<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy static NAT on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963548#M939237</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot to whoever responded. This thing might have already been working all along but because of my VPN issues, I was testing it with packet capture. I was just comparing packet capture on inside and outside interface and it still shows original source address. I guess it has something to do with order or operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see where and how the NAT happens, run packet-tracer on the ASA and you will see it clearly like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT     &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.99.1.0  access-list msp-nat &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside 192.168.1.0 255.255.255.0 outside host 172.19.1.1&lt;/P&gt;&lt;P&gt;    static translation to 10.99.1.0&lt;/P&gt;&lt;P&gt;    translate_hits = 13, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.1.0/0 to 10.99.1.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Apr 2008 12:46:05 GMT</pubDate>
    <dc:creator>smunzani</dc:creator>
    <dc:date>2008-04-16T12:46:05Z</dc:date>
    <item>
      <title>Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963539#M939227</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have ASA box here running 7.2.3 code. Below is the goal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Simple configuration. Inside and outside. When inside subnets go on internet use the PAT(global and nat commands). However if the inside hosts go to a specific address(my 3rd party MSP), the source addresses should be NATed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is my config.&lt;/P&gt;&lt;P&gt;access-list msp-nat permit ip 192.168.1.0 255.255.255.0 host 2.2.2.2&lt;/P&gt;&lt;P&gt;static(inside,outside) 10.99.1.0 access-list msp-nat netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However the issue is netmask is a valid option if you hit ?, however when you type that up, it tells me its not a valid option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my-fw(config)# static (inside,outside) 10.99.1.0 access-list msp-nat netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;invalid option netmask&lt;/P&gt;&lt;P&gt;Usage: [no] static [(real_ifc, mapped_ifc)]&lt;/P&gt;&lt;P&gt;                {&amp;lt;mapped_ip&amp;gt;|interface}&lt;/P&gt;&lt;P&gt;                {&amp;lt;real_ip&amp;gt; [netmask &amp;lt;mask&amp;gt;]} | {access-list &amp;lt;acl_name&amp;gt;}&lt;/P&gt;&lt;P&gt;                [dns]&lt;/P&gt;&lt;P&gt;                [[tcp] &amp;lt;max_conns&amp;gt; [&amp;lt;emb_lim&amp;gt; [&amp;lt;norandomseq&amp;gt; [nailed]]]]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sure I am not the 1st guy who is running on to this requirement. Almost all of 3rd party VPN connections require some kind of NAT to avoid overlapping IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:31:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963539#M939227</guid>
      <dc:creator>smunzani</dc:creator>
      <dc:date>2019-03-11T12:31:46Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963540#M939228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From command ref:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If you use the access-list keyword instead&lt;/P&gt;&lt;P&gt;of the real_ip, then the subnet mask used in the access list is also used for the&lt;/P&gt;&lt;P&gt;mapped_ip."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you should be able to do...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list msp-nat permit ip 192.168.1.0 255.255.255.0 host 2.2.2.2&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.99.1.0 access-list msp-nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 19:25:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963540#M939228</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-15T19:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963541#M939230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's what I am trying now but how does it know it needs to do subnet to subnet NAT? Usually on static command you define the mask. Here we don't have the mask defined on static command. The mast on the ACL is only for triggering the policy NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 19:35:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963541#M939230</guid>
      <dc:creator>smunzani</dc:creator>
      <dc:date>2008-04-15T19:35:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963542#M939231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The source subnet mask used in the access list is also used for the mapped addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know why the CLI is even showing the netmask as an option since it's not part of the static command structure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For policy static NAT, enter the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hostname(config)# static (real_interface,mapped_interface) {mapped_ip | interface} &lt;/P&gt;&lt;P&gt;access-list acl_name [dns] [norandomseq] [[tcp] tcp_max_conns [emb_limit]] [udp &lt;/P&gt;&lt;P&gt;udp_max_conns]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create the access list using the access-list command (see the "Adding an Extended Access List" section). This access list should include only permit ACEs. The source subnet mask used in the access list is also used for the mapped addresses. You can also specify the real and destination ports in the access list using the eq operator. Policy NAT does not consider the inactive or time-range keywords; all ACEs are considered to be active for policy NAT configuration. See the "Policy NAT" section for more information. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 19:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963542#M939231</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2008-04-15T19:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963543#M939232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It takes the mask from the real address in the acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it's almost like..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.99.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You're just moving the real ip and mask up to the acl.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 19:44:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963543#M939232</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-04-15T19:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963544#M939233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It doesn't seem to be working though. I don't see ACL hit counts anywhere. Here is full sanitized config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list msp-vpn extended permit ip 10.0.66.0 255.255.255.0 host 172.19.1.1 &lt;/P&gt;&lt;P&gt;access-list msp-nat extended permit ip 192.168.1.0 255.255.255.0 host 172.19.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.66.0  access-list msp-nat &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto map vpn-map 10 match address msp-vpn&lt;/P&gt;&lt;P&gt;crypto map vpn-map 10 set peer x.x.x.x &lt;/P&gt;&lt;P&gt;crypto map vpn-map 10 set transform-set ESP-3DES-MD5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;crypto isakmp policy 30&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption 3des&lt;/P&gt;&lt;P&gt; hash md5&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x type ipsec-l2l&lt;/P&gt;&lt;P&gt;tunnel-group x.x.x.x ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MYFW(config)# show xlate&lt;/P&gt;&lt;P&gt;36 in use, 250 most used&lt;/P&gt;&lt;P&gt;Global 10.0.66.0 Local 192.168.1.0&lt;/P&gt;&lt;P&gt;PAT Global x.x.x.x(1798) Local 192.168.1.124(3019)&lt;/P&gt;&lt;P&gt;&amp;lt;&amp;lt; more output trimmed here &amp;gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with this config, I don't even see the VPN triggering since NAT doesn't trigger. Show access-list doesn't show hit count increment on neither of the ACLs mentioned above. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 20:02:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963544#M939233</guid>
      <dc:creator>smunzani</dc:creator>
      <dc:date>2008-04-15T20:02:19Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963545#M939234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Configuration looks good. Did you do a 'clear xlate' after the configuration change? If still doesn't work try the policy nat instead of the policy static NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 20:08:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963545#M939234</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2008-04-15T20:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963546#M939235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sam &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you try this just to make sure it's not something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) remove the static entry&lt;/P&gt;&lt;P&gt;2) add the following config &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   nat (inside) 2 access-list msp-nat&lt;/P&gt;&lt;P&gt;   global (outside) 2 10.0.66.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 20:10:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963546#M939235</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-04-15T20:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963547#M939236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That doesn't work for me since that would work only for traffic from inside to outside. I need static since MSP needs to reach each individual IPs for monitoring purposes. We need to reach MSP server to sent traps/syslog.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To prove my logic here, I ran capture command with an ACL and ping destination IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list debug-nat extended permit ip any host 172.19.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;capture debug-inside type raw-data access-list debug-nat buffer 1024000 interface inside&lt;/P&gt;&lt;P&gt;capture debug-outside type raw-data access-list debug-nat buffer 1024000 interface outside&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;MYFW(config)# sh capture debug-inside&lt;/P&gt;&lt;P&gt;3 packets captured&lt;/P&gt;&lt;P&gt;   1: 13:08:28.210468 802.1Q vlan#1 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   2: 13:08:33.365383 802.1Q vlan#1 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   3: 13:08:38.864976 802.1Q vlan#1 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;3 packets shown&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;MYFW(config)# sh capture debug-outside&lt;/P&gt;&lt;P&gt;4 packets captured&lt;/P&gt;&lt;P&gt;   1: 13:08:28.210651 802.1Q vlan#2 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   2: 13:08:33.365535 802.1Q vlan#2 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   3: 13:08:38.865143 802.1Q vlan#2 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;   4: 13:08:44.364834 802.1Q vlan#2 P0 192.168.1.5 &amp;gt; 172.19.1.1: icmp: echo request&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Apr 2008 20:18:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963547#M939236</guid>
      <dc:creator>smunzani</dc:creator>
      <dc:date>2008-04-15T20:18:19Z</dc:date>
    </item>
    <item>
      <title>Re: Policy static NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963548#M939237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot to whoever responded. This thing might have already been working all along but because of my VPN issues, I was testing it with packet capture. I was just comparing packet capture on inside and outside interface and it still shows original source address. I guess it has something to do with order or operation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see where and how the NAT happens, run packet-tracer on the ASA and you will see it clearly like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: NAT     &lt;/P&gt;&lt;P&gt;Subtype: &lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.99.1.0  access-list msp-nat &lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;  match ip inside 192.168.1.0 255.255.255.0 outside host 172.19.1.1&lt;/P&gt;&lt;P&gt;    static translation to 10.99.1.0&lt;/P&gt;&lt;P&gt;    translate_hits = 13, untranslate_hits = 0&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Static translate 192.168.1.0/0 to 10.99.1.0/0 using netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Apr 2008 12:46:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-static-nat-on-asa/m-p/963548#M939237</guid>
      <dc:creator>smunzani</dc:creator>
      <dc:date>2008-04-16T12:46:05Z</dc:date>
    </item>
  </channel>
</rss>

