doing the NAT i can use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 172.16.0.0 255.255.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to exempt all traffic from NAT right??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but when i do this i am having issues accessing a few servers from the outside that have been Static NAT on my NAT device. ( this is the problem only with few servers, all others are fine and normal internet users also have no issues to the best of my knowledge).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have found a remedy by using something like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.0.0 172.16.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything is working perfect with this instead of the "NAT 0"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could be causing the access issue with NAT 0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222315#M876992</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2019-03-11T14:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222316#M876993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the reason is that nat0() will only work from inside to outside. When an inside-server opens a connection to outside, the asa "knows" the server and have an entry in the NAT table.&lt;/P&gt;&lt;P&gt;If the server do not access the outside world, the asa do not "know" the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your static NAT make a permanent entry into the NAT table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had this Problem with a client, that wanted to use public IPs inside the ASA. Only when the server has opened a connection an inbound connection was successful. With the "fake" NAT everything is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Celio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Feb 2009 18:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222316#M876993</guid>
      <dc:creator>celiocarreto</dc:creator>
      <dc:date>2009-02-02T18:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222317#M876994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Probably u didn't get me, traffic i mentioned is moving from inside to Outside itself.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 01:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222317#M876994</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-02-03T01:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222318#M876995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok thanku i got my solution&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;this is IDENTITY NAT (allowed only from inside to outside,) connections cannot be initiated from outside to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test ext permit ip 172.16.0.0 255.255.0.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is NAT EXEMPTION&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This allows connections to be initiated from outside to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think everyone must understand the difference between the two, they appear so similar.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Feb 2009 16:51:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222318#M876995</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-02-03T16:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222319#M876996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Static command serves bi directional in logic while all other nat commands are uni directional ! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kamran &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 08:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222319#M876996</guid>
      <dc:creator>game123</dc:creator>
      <dc:date>2012-02-16T08:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Nat 0 vs static NAT</title>
      <link>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222320#M876997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unfortunately it's not that simple.&amp;nbsp;&amp;nbsp; While the configurations are similar in the sense that they can both perform NAT exemption, identity NAT (via a static) enters a permanent entry in the xlate table whereas the NAT 0 does not create an entry in the xlate table but DOES add entries to the NAT table from the interface listed in the nat 0 command to all equal or lower security level interfaces.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your assumptions are incorrect...at least partially.&amp;nbsp;&amp;nbsp; The Cisco documentation ( the Cisco ASA and PIX Firewall Handbook) states that with a nat 0 configuration, traffic must be initiated from the higher security level interface before traffic will be allowed in from the lower security level interface.&amp;nbsp;&amp;nbsp; It goes in to state that identity NAT via a static is bidirectional and traffic can be initiated from either interface.&amp;nbsp; This is true for SOME code versions but not all.&amp;nbsp; In 8.2(2), both nat 0 and identity nat are bidirectional and function identically.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, one key difference between these two (which sounds related to you scenario) is the order in which they are processed. nat 0 is processed before all static nat entries.&amp;nbsp; Static nat is processed in the order in which the entries are added.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Feb 2012 14:46:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-0-vs-static-nat/m-p/1222320#M876997</guid>
      <dc:creator>Patrick0711</dc:creator>
      <dc:date>2012-02-16T14:46:25Z</dc:date>
    </item>
  </channel>
</rss>

