<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375917#M960232</link>
    <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually I am upgrading ASA from 8.2 to 8.4.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In 8.2 there are 2 NAT entries:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;static (Zone-1,Zone-2) &lt;SPAN&gt;192.168.1.1&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;192.168.1.1&lt;/SPAN&gt;&amp;nbsp;netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;static (&lt;SPAN&gt;Zone-1,Zone-2&lt;/SPAN&gt;)&amp;nbsp;172.16.1.15&amp;nbsp; &lt;SPAN&gt;192.168.1.15&amp;nbsp;&lt;/SPAN&gt; netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to achieve same thing with these two entries.&lt;/P&gt;</description>
    <pubDate>Tue, 01 May 2018 10:32:13 GMT</pubDate>
    <dc:creator>Harmeet Singh</dc:creator>
    <dc:date>2018-05-01T10:32:13Z</dc:date>
    <item>
      <title>NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375871#M960230</link>
      <description>&lt;P&gt;I have two zones in firewall Zone-1 and Zone-2.&lt;/P&gt;
&lt;P&gt;One Server is connected in Zone-1 192.168.1.15. Two desktop are connected in Zone-2 with different subnet/vlan (Desktop-1 10.14.3.150/24 and Desktop-2 20.14.3.150). Both Desktop are able to reach the Server's original IP.&lt;/P&gt;
&lt;P&gt;Is it possible to access Server's both IPs (Original and Natted) from both Desktops at the same time.&lt;/P&gt;
&lt;P&gt;Currently there is no NAT configuration in the ASA 9.6&lt;/P&gt;
&lt;P&gt;If doing static nat, only one IP is reachable at that time.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:41:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375871#M960230</guid>
      <dc:creator>Harmeet Singh</dc:creator>
      <dc:date>2020-02-21T15:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375878#M960231</link>
      <description>&lt;P&gt;It is possible to do this but it will require NAT in both directions and can become quite complicated / difficult to manage and troubleshoot.&amp;nbsp; I would not recommend doing this unless you have a very good reason for doing so.&lt;/P&gt;
&lt;P&gt;You would need to set up two NAT for each PC.&amp;nbsp; One NAT going from the server to the PCs for the NATed IP and one from the PC to the real IP.&amp;nbsp; Using PC 1 as an example, and assuming the interface names on the ASA are zone1 and zone2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network PC1_REAL_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 10.14.3.150&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network PC1_NAT_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 11.14.3.15&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network SERVER_REAL_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 192.168.1.15&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;objecet network SERVER_NAT_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 172.16.1.15&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (zone1,zone2) source static SERVER_REAL_IP SERVER_NAT_IP destination static PC1_REAL_IP PC1_REAL_IP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (zone1,zone2) source static SERVER_REAL_IP&amp;nbsp;SERVER_REAL_IP destination static&amp;nbsp;PC1_NAT_IP&amp;nbsp;PC1_REAL_IP&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this scenario the PC can access the server using both NAT IP and real IP,&amp;nbsp; When using the NAT IP of the server the server sees the PC with the PC's real IP, but when using the server's real IP the server sees the PC with the PCs NATed IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Keep in mind that this example only describes the NAT, access lists will still need to be added to allow the traffic.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 09:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375878#M960231</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-01T09:06:54Z</dc:date>
    </item>
    <item>
      <title>Re: NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375917#M960232</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Actually I am upgrading ASA from 8.2 to 8.4.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In 8.2 there are 2 NAT entries:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;static (Zone-1,Zone-2) &lt;SPAN&gt;192.168.1.1&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN&gt;192.168.1.1&lt;/SPAN&gt;&amp;nbsp;netmask 255.255.255.0&lt;/P&gt;
&lt;P&gt;static (&lt;SPAN&gt;Zone-1,Zone-2&lt;/SPAN&gt;)&amp;nbsp;172.16.1.15&amp;nbsp; &lt;SPAN&gt;192.168.1.15&amp;nbsp;&lt;/SPAN&gt; netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to achieve same thing with these two entries.&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 10:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375917#M960232</guid>
      <dc:creator>Harmeet Singh</dc:creator>
      <dc:date>2018-05-01T10:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375951#M960233</link>
      <description>&lt;P&gt;They are actually not even require in 8.2 unless you have "nat control" enabled, which I am assuming you have since they are there, or there are other dynamic NATs that you are trying to override.&amp;nbsp; A better solution for 8.2 would be do use NAT exempt statement, but that is for another discussion.&lt;/P&gt;
&lt;P&gt;nat control is removed from the configuration as of 8.3 and later.&amp;nbsp; These commands just nat the IP address to itself.&amp;nbsp; Is it possible yes to do in 9.x, ofcourse, but you should have a good reason for doing so.&lt;/P&gt;</description>
      <pubDate>Tue, 01 May 2018 12:39:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3375951#M960233</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-01T12:39:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3377985#M960234</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;8.2 ASA has an entry:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;static (MPLS,SERVER) 10.31.2.0 &lt;SPAN&gt;10.31.2.0&lt;/SPAN&gt; netmask 255.255.255.224&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;static (DMZ,PRODUCTION) 192.168.13.32&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt; 192.168.13.32&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;netmask 255.255.255.224&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If convert same entry in 8.4 it would be:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network &lt;SPAN&gt;10.31.2.0&lt;/SPAN&gt;&lt;BR /&gt; subnet &lt;SPAN&gt;10.31.2.0&lt;/SPAN&gt;&amp;nbsp;255.255.255.224&lt;BR /&gt; nat (&lt;SPAN&gt;MPLS,SERVER&lt;/SPAN&gt;) static &lt;SPAN&gt;10.31.2.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp; &lt;SPAN&gt;192.168.13.32&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;subnet&amp;nbsp; 192.168.13.32&amp;nbsp;255.255.255.224&lt;BR /&gt;nat (DMZ,PRODUCTION) static&amp;nbsp; 192.168.13.32&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am confuse here because&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;in first statement a subnet is natted with network address (10.31.2.0) and&amp;nbsp;&lt;/SPAN&gt;in second statement a subnet is natted with single IP (192.168.13.32).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Are above nat statements correct? What will happen during the communication in both statements..&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am trying to override some other dynamic entry hare during migration form 8.2 to 8.4.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 May 2018 11:03:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3377985#M960234</guid>
      <dc:creator>Harmeet Singh</dc:creator>
      <dc:date>2018-05-04T11:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT in ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3378085#M960235</link>
      <description>&lt;P&gt;yes, those commands will give the same result as the commands from 8.2 version.&lt;/P&gt;</description>
      <pubDate>Fri, 04 May 2018 12:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-in-asa/m-p/3378085#M960235</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2018-05-04T12:50:07Z</dc:date>
    </item>
  </channel>
</rss>

