<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static NAT on ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929878#M937195</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok the issue is I need to NAT a couple of address'. with it all configured as above the issue is as follows; the hosts that have the NAT address cannot access the outside network (internet) nor can the outside see the selected services that have been set for them.&lt;/P&gt;&lt;P&gt;I have run Packet tracer for www packets out and it fails on an access list which is the system default deny any any Implicit rule.&lt;/P&gt;&lt;P&gt;I have rules that allow www from inside and they work fine when there are no NAT configured address' I have conpared this with another ASA that works and can't see any difference.&lt;/P&gt;&lt;P&gt;I am lost at this point and all help is greatly appreciated.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 May 2008 06:26:13 GMT</pubDate>
    <dc:creator>gregwilmot</dc:creator>
    <dc:date>2008-05-29T06:26:13Z</dc:date>
    <item>
      <title>Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929872#M937186</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;i am trying to configure static nat for one address and as soon as i add the nat rule the internal host stops seeing the outside world. what have i forgotten to do? &lt;/P&gt;&lt;P&gt;All help greatly appreciated, First timer!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:50:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929872#M937186</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2019-03-11T12:50:30Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929873#M937188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Most likely, you will need to post your NAT configuration for review.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 27 May 2008 16:18:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929873#M937188</guid>
      <dc:creator>michael.leblanc</dc:creator>
      <dc:date>2008-05-27T16:18:26Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929874#M937189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi thanks for your interest here you are.&lt;/P&gt;&lt;P&gt;ASA Version 7.2(3) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname N***********&lt;/P&gt;&lt;P&gt;domain-name d***********&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; dhcp client update dns&lt;/P&gt;&lt;P&gt; ip address 192.168.10.254 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 6**.***.***.2 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan3&lt;/P&gt;&lt;P&gt; no forward interface Vlan1&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address dhcp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; switchport access vlan 2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;clock timezone EST -5&lt;/P&gt;&lt;P&gt;clock summer-time EDT recurring&lt;/P&gt;&lt;P&gt;dns domain-lookup inside&lt;/P&gt;&lt;P&gt;dns domain-lookup outside&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; name-server 192.168.2.20&lt;/P&gt;&lt;P&gt; name-server 192.168.10.202&lt;/P&gt;&lt;P&gt; domain-name *****************&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object-group network Trusted-LAN-Hosts&lt;/P&gt;&lt;P&gt; network-object host 192.168.10.10&lt;/P&gt;&lt;P&gt; network-object host 192.168.10.197&lt;/P&gt;&lt;P&gt; network-object host 192.168.10.198&lt;/P&gt;&lt;P&gt; network-object host 192.168.10.202&lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.10.0 255.255.255.0 any eq www &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp 192.168.10.0 255.255.255.0 any eq domain &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit udp 192.168.10.0 255.255.255.0 any eq isakmp &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.10.0 255.255.255.0 any eq ldap &lt;/P&gt;&lt;P&gt;access-list inside_access_in extended permit tcp 192.168.10.0 255.255.255.0 any eq https &lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit esp any 6**.***.***.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit gre any 6**.***.***.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu dmz 1500&lt;/P&gt;&lt;P&gt;ip local pool Remote-pool 192.168.4.1-192.168.4.254 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image disk0:/asdm-523.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 6**.***.***.10 192.168.10.202 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 6**.***.***.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.10.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2008 06:28:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929874#M937189</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2008-05-28T06:28:22Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929875#M937190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll let someone more familiar with the ASA help you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2008 12:48:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929875#M937190</guid>
      <dc:creator>michael.leblanc</dc:creator>
      <dc:date>2008-05-28T12:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929876#M937191</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;I also have dug this out if it helps&lt;/P&gt;&lt;P&gt;Result of the command: "sh running-config nat"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All I need to do is set NAT for a couple of IP for a couple of services.&lt;/P&gt;&lt;P&gt;thanks all for yyour assitance in advance.&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2008 14:48:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929876#M937191</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2008-05-28T14:48:20Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929877#M937193</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greg,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you be more specific about your problem. Config looks fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 May 2008 14:55:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929877#M937193</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-05-28T14:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929878#M937195</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok the issue is I need to NAT a couple of address'. with it all configured as above the issue is as follows; the hosts that have the NAT address cannot access the outside network (internet) nor can the outside see the selected services that have been set for them.&lt;/P&gt;&lt;P&gt;I have run Packet tracer for www packets out and it fails on an access list which is the system default deny any any Implicit rule.&lt;/P&gt;&lt;P&gt;I have rules that allow www from inside and they work fine when there are no NAT configured address' I have conpared this with another ASA that works and can't see any difference.&lt;/P&gt;&lt;P&gt;I am lost at this point and all help is greatly appreciated.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 06:26:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929878#M937195</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2008-05-29T06:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929879#M937196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would  you please clarify why you have both the .10 n/w and the .2 n/w in your no nat statement?  What network are the users (who cant access the outside) on? Also, have you ran the Live log in debugging mode to see why the packets are being dropped?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.2.0 255.255.255.0 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 08:31:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929879#M937196</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-05-29T08:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929880#M937197</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi &lt;/P&gt;&lt;P&gt;the access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.2.0 255.255.255.0 refers to the vpn tunel that is in place between the two networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static ip address' from the .10 network can not access the outside world ( internet )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 09:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929880#M937197</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2008-05-29T09:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929881#M937198</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Grege&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try changing the seq number of your nat's (not your statics). as seq 0 is a no nat and seq1 is then asking the same network .10 to to be translated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried using the Live Log viewer? try this and let me know how you get on&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sol&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 May 2008 12:10:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929881#M937198</guid>
      <dc:creator>SOL10</dc:creator>
      <dc:date>2008-05-29T12:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929882#M937200</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for that. I have looked at the live viewer and it doesn't display any deny's etc. it does display the tear down on the particular NAT address. so this would say to me it is getting out but the response is not getting back in. I am not sure really.&lt;/P&gt;&lt;P&gt;how do i change teh seq no's?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your assistance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Greg&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 May 2008 07:25:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa5505/m-p/929882#M937200</guid>
      <dc:creator>gregwilmot</dc:creator>
      <dc:date>2008-05-30T07:25:59Z</dc:date>
    </item>
  </channel>
</rss>

