<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Double NAT ? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089268#M895668</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the problem with 69 &lt;/P&gt;&lt;P&gt;u have two way either change the 69 network ip with an ip in the 208 network&lt;/P&gt;&lt;P&gt;or try to creat the loopback and make the ip as i mentioned and make a route for that ip point to the router interface&lt;/P&gt;&lt;P&gt;this is i mean based on the two nats on the ASA&lt;/P&gt;&lt;P&gt;and let me know&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Oct 2008 12:34:36 GMT</pubDate>
    <dc:creator>Marwan ALshawi</dc:creator>
    <dc:date>2008-10-01T12:34:36Z</dc:date>
    <item>
      <title>Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089253#M895643</link>
      <description>&lt;P&gt;On an ASA 5520 ver 8.0(4) I have the following NAT senario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my private interface "b2b-bastion" I want the following translation to occur when a packet goes from interface b2b-bastion to the external interface "b2b-dmz" and returns:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b2b-bastion (packet in):&lt;/P&gt;&lt;P&gt;      src - 172.24.24.21&lt;/P&gt;&lt;P&gt;      dest - 69.129.150.67&lt;/P&gt;&lt;P&gt;b2b-dmz (packet out)&lt;/P&gt;&lt;P&gt;      src - 208.83.222.130&lt;/P&gt;&lt;P&gt;      dest - 192.168.0.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Conversely, I want returned traffic from 192.168.0.150 to translate as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b2b-dmz (packet in)&lt;/P&gt;&lt;P&gt;      src - 192.168.0.150&lt;/P&gt;&lt;P&gt;      dest - 208.83.222.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b2b-bastion (packet out):&lt;/P&gt;&lt;P&gt;      src - 69.129.150.67&lt;/P&gt;&lt;P&gt;      dest - 172.24.24.21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, the network on b2b-bastion interface sees 192.168.0.150 as 69.129.150.67.  The network on b2b-dmz sees 172.24.24.21 as 208.83.222.130.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas on how to get this to work?  No VPN tunnels involved here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:51:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089253#M895643</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2019-03-11T13:51:32Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089254#M895645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (b2b-bastion, b2b-dmz) 192.168.0.150 access-list 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (b2b-dmz, b2b-bastion) 69.129.150.67 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 pemrit ip host 172.24.24.21 host 69.129.150.67&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip host 192.168.0.150 host 208.83.222.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the above dose 50% of what u want&lt;/P&gt;&lt;P&gt;i think not sure u may need two device to get fully nated as u want it " not sure"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 02:35:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089254#M895645</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T02:35:35Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089255#M895647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the assumption that: inside=b2b-bastion and outside=b2b-dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (b2b-dmz,b2b-bastion) 172.24.24.21 208.83.222.130 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (b2b-bastion,b2b-dmz) 69.129.150.67 192.168.0.150 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is if I am understanding your conditions completely.  A single ASA can bi-directionally NAT this just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try to think of in these terms:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside NAT --&amp;gt; static (outside,inside) local_ip global_ip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;inside NAT --&amp;gt; static (inside,outside) global_ip local_ip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "global_ip"s are the NAT'd "real" addresses that the external networks will be reaching.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 02:58:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089255#M895647</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-10-01T02:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089256#M895648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Matthew &lt;/P&gt;&lt;P&gt;u mean the above nating will be prossed two times in each direction ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 03:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089256#M895648</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T03:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089257#M895650</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes with bidirectional statics both the source and destination networks will be translated depending on the direction they are heading through the firewall.  Assuming I understood the original question completely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Viewing the xlate table on the firewall with the command "sh xlate det" will display both the NAT translations as the firewall sees them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are drawbacks to using "outside NAT" but it is beyond the scope of the question I think.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 03:15:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089257#M895650</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-10-01T03:15:18Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089258#M895653</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok this is what i know and expected to be done&lt;/P&gt;&lt;P&gt;but if u look on his question he wants the source and dist to be translated when going out and the smae when going back &lt;/P&gt;&lt;P&gt;while i think urs and mine dose 50% of this &lt;/P&gt;&lt;P&gt;am i right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 03:30:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089258#M895653</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T03:30:09Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089259#M895655</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks to all for your replies.  I do have the static NATs in place as suggested and when I use the trace tool on the GUI (ASDM) it seems like it should work and the xlates look fine, it just doesn't pass traffic through the firewall from b2b-bastion out b2b-dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing I left out in my hast to get this message out was that the 192.168.0.0/24 network (for 192.168.0.150) is not directly connected to the b2b-dmz interface.  It is on the other side of a gateway that the b2b-dmz points to.  I tried putting a routing statement in for 192.168.0.150 pointing to this gateway out the b2b-dmz interface; however, it still does not pass traffic.  The gateway address is 208.83.222.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 03:46:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089259#M895655</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2008-10-01T03:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089260#M895658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;if u can post a simple drown topology for u network !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 04:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089260#M895658</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T04:08:56Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089261#M895659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have other routers to pass through along the way you will want to move the nat operation to the last hop routers on each side where those RFC 1918 networks are reachable via the server's local_ip.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172 host &amp;lt;-&amp;gt; NAT firewall &amp;lt;-&amp;gt; NAT router &amp;lt;-&amp;gt; 192 host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 04:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089261#M895659</guid>
      <dc:creator>Matthew Warrick</dc:creator>
      <dc:date>2008-10-01T04:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089262#M895660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;which is exactly like what i suggested in my first post " u need other device to do nating with firewall" this way u will do part of nating on the firewall and the other on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 04:31:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089262#M895660</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T04:31:18Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089263#M895663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When it comes to complex NAT, you need a &lt;/P&gt;&lt;P&gt;Checkpoint firewall to do the job for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco ASA does not do a very good of complex&lt;/P&gt;&lt;P&gt;NAT.  Even when you get it to work, &lt;/P&gt;&lt;P&gt;maintaining it is a pain in the ass.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you described, I just tested and get it&lt;/P&gt;&lt;P&gt;to work on Checkpoint Firewall in 5 minutes,&lt;/P&gt;&lt;P&gt;and that it worked on the very first attempt.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 11:07:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089263#M895663</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-10-01T11:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089264#M895664</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i think  the issue above with a cisco firewall not a comerison between vendors features&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 11:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089264#M895664</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T11:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089265#M895665</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Attached is a drawing of what I'm trying to do (in jpeg format).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 11:41:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089265#M895665</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2008-10-01T11:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089266#M895666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i think now everything is fune exept the 69.129.150.67&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;creat a loopback interface on the router&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface loopback 0&lt;/P&gt;&lt;P&gt;ip address 69.129.150.66 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assumeing that the 69.129.150.0 is /24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the ASA add the following route &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route b2b-dmz 69.129.150.0 255.255.255.0 208.83.222.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;again the mask of the 69.129.150.0 must be right if it is not /24 put the right one instead&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now we will nat the 172.24.24.21 on the firewall as following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (b2b-bastion, b2b-dmz) 208.83.222.130 172.24.24.21 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and make sure there is and ACL on the b2b-dmz that allow traffic from 69.129.150.0 network or only from 69.129.150.67 host going to 208.83.222.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now on the router we will make the nat inside as the interface connected to the server 192.168.0.0/24 i will consider it as fa0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the nat outisde i will make it on the loopback0 as it is in deffrent network which is 69.129.150.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.0.150 208.83.222.150&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the interface facing the server do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fa0/0&lt;/P&gt;&lt;P&gt;ip nat inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface loopback0&lt;/P&gt;&lt;P&gt;ip nat outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if didnt work try to make the foolwing addetion&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.0.150 host 208.83.222.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route-map nating&lt;/P&gt;&lt;P&gt;match ip address 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.0.150 208.83.222.150 route-map nating&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the only problem with the 69. network that why i made loopbackinterface&lt;/P&gt;&lt;P&gt;if the treck didnt work u need to change the 69 network with IP in 208 network range then 100% will work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try it and let me know &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IMPORTANT after u finish all nating config reload both the router and the Firewall then test it &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 12:14:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089266#M895666</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T12:14:09Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089267#M895667</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for this solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So is there no way to do a double NAT on the ASA?  I have an ACL that allows traffic between the two destination hosts, I see the translations in the xlate table, it just doesn't route out the b2b-dmz interface to get to 192.168.0.150.  I've tried this routing statement on the ASA but it doesn't seem to work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route b2b-dmz 192.168.0.150 255.255.255.255 208.83.222.2 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 12:28:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089267#M895667</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2008-10-01T12:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089268#M895668</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the problem with 69 &lt;/P&gt;&lt;P&gt;u have two way either change the 69 network ip with an ip in the 208 network&lt;/P&gt;&lt;P&gt;or try to creat the loopback and make the ip as i mentioned and make a route for that ip point to the router interface&lt;/P&gt;&lt;P&gt;this is i mean based on the two nats on the ASA&lt;/P&gt;&lt;P&gt;and let me know&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 12:34:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089268#M895668</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T12:34:36Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089269#M895669</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did your first suggestion of doing a NAT on the ASA and a NAT on the router.  That worked so I'll go with that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks to all the contributors to this issue! &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 12:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089269#M895669</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2008-10-01T12:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089270#M895670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;u mean u created loopback and everything as i mentioned?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and congrtulations anyway:)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 12:58:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089270#M895670</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T12:58:50Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089271#M895671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for rating&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i just wanna make sure the loopback idea worked because i just thought about it logicaly &lt;/P&gt;&lt;P&gt;tahnks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 14:03:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089271#M895671</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-10-01T14:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Double NAT ?</title>
      <link>https://community.cisco.com/t5/network-security/double-nat/m-p/1089272#M895672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You pointed me in the right direction about separating the NATs on two seperate devices; however, the gateway is really another ASA with a VPN tunnel to the 192.168.0.0/24 network (192.168.0.150 host).  So I didn't use a loopback address but used the following static NAT statement:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (external,b2b-dmz) 69.129.150.67 192.168.0.150 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry but I did not want to complicate my senario with the ASA VPN concentrator since I was originally trying to double NAT on our ASA firewall that is behind the ASA VPN concentrator which is the gateway to our firewall for our VPN connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Again!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Oct 2008 19:53:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/double-nat/m-p/1089272#M895672</guid>
      <dc:creator>David Dobbs</dc:creator>
      <dc:date>2008-10-01T19:53:11Z</dc:date>
    </item>
  </channel>
</rss>

