03-08-2011 03:13 AM - edited 03-11-2019 01:02 PM
hi experts
i have a question for the following outside nat statement when the user is coming from outside of the ASA and requires to go to inside destination
is the below nat at all possible ? i.e nat exempt with outside .if yes , then in what circumstance it will be used .this kind of seem to do identity
source translation from outside to inside
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip <Source> <Destination>
or
access-list OUT_NAT extended permit ip interface outside 10.1.1.1 255.255.255.255
03-08-2011 05:50 AM
Hi,
This rule:
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip
Is used to tell the ASA to bypass NAT for traffic received on its outside interface from
Just to give you an example...
If you have a nat rule to provide Internet access to VPN clients terminating on the outside interface:
nat (outside) 1 VPN_POOL
global (outside) 1 interface
Then, you can add the above NAT0 rule to bypass NAT between the VPN client pool and another Site-to-Site tunnel.
Hope it helps.
Federico.
03-09-2011 03:04 AM
Hi
thanks for replying , und'stnd this now .
so you mean the VPN Clients will be able to access the internal devices of the ASA1 (apart from accessing internet from the same ASA1 ) and devices of other ASA2 as well , if ASA1 and ASA2 have site to site vpn among them (see below ) ?
Inside servers
|
|
ASA2----ASA1----VPN Clients
also , this seems to resemble closely to the "Split tunnel" functionality in the VPN ? right ?
2) have one more query
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip
can we also achieve the above with the help of static policy (identity) nat i.e something like
static (outside,inside)
access-list OUT_NAT extended permit ip
where the destination will be ASA inside servers
03-09-2011 07:36 AM
Jayesh,
Your 1st query :
by using the nat exempt mentioned by fred we can access both the internal servers as well as networks behind ASA2 if you have a site to site vpn configured.
This is totally different from split tunneling.
In Split tunneling we actually differentiate the traffic that is supposed to flow through the VPN tunnel from the clients end.
in case you access-list as follows in the split tunnel : access-list split standard permit 10.0.0.0 255.255.255.0
We mention that we need to send all traffic to 10.0.0.0 through the VPN tunnel and rest all other traffic need not be encrypted.
Your 2nd Query:
We could also implement it using the Static policy Nat as suggested by you . But the only condition being the traffic has to be initiated from the source mentioned in the access-list. Until then there would not be a entry in the xlate table.
NAT exempt is bi-directional and it doesnt create an entry in the xlate table where as policy nat is unidirectional and hence traffic has to be sourced from the source ip mentioned in the access-list to create entry in the xlate table.
Hope this addresses all the query
03-11-2011 03:53 AM
thanks for explaining it praveen , but the below nat is only for the low to higher source identity translation as it has outside keyword and i dont think it will be bidirectional , though the NAT exempts are bidirectional
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip
Also static identity policy nat is bidirectional . this below eg. will act as a source translation for outside (lower to higher) and destination dranslation from higher to lower .right ?
static (outside,inside)
access-list OUT_NAT extended permit ip
03-11-2011 05:55 PM
Hi ,
The usage of the keyword " outside" purely defines the static as a destination Nat and hence you will need a source nat also
The policy Nat is bi-directional but after an Xlate entry is created. Hence the traffic has to be initiated from the source mentioned in the access-list.
For example :
Static (inside,outside) 10.1.1.0 access-list test
access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.
The traffic has to be initiated from 10.0.0.0 only then there would be a entry in the xlate.
once there is a entry in the xlate the entry works as bidirectional.
03-12-2011 06:57 PM
praveen , thanks for replying
1) i am still not clear if this is a bidirectional NAT ? in my views i dont think so it is bidirectional (usually NAT exempts are bidirectional but this is not )
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip
2) as per you the "outside" keyword purely defines the static as a "destination Nat" .i dont think is true as in below example we are doing a source identity translation (assuming VPN CLIENT from outside initates the traffic)
static (outside,inside)
access-list OUT_NAT extended permit ip
3) just for my curiosity there is one example you mentioned below and indeed this has nothing to do with the above two
Static (inside,outside) 10.1.1.0 access-list test
access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.
my ques : is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?
03-15-2011 11:54 PM
hi experts ,
any input on this is highly apprciated .
03-17-2011 07:22 PM
hi experts
i was waiting for some expert comment on this .kindly help
03-18-2011 01:50 AM
Got lost in the mail thread. The objective of using outside nat / indentity nat for VPN pool is not clear.
Please elaborate.
Paps
03-18-2011 07:20 PM
hi paps,
making it more clear .
1) whether the below NAT exempt with remote vpn client as source (on out of asa) bidirectional or not
nat (outside) 0 access-list OUT_NAT outside
access-list OUT_NAT extended permit ip
2) a simple policy based nat is as follows (nothing to do with outside nat)
Static (inside,outside) 10.1.1.0 access-list test
access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
where 10.0.0.0 is on inside and 11.0.0.0 is on the outside.
my ques : is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?
03-19-2011 03:12 AM
Hi,
Q1. whether the below NAT exempt with remote vpn client as source (on out of asa) bidirectional or not?
A1. It is bidirectional.
Q2. is it necessary that xlate will be created when 10.0.0.0 will intiate the traffic . what if 11.0.0.0 initates traffic first ?
A2. An xlate will be created as soon as this static nat is configured. (That is why it is called static).
# show run access-l
access-list test extended permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
# show run static
static (inside,outside) 10.1.1.0 access-list test
# show xlate
1 in use, 2 most used
Global 10.1.1.0 Local 10.0.0.0
Paps
03-19-2011 06:09 AM
hi paps
thanks for answring .
regarding 2nd ques , you have mentioned that xlate is created as soon as static nat is configured .
while praveen mentioned following if you see the initial part of this thread (mentioned in " ")
"The policy Nat is bi-directional but after an Xlate entry is created. Hence the traffic has to be initiated from the source mentioned in the access-list.
For example :
Static (inside,outside) 10.1.1.0 access-list test
access-list test permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
The traffic has to be initiated from 10.0.0.0 only then there would be a entry in the xlate.once there is a entry in the xlate the entry works as bidirectional"
.
so which one of the above is true ? Thats the reason my question was what if 11.0.0.0 initates the traffic first .
03-19-2011 06:49 AM
Well, as per the above pasted outputs (again pasted below), the xlate was created as soon as static was configured.
# show run access-li
access-list test extended permit ip 10.0.0.0 255.255.255.0 11.0.0.0 255.255.255.0
# show run static
static (inside,outside) 10.1.1.0 access-list test
# show xlate
1 in use, 2 most used
Global 10.1.1.0 Local 10.0.0.0
It would be good to verify this on your ASA as well.
Paps
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide