07-07-2011 04:36 PM - edited 03-11-2019 01:56 PM
Hi all,
my question is very simple.
lets assume i am doind a policy NAT on the folowing scenarion.
acess-list policy_nat extended permit ip host 10.0.0.1 host 192.168.1.1
static (inside,outempresa) 170.66.53.1 access-list policy_nat
I understand that when host A 10.0.0.1 wants to connect to host B192.168.1.1 its going to be translated to 170.66.53.1
my question is:
when host 192.168.1.1 wants to connect to10.0.0.1 the same entry will change the destination when the packet hits the asa from 170.66.53.1 to 10.0.0.1, is that correct ?
Thanl you.
Solved! Go to Solution.
07-07-2011 07:16 PM
The static NAT statement is bi-directional.
When host 10.0.0.1 wants to access 192.168.1.1, host 10.0.0.1 will be translated to 170.66.53.1.
When host 192.168.1.1 wants to access 10.0.0.1, host 192.168.1.1 needs to access it with 170.66.53.1 ip address instead of 10.0.0.1. Once the packet arrives on the ASA, 170.66.53.1 will get translated back to 10.0.0.1 so the traffic from 192.168.1.1 will arrive at 10.0.0.1.
Hope that answers your question.
07-07-2011 07:39 PM
Yes it would be the same for return traffic as well, the internal users would send a request for 170.66.53.1 which wou;ld be untranslated to its private ip. The best way to check the flow of the packet is to use a packet-tracer:
packet-tracer input outempresa 10.0.0.1 2345 192.168.1.1 443 detailed
here's the command reference for it:
http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/p.html#wp1913020
if the 10.0.0.1 is on the outempresa and 192.168.1.1 lies on the inside, then this would give you how the packet and return traffic are processes by the firewall.
Hope this helps
Thanks,
Varun
07-07-2011 07:16 PM
The static NAT statement is bi-directional.
When host 10.0.0.1 wants to access 192.168.1.1, host 10.0.0.1 will be translated to 170.66.53.1.
When host 192.168.1.1 wants to access 10.0.0.1, host 192.168.1.1 needs to access it with 170.66.53.1 ip address instead of 10.0.0.1. Once the packet arrives on the ASA, 170.66.53.1 will get translated back to 10.0.0.1 so the traffic from 192.168.1.1 will arrive at 10.0.0.1.
Hope that answers your question.
07-07-2011 07:39 PM
Yes it would be the same for return traffic as well, the internal users would send a request for 170.66.53.1 which wou;ld be untranslated to its private ip. The best way to check the flow of the packet is to use a packet-tracer:
packet-tracer input outempresa 10.0.0.1 2345 192.168.1.1 443 detailed
here's the command reference for it:
http://www.cisco.com/en/US/customer/docs/security/asa/asa82/command/reference/p.html#wp1913020
if the 10.0.0.1 is on the outempresa and 192.168.1.1 lies on the inside, then this would give you how the packet and return traffic are processes by the firewall.
Hope this helps
Thanks,
Varun
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide