<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT help with ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076656#M878601</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I will need to spend some time editing my config for security reasons, but will do, unless you can state the sections you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For my understanding you say I am using 172.29.0.0/16 to nat any inside address, what part of the config does that?  This NAT exempt rule access-list inside_outbound_nat0_acl extended permit ip 172.29.0.0 255.255.0.0 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 21 Dec 2008 20:17:46 GMT</pubDate>
    <dc:creator>whiteford</dc:creator>
    <dc:date>2008-12-21T20:17:46Z</dc:date>
    <item>
      <title>NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076650#M878578</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a VPN to an external company.  This VPN is connected to the ASA's outside interface and they just need to access VLAN which is connected to the ASA - all works.  This VLAN they connect to is on a Cisco 3750 switch which is simply connecte to one of the gigabit ports on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This external company connects to the VLAN IP range of 172.29.x.x/16, now in my LAN I have a monitoring server on 192.168.12.91 that needs to ping a server on their LAN which is 10.10.1.1,  they already have a server on 192.168.12.91 so how can I NAT this IP to say a 172.29.x.x ip?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My server is  &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:28:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076650#M878578</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2019-03-11T14:28:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076651#M878581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;This external company connects to the VLAN IP range of 172.29.x.x/16, now in my LAN I have a monitoring server on 192.168.12.91 that needs to ping a server on their LAN which is 10.10.1.1,they already have a server on 192.168.12.91 so how can I NAT this IP to say a 172.29.x.x ip? &lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand correctly , you have a server on the inside as  192.168.12.91 and needs to connect to 10.10.1.1 server on other side, but they do also have a server with ip of   192.168.12.91, you can nat 192.168.12.91 in your LAN  for it to appear as 172.29.x.x address through that tunnel  by using  Policy nat  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Follow this example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00808c9950.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on your side ASA, you can do something similar to example above in link&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list new extended permit ip 172.29.x.x 255.255.255.0 10.10.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.12.91  255.255.255.0 10.10.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.29.x.x  access-list policy-nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 16:18:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076651#M878581</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-21T16:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076652#M878585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not used a policy NAT before, are they dynamic and only used when needed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed you have to create a new access list:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list "new", do I have to create a new name or can I use an existing one? I'm just not sure if it will mess things up or not. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They current ones I have are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in&lt;/P&gt;&lt;P&gt;access-list inside_access_in&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ6_access_in - this is the 172.29.x.x vlan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 17:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076652#M878585</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2008-12-21T17:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076653#M878589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;I have not used a policy NAT before, are they dynamic and only used when needed? &lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally when you have overlapping networks you can use Policy nat, and it seems from your description there is overlapping networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To be clear where is 192.168.12.91 host? is it on the inside or DMZ, is important becuase  policy nat needs to be correct in terms of where will&lt;/P&gt;&lt;P&gt;it policy nat against &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the address you use to nat 192.168.12.91 does not necessarily have to  be a 172.29.x.x address,&lt;/P&gt;&lt;P&gt;it could be any other address as long it does not overlap on the other end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't have to create a new acl, use the same u are using  for that l2l tunnel, you can use your currect ant exempt access list &lt;B&gt;inside_outbound_nat0_acl&lt;/B&gt;  which maps to your crypto acl &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;add another line in your nat exempt acl of this tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.i&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 172.29.x.x 255.255.255.0 10.10.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy-nat extended permit ip 192.168.12.91 255.255.255.0 10.10.1.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;static (interface_where_192.168.12.91_resides,outside) 172.29.x.x access-list policy-nat &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Always..always  backup your configuration  in text format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could you post the config to get a picture of your l2l cls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 18:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076653#M878589</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-21T18:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076654#M878590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, the 192.168.12.91 host is on my LAN (inside).  This VPN to this external company has the 172.29.x.x/16 subnet allowed only through this SA's, so I thought it I NAT the 192.168.12.91 IP to that range there is less to configure on the phase 2 IPSec that is working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_2_cryptomap extended permit ip 172.29.0.0 255.255.0.0 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp object-group 10.10.1.0 object-group 172.29.0.0 echo-reply &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_outbound_nat0_acl extended permit ip 172.29.0.0 255.255.0.0 10.10.1.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_access_in extended permit icmp object-group 172.29.0.0 object-group 10.10.1.0 echo-reply &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 19:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076654#M878590</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2008-12-21T19:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076655#M878592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so you are already using 172.29.0.0/16 to nat any inside hosts using this 172.29.0.0 network..  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;not to get confused please post the complete config to see the flow of your nat exempt and global statement .. before suggesting fruther. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 19:59:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076655#M878592</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-12-21T19:59:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT help with ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076656#M878601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I will need to spend some time editing my config for security reasons, but will do, unless you can state the sections you need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For my understanding you say I am using 172.29.0.0/16 to nat any inside address, what part of the config does that?  This NAT exempt rule access-list inside_outbound_nat0_acl extended permit ip 172.29.0.0 255.255.0.0 10.10.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 21 Dec 2008 20:17:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-help-with-asa-5520/m-p/1076656#M878601</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2008-12-21T20:17:46Z</dc:date>
    </item>
  </channel>
</rss>

