<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic FWSM: nat 0, nat 1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837467#M959353</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to get the incoming traffic via nat (inbound) 0 to pass the FWSM. I also have nat (inbound) 1 that is working ok on the same incoming interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I get nat 0 (no natting via this route) to allow incoming traffic on the inbound interface to outbound interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config extracts:&lt;/P&gt;&lt;P&gt;FWSM Version 2.3(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outbound) 1 10.192.3.83&lt;/P&gt;&lt;P&gt;nat (inbound) 0 access-list no_nat&lt;/P&gt;&lt;P&gt;nat (inbound) 1 access-list Proxy_nat&lt;/P&gt;&lt;P&gt;access-group outbound_access_in in interface outbound&lt;/P&gt;&lt;P&gt;access-group inbound_access_in in interface inbound&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 11:39:17 GMT</pubDate>
    <dc:creator>s.srivas</dc:creator>
    <dc:date>2019-03-11T11:39:17Z</dc:date>
    <item>
      <title>FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837467#M959353</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to get the incoming traffic via nat (inbound) 0 to pass the FWSM. I also have nat (inbound) 1 that is working ok on the same incoming interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do I get nat 0 (no natting via this route) to allow incoming traffic on the inbound interface to outbound interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Config extracts:&lt;/P&gt;&lt;P&gt;FWSM Version 2.3(4) &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;global (outbound) 1 10.192.3.83&lt;/P&gt;&lt;P&gt;nat (inbound) 0 access-list no_nat&lt;/P&gt;&lt;P&gt;nat (inbound) 1 access-list Proxy_nat&lt;/P&gt;&lt;P&gt;access-group outbound_access_in in interface outbound&lt;/P&gt;&lt;P&gt;access-group inbound_access_in in interface inbound&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837467#M959353</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2019-03-11T11:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837468#M959354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say that you have a 10.10.10.0 network inside and you dont want this address translated when its destination is 10.192.3.120. Then all you need is following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat permit ip 10.10.10.0 255.255.255.0 host 10.192.3.120&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2007 12:52:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837468#M959354</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-05T12:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837469#M959355</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try to test the following&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip any any&lt;/P&gt;&lt;P&gt;Referrencing&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/docs/security/fwsm/fwsm31/configuration/guide/nwacc_f.html" target="_blank"&gt;http://www.cisco.com/en/US/partner/docs/security/fwsm/fwsm31/configuration/guide/nwacc_f.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I already have the followings&lt;/P&gt;&lt;P&gt;and can not identify what else is causing the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;config extracts:&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip TS-Proxy 255.255.255.224 GIN2_mgmt1 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip SB-Proxy 255.255.255.224 GIN2_mgmt1 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip TS-Proxy 255.255.255.224 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip SB-Proxy 255.255.255.224 10.0.0.0 255.0.0.0 &lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip GIN2_mgmt1 255.255.255.0 TS-Proxy 255.255.255.224 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;name 10.192.1.224 SB-Proxy&lt;/P&gt;&lt;P&gt;name 10.192.2.224 TS-Proxy&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;network-object TS-Proxy 255.255.255.224&lt;/P&gt;&lt;P&gt;network-object SB-Proxy 255.255.255.224&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2007 13:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837469#M959355</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2007-12-05T13:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837470#M959356</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;following acl has no use, and all other nat statements will be ignored. So dont use the following&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip any any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I couldnt browse the link you submit, would you please describe what you want to achieve?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2007 14:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837470#M959356</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-05T14:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837471#M959357</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, any any will be no use. I realised that as soon as I sent the previous reply.  So I'm planning to include the following to the existing ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip any 10.230.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(What I'm trying to acheive is:&lt;/P&gt;&lt;P&gt;Through tunnel 0 and tunnel 1 in the front end router, make the front-lower FWSM to use&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat 1 to route to a real ISP with real addresses&lt;/P&gt;&lt;P&gt;nat 0 to route to a private ISP with 10.x sddresses. (Ours is 10. address too but not overlapping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Incoming traffic from fe-Router is apparently hiting the FWSM inbound, but can not get through the FWSM.)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2007 15:57:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837471#M959357</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2007-12-05T15:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837472#M959358</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So, lets say that &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside aRealIPfromISP&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip any 10.230.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.x.x.x 255.255.255.0    -&amp;gt; your inside network&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In above config, traffic to 10.230.0.0/24 wont be NATed , and rest of the traffic from your inside network will flow through your ISP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Dec 2007 19:53:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837472#M959358</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2007-12-05T19:53:08Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: nat 0, nat 1</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837473#M959359</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat 0 takes the tunnel 0 to outside private ISP. (They will do the necessary natting)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat 1 takes the tunnel 1 to outside to the real ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not changed any configs yet, as the acces-list already allows (in name format).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ping from FWSM to 10.230.0.1 works ok.&lt;/P&gt;&lt;P&gt;only problem is traffic initiated in 10.230.0.0 is dropped (or some thing happens) before entering FWSM.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Dec 2007 10:36:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-nat-0-nat-1/m-p/837473#M959359</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2007-12-06T10:36:49Z</dc:date>
    </item>
  </channel>
</rss>

