<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA and NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044029#M895290</link>
    <description>&lt;P&gt;Having some problems natting with my new ASA5505.&lt;/P&gt;&lt;P&gt;The firewall is protecting my home net and I have a personal web/mail server I like to give public access to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have dynamic natting configured for the desktops and one static nat for the server. Also I have a Access rule for https and smtp traffic. Still nothing passes to the server.&lt;/P&gt;&lt;P&gt;Also when I nat the server I get packet drops when clients are trying to access it. Even if they are all in the LAN and connected to the same switch so there should be no routing or going through the ASA. The NAT and ACL rules are as follows:&lt;/P&gt;&lt;P&gt;NAT policies on Interface outside:&lt;/P&gt;&lt;P&gt;  match tcp outside host XX.XXX.XX.35 eq 443 inside any&lt;/P&gt;&lt;P&gt;    static translation to 10.10.10.2/443&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;  match ip inside any outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (XX.XXX.XX.34 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 8, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip inside any _internal_loopback any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;access-list OWA line 1 extended permit tcp any host XX.XX.XX.35 eq https (hitcnt=0) 0x342768d2&lt;/P&gt;&lt;P&gt;access-list OWA line 1 extended permit tcp any host XX.XXX.XX.35 eq smtp (hitcnt=0) 0xe2c18426&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:55:26 GMT</pubDate>
    <dc:creator>mahellma</dc:creator>
    <dc:date>2019-03-11T13:55:26Z</dc:date>
    <item>
      <title>ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044029#M895290</link>
      <description>&lt;P&gt;Having some problems natting with my new ASA5505.&lt;/P&gt;&lt;P&gt;The firewall is protecting my home net and I have a personal web/mail server I like to give public access to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have dynamic natting configured for the desktops and one static nat for the server. Also I have a Access rule for https and smtp traffic. Still nothing passes to the server.&lt;/P&gt;&lt;P&gt;Also when I nat the server I get packet drops when clients are trying to access it. Even if they are all in the LAN and connected to the same switch so there should be no routing or going through the ASA. The NAT and ACL rules are as follows:&lt;/P&gt;&lt;P&gt;NAT policies on Interface outside:&lt;/P&gt;&lt;P&gt;  match tcp outside host XX.XXX.XX.35 eq 443 inside any&lt;/P&gt;&lt;P&gt;    static translation to 10.10.10.2/443&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;  match ip inside any outside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (XX.XXX.XX.34 [Interface PAT])&lt;/P&gt;&lt;P&gt;    translate_hits = 8, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip inside any inside any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;  match ip inside any _internal_loopback any&lt;/P&gt;&lt;P&gt;    dynamic translation to pool 1 (No matching global)&lt;/P&gt;&lt;P&gt;    translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;access-list OWA line 1 extended permit tcp any host XX.XX.XX.35 eq https (hitcnt=0) 0x342768d2&lt;/P&gt;&lt;P&gt;access-list OWA line 1 extended permit tcp any host XX.XXX.XX.35 eq smtp (hitcnt=0) 0xe2c18426&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:55:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044029#M895290</guid>
      <dc:creator>mahellma</dc:creator>
      <dc:date>2019-03-11T13:55:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044030#M895292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mats-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the results from the following commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 19:43:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044030#M895292</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-10-09T19:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044031#M895294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it working a little now. Apparently I can't have a dynamic nat and a static nat from the same subnet/interface.&lt;/P&gt;&lt;P&gt;So now I can access the external network with my admin machine and mail etc is dropping in to the server. Also I made a static outside,inside and inside,outside nat for the server.&lt;/P&gt;&lt;P&gt;Here is some info,&lt;/P&gt;&lt;P&gt;NAT policies on Interface inside:&lt;/P&gt;&lt;P&gt;  match ip inside host 10.10.10.120 outside any&lt;/P&gt;&lt;P&gt;    static translation to XX.XXX.XX.34&lt;/P&gt;&lt;P&gt;match ip inside host 10.10.10.2 outside any&lt;/P&gt;&lt;P&gt;    static translation to XX.XXX.XX.35&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policies on Interface outside:&lt;/P&gt;&lt;P&gt;  match ip outside host XX.XXX.XX.35 inside any&lt;/P&gt;&lt;P&gt;    static translation to 10.10.10.2&lt;/P&gt;&lt;P&gt;===============================================&lt;/P&gt;&lt;P&gt;The Access lists&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any host XX.XXX.XX.35 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any host XX.XXX.XX.35 eq https&lt;/P&gt;&lt;P&gt;access-list outside_access_in line 1 extended permit tcp any host XX.XXX.XX.35 eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the problem is how do I get the rest of the 25-bit subnet to get out on the outside without adding a static route for each host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And the info you asked for:&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;cisco# show run nat&lt;/P&gt;&lt;P&gt;cisco#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 19:57:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044031#M895294</guid>
      <dc:creator>mahellma</dc:creator>
      <dc:date>2008-10-09T19:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044032#M895295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm confused by your NAT statements. Are you using MPF for NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here are some statements that should accomplish what you want-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat 1 (inside) 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 25 [email server ip] 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 80 [web server ip] 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 443 [web server ip] 443 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 20:10:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044032#M895295</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-10-09T20:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044033#M895296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks I'll try that.&lt;/P&gt;&lt;P&gt;To be clear, my Cisco has an external IP XX.XXX.XX.34 and the external mail ip is XX.XXX.XX.35.&lt;/P&gt;&lt;P&gt;In your list is the IP part external or internal ips? And if external where do I define to which internal ip the traffic goes?&lt;/P&gt;&lt;P&gt;Also all http,https,smtp services are on the same internal server.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 20:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044033#M895296</guid>
      <dc:creator>mahellma</dc:creator>
      <dc:date>2008-10-09T20:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044034#M895298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The server in the static statement should be your internal IP. Since your interface IP is .34 and you want your services on .35, your statics would look like this (assume your server IP is 192.168.1.10):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.35 25 192.168.1.10 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.35 80 192.168.1.10 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.35 443 192.168.1.10 443 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is actually called port translation. If you want to (since you're going to one server), you can NAT the public IP to a private IP, all ports and protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) X.X.X.35 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 20:30:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044034#M895298</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-10-09T20:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: ASA and NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044035#M895299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;Now that I see the commands and the diagrams in ASDM I also see what I did wrong.&lt;/P&gt;&lt;P&gt;Cisco has a different logic to it than Watchguard or Juniper and I'm used to them.&lt;/P&gt;&lt;P&gt;Thanks again for clarifying this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Oct 2008 20:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-and-nat/m-p/1044035#M895299</guid>
      <dc:creator>mahellma</dc:creator>
      <dc:date>2008-10-09T20:44:23Z</dc:date>
    </item>
  </channel>
</rss>

