<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5505 as internet gateway (needs reverse NAT) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603681#M940420</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've restore and reverse access backed also I have ASA as gateway.&lt;/P&gt;&lt;P&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and reverse access back also I have ASA as gateway!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are all my nat settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;BR /&gt;nat (OLD-Private) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I have these commands as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map WAN_map interface WAN&lt;BR /&gt;crypto isakmp enable WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Great solution - great man!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Feb 2011 22:30:37 GMT</pubDate>
    <dc:creator>Nick Sinyakov</dc:creator>
    <dc:date>2011-02-07T22:30:37Z</dc:date>
    <item>
      <title>ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603673#M940412</link>
      <description>&lt;P&gt;Hi all Cisco guru,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have this scheme:&lt;/P&gt;&lt;P&gt;Office -&amp;gt; Cisco 877 -&amp;gt; Internet -&amp;gt; ASA 5505 -&amp;gt; remote network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Office network: 192.168.10.0/24&lt;/P&gt;&lt;P&gt;Cisco 877 internal IP: 192.168.10.200&lt;/P&gt;&lt;P&gt;Cisco 877 external IP: a.a.a.a&lt;/P&gt;&lt;P&gt;ASA 5505 external IP: b.b.b.b&lt;/P&gt;&lt;P&gt;ASA 5505 internal IP: &lt;STRONG&gt;192.168.17.3 and 192.168.1.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Remote network: 192.168.17.0/24 and 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VPN tunnel is OK and up. I have access from Office to remote network, and access from remote network to office via tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But when I'm trying to get access in remote network (there are 2 vlans: Management and OLD-Private) to internet, ASA replies me:&lt;/P&gt;&lt;P&gt;305013&amp;nbsp;&amp;nbsp;&amp;nbsp; *.*.64.9&amp;nbsp;&amp;nbsp;&amp;nbsp; 53&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Asymmetric NAT rules matched for forward and reverse flows; Connection for udp src OLD-Private:192.168.17.138/59949 dst WAN:*.*.64.9/53 denied due to NAT reverse path failure&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping from OLD-Private interface to google result:&lt;/P&gt;&lt;P&gt;110003&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.17.2&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.102.7.104&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; Routing failed to locate next hop for icmp from NP Identity Ifc:192.168.17.2/0 to OLD-Private:66.102.7.104/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traceroute result&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/legacy/8/5/7/10758-Capture.PNG" alt="Capture.PNG" class="jive-image-thumbnail jive-image" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;How can I solve reverse NAT and make ASA as internet gateway?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is my full config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;ASA Version 8.2(2) &lt;BR /&gt;!&lt;BR /&gt;hostname ASA2&lt;BR /&gt;domain-name default.domain.invalid&lt;BR /&gt;enable password password encrypted&lt;BR /&gt;passwd password&amp;nbsp; encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; description INTERNET&lt;BR /&gt; mac-address 1234.5678.0002&lt;BR /&gt; nameif WAN&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address b.b.b.b 255.255.248.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; description OLD-PRIVATE&lt;BR /&gt; mac-address 1234.5678.0202&lt;BR /&gt; nameif OLD-Private&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.17.3 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Vlan6&lt;BR /&gt; description MANAGEMENT&lt;BR /&gt; mac-address 1234.5678.0206&lt;BR /&gt; nameif Management&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 192.168.1.3 255.255.255.0 &lt;BR /&gt; ospf cost 10&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt; switchport trunk allowed vlan 2,6&lt;BR /&gt; switchport mode trunk&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; shutdown&lt;BR /&gt;!&lt;BR /&gt;banner login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ** W A R N I N G **&lt;BR /&gt;banner login&amp;nbsp;&amp;nbsp; Unauthorized access prohibited. All access is&lt;BR /&gt;banner login monitored, and trespassers shall be prosecuted&lt;BR /&gt;banner login&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to the fullest extent of the law.&lt;BR /&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ** W A R N I N G **&lt;BR /&gt;banner motd&amp;nbsp;&amp;nbsp; Unauthorized access prohibited. All access is&lt;BR /&gt;banner motd monitored, and trespassers shall be prosecuted&lt;BR /&gt;banner motd&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; to the fullest extent of the law.&lt;BR /&gt;boot system disk0:/asa822-k8.bin&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns domain-lookup WAN&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; name-server dns.dns.dns.dns&lt;BR /&gt; domain-name default.domain.invalid&lt;BR /&gt;same-security-traffic permit intra-interface&lt;BR /&gt;object-group protocol TCPUDP&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt;object-group service RDP tcp&lt;BR /&gt; description RDP&lt;BR /&gt; port-object eq 3389&lt;BR /&gt;access-list LAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list LAN_IP standard permit 192.168.17.0 255.255.255.0 &lt;BR /&gt;access-list WAN_access_in extended permit ip any any log debugging &lt;BR /&gt;access-list WAN_access_in extended permit ip interface OLD-Private interface WAN log debugging inactive &lt;BR /&gt;access-list WAN_access_in extended permit tcp any object-group RDP any object-group RDP log debugging &lt;BR /&gt;access-list MANAGEMENT_access_in extended permit ip any any log debugging &lt;BR /&gt;access-list OLD-PRIVATE_access_in extended permit ip any any log debugging &lt;BR /&gt;access-list&amp;nbsp; OLD-PRIVATE_access_in extended permit ip 192.168.10.0 255.255.255.0&amp;nbsp; 192.168.17.0 255.255.255.0 log debugging inactive &lt;BR /&gt;access-list OLD-PRIVATE_access_in extended permit object-group TCPUDP host 192.168.10.7 any log debugging inactive &lt;BR /&gt;access-list OLD-PRIVATE_access_in extended permit icmp host 192.168.10.254 interface OLD-Private log debugging inactive &lt;BR /&gt;access-list OLD-PRIVATE_access_in extended permit icmp host 192.168.17.155 interface OLD-Private log debugging &lt;BR /&gt;access-list 101 extended permit tcp host 192.168.10.7 any eq 3389 log debugging &lt;BR /&gt;access-list WAN_1_cryptomap extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_1_cryptomap extended permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_cryptomap_2 extended permit ip 192.168.1.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list capin extended permit ip host 192.18.17.155 host 192.168.10.7 &lt;BR /&gt;access-list capin extended permit ip host 192.168.10.7 host 192.168.17.155 &lt;BR /&gt;access-list LAN_access_in extended permit ip any any log debugging &lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_2_cryptomap extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip 192.168.10.0 255.255.255.0 192.168.17.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging trap debugging&lt;BR /&gt;logging asdm debugging&lt;BR /&gt;logging debug-trace&lt;BR /&gt;logging class auth trap debugging &lt;BR /&gt;mtu WAN 1500&lt;BR /&gt;mtu OLD-Private 1500&lt;BR /&gt;mtu Management 1500&lt;BR /&gt;ip local pool VPN_Admin_IP 192.168.1.150-192.168.1.199 mask 255.255.255.0&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit host a.a.a.a WAN&lt;BR /&gt;icmp deny any WAN&lt;BR /&gt;icmp permit host 192.168.10.7 WAN&lt;BR /&gt;icmp permit host b.b.b.b WAN&lt;BR /&gt;asdm image disk0:/asdm-631.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (OLD-Private) 1 interface&lt;BR /&gt;global (Management) 1 interface&lt;BR /&gt;nat (WAN) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (WAN) 0 access-list inside_nat0_outbound&lt;BR /&gt;access-group WAN_access_in in interface WAN&lt;BR /&gt;access-group OLD-PRIVATE_access_in in interface OLD-Private&lt;BR /&gt;access-group MANAGEMENT_access_in in interface Management&lt;BR /&gt;route WAN 0.0.0.0 0.0.0.0 b.b.b.185 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa local authentication attempts max-fail 10&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 WAN&lt;BR /&gt;http 0.0.0.0 0.0.0.0 WAN&lt;BR /&gt;http b.b.b.b 255.255.255.255 WAN&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;service resetoutside&lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto map WAN_map 1 match address WAN_1_cryptomap&lt;BR /&gt;crypto map WAN_map 1 set peer a.a.a.a &lt;BR /&gt;crypto map WAN_map 1 set transform-set ESP-DES-SHA&lt;BR /&gt;crypto map WAN_map interface WAN&lt;BR /&gt;crypto isakmp enable WAN&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto isakmp policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 1&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh a.a.a.a 255.255.255.255 WAN&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;ssh version 2&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd auto_config Management&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics host&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;threat-detection statistics tcp-intercept rate-interval 30 burst-rate 400 average-rate 200&lt;BR /&gt;ntp server 129.6.15.28 source WAN prefer&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec svc webvpn&lt;BR /&gt;group-policy admin internal&lt;BR /&gt;group-policy admin attributes&lt;BR /&gt; dns-server value dns.dns.dns.dns&lt;BR /&gt; vpn-tunnel-protocol IPSec &lt;BR /&gt; split-tunnel-policy tunnelspecified&lt;BR /&gt; split-tunnel-network-list value LAN_IP&lt;BR /&gt;username administrator password password encrypted privilege 15&lt;BR /&gt;tunnel-group admin type remote-access&lt;BR /&gt;tunnel-group admin general-attributes&lt;BR /&gt; address-pool VPN_Admin_IP&lt;BR /&gt; default-group-policy admin&lt;BR /&gt;tunnel-group a.a.a.a type ipsec-l2l&lt;BR /&gt;tunnel-group a.a.a.a general-attributes&lt;BR /&gt; default-group-policy admin&lt;BR /&gt;tunnel-group a.a.a.a ipsec-attributes&lt;BR /&gt; pre-shared-key *&lt;BR /&gt; peer-id-validate nocheck&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your time and help&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603673#M940412</guid>
      <dc:creator>Nick Sinyakov</dc:creator>
      <dc:date>2020-02-21T12:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603674#M940413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is there a particular reason why your internet interface has security level 100 and the private interface 0? It should be the other way around. That might be causing some issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this setup if you want to pass traffic from&amp;nbsp; OLD-Private (sec level 0) to the WAN (sec level 100) you will need a static translation and the proper ACLS allowing the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check that out.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 21:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603674#M940413</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-04T21:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603675#M940414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've changed security-level on all interfaces, unfortunatelly it didn't help. What else should I check?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Feb 2011 23:54:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603675#M940414</guid>
      <dc:creator>Nick Sinyakov</dc:creator>
      <dc:date>2011-02-06T23:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603676#M940415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, can you paste again the packet tracer after changing the security levels?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 13:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603676#M940415</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T13:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603677#M940416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've changed nat settings before security-level. There is my new nat settings and packet tracer results:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 any &lt;BR /&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;BR /&gt;nat (OLD-Private) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/" /&gt;&lt;IMG src="http://supportforums.cisco.com/sites/default/files/legacy/3/8/8/10883-Capture.PNG" class="jive-image" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks ok in Packet Capture, but when I'm trying to ping 66.102.7.104 throw OLD-Private interface ASDM log show me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;110003&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.17.2&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.102.7.104&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp; Routing failed to locate next hop for icmp from NP Identity Ifc:192.168.17.2/0 to OLD-Private:66.102.7.104/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's wrong with my config?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 21:50:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603677#M940416</guid>
      <dc:creator>Nick Sinyakov</dc:creator>
      <dc:date>2011-02-07T21:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603678#M940417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why are you using that type of NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 any &lt;BR /&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are basically telling the ASA not to NAT the traffic. This private IP range will not be routed on the Internet. Is this traffic meant to be sent to the Internet? If so, then that ALC should not be there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to NAT the traffic to a public IP on the outside of the ASA you will need to remove that line and let the NAT and GLOBAL work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (OLD-Private) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (WAN) 1 interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603678#M940417</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T22:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603679#M940418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are genius!&lt;/P&gt;&lt;P&gt;It's working. Just last easy question for you. When I've removed these strings, I lost reverse access from remote lan to my local lan. Before it I could ping 192.168.10.7 and RDP or smth. else, but not now.&lt;/P&gt;&lt;P&gt;Can you help with it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:11:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603679#M940418</guid>
      <dc:creator>Nick Sinyakov</dc:creator>
      <dc:date>2011-02-07T22:11:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603680#M940419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you remove the command " nat (OLD-Private) 0 access-list WAN_nat0_outbound". You need that line for the VPN traffic to avoid NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure you still have the commands:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map WAN_map interface WAN&lt;BR /&gt;crypto isakmp enable WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:18:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603680#M940419</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T22:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603681#M940420</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've restore and reverse access backed also I have ASA as gateway.&lt;/P&gt;&lt;P&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and reverse access back also I have ASA as gateway!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are all my nat settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list LAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;access-list WAN_nat0_outbound extended permit ip 192.168.17.0 255.255.255.0 192.168.10.0 255.255.255.0 &lt;BR /&gt;nat (OLD-Private) 0 access-list WAN_nat0_outbound&lt;BR /&gt;nat (OLD-Private) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I have these commands as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto map WAN_map interface WAN&lt;BR /&gt;crypto isakmp enable WAN&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot! &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; Great solution - great man!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:30:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603681#M940420</guid>
      <dc:creator>Nick Sinyakov</dc:creator>
      <dc:date>2011-02-07T22:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5505 as internet gateway (needs reverse NAT)</title>
      <link>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603682#M940421</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are welcome my friend.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Feb 2011 22:33:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5505-as-internet-gateway-needs-reverse-nat/m-p/1603682#M940421</guid>
      <dc:creator>PAUL GILBERT ARIAS</dc:creator>
      <dc:date>2011-02-07T22:33:37Z</dc:date>
    </item>
  </channel>
</rss>

