SlideShare une entreprise Scribd logo
1  sur  72
Created by Oleg Tipisov, Cisco TAC.
Version 1.1. Cisco Public
Understanding and
Troubleshooting ASA NAT
Cisco Support Community
Expert Series Webcasts in
Russian:
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 2
Cisco Support Community –
Expert Series Webcasts in Russian
Сегодня на семинаре эксперт Cisco TAC
Олег Типисов
CCIE in Routing and Switching
2
Expert’s photo
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 3
Спасибо, что посетили наш семинар
сегодня
Сегодняшняя презентация включает опросы аудитории
Пожалуйста, участвуйте!
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 4
Спасибо, что посетили наш семинар
сегодня
Если Вы хотите получить копию слайдов сегодняшнего
семинара, пожалуйста, используйте следующие ссылки:
https://supportforums.cisco.com/community/russian/security
или, https://supportforums.cisco.com/docs/DOC-27135
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 5
Опрос #1
Каков уровень ваших знаний о ASA
NAT?
1. Я представляю, что такое NAT, но не работал с
ним
2. Мне приходилось настраивать NAT на ASA с
помощью графического интерфейса ASDM
3. Я владею настройкой NAT из CLI и ASDM и
применяю эту технологию в своей сети
4. Я неоднократно настраивал различные варианты
NAT на ASA во многих версиях ПО
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6Cisco Support Community
Задавайте Ваши вопросы!
Используйте Q&A панель, чтобы послать вопрос. Наши
эксперты ответят на них
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7Cisco Support Community
Created by Oleg Tipisov, Cisco TAC.
Version 1.1. Cisco Public
Understanding and
Troubleshooting ASA NAT
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 8
Introduction
 This session is mostly about ASA 8.3+ NAT
 ASA 8.2 configuration example is given, but slides are
hidden to save time
 Two real-world troubleshooting scenarios are given
 Students are expected to understand ASA NAT CLI
 We will not discuss:
• 8.2 -> 8.3 Configuration migration
• NAT and Routing integration
• NAT RPF Check and associated issues
 Separate presentation is needed for each of the above
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 9
Agenda
 Introduction
 NAT Terminology
 ASA 8.2 Configuration Example
 ASA 8.3+ Configuration Example
 Troubleshooting Scenario #1
 Troubleshooting Scenario #2
 Final Recommendations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10Cisco Support Community
Introduction
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 11
ASA Features
 Stateful packet filter
 Security policy is based on “interface security levels”
 Application inspection
 NAT/PAT, NAT ALG
 Static & Dynamic IPv4 & IPv6 routing
 Integration with IPS, CSC and CX modules
 L2L & RA VPN (IPSec IKEv1, IPSec IKEv2, SSL)
 Redundancy features and failover
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 12
ASA Features
 Virtualization (multiple context mode)
 Transparent mode
 NetFlow v9 for security monitoring
 Botnet traffic filtering (Ironport integration)
 Identity firewall
 ASA Phone Proxy and other UC integration features
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 13
Latest Releases
 8.4 – 5505, 5510-5550, 5580, 5585-X
• 8.4(4) is the latest version
 8.5 – ASA SM
• 8.4(1) with few other features
 8.6 – 5500-X
• 8.4(2) with few other features
 8.7 – ASA 1000V
• ASA in a Nexus 1000V switch
 9.0 – To be released soon
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14Cisco Support Community
NAT Terminology
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 15
NAT Terminology
 Real Address vs. Mapped Address
 Connection vs. xlate
 Source Translation vs. Destination Translation (UN-NAT)
 Bidirectional NAT
 Dynamic NAT vs. Static NAT
 NAT vs. PAT
 Identity NAT
 NAT exemption or “NAT 0 ACL” (8.2- only)
 Policy NAT
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25Cisco Support Community
ASA 8.3+ Configuration Example
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 26
NAT in 8.3+
 Completely new implementation
 “NAT simplification”
 Object NAT (Auto NAT)
 Twice NAT (Manual NAT)
 Bidirectional NAT is very easy to configure
 Flexibility is higher, new features are being
implemented
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 27
Security Policy Example
ASACorporate Network
DMZ network
Internet
Internet allowed inbound
access to DMZ
Internet traffic blocked
inbound to corporate
network
inside outside
dmz
Corporate network allowed
to access DMZ network
and the Internet
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 28
Configuration Migration (8.2 –> 8.3)
INFO: MIGRATION - Saving the startup configuration to file
INFO: MIGRATION - Startup configuration saved to file
'flash:8_2_1_0_startup_cfg.sav'
*** Output from config line 4, "ASA Version 8.2(1) "
.
Cryptochecksum (unchanged): 66abf6f4 1b22b1c8 2f06d057 62b2e46a
NAT migration logs:
The following 'nat' command didn't have a matching 'global' rule on interface
'dmz' and was not migrated.
nat (inside) 1 10.1.1.0 255.255.255.0
INFO: NAT migration completed.
Real IP migration logs:
ACL <outside_in> has been migrated to real-ip version
INFO: MIGRATION - Saving the startup errors to file
'flash:upgrade_startup_errors_200503292016.log'
See this article about 8.2 -> 8.3+ software upgrade and configuration migration:
https://supportforums.cisco.com/docs/DOC-12690
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 29
ASA Interface Configuration
interface GigabitEthernet0/0.1
vlan 99
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.0
interface GigabitEthernet0/0.2
vlan 98
nameif dmz
security-level 50
ip address 172.16.1.1 255.255.255.0
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 194.1.1.1 255.255.255.0
route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 30
ASA Object NAT – 8.3+
object network obj-10.1.1.0
subnet 10.1.1.0 255.255.255.0
object network obj-172.16.1.2
host 172.16.1.2
object network obj-10.1.1.0
nat (inside,outside) dynamic interface
object network obj-172.16.1.2
nat (dmz,outside) static 194.1.1.254
access-list outside_in extended permit tcp any host 172.16.1.2 eq www
access-group outside_in in interface outside
“host 172.16.1.2 eq www”
real IP in this release!
10.1.1.0/24
172.16.1.0/24
194.1.1.254
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 31
ASA Twice NAT – 8.3+
object network obj-10.1.1.0
subnet 10.1.1.0 255.255.255.0
nat (inside,outside) source dynamic obj-10.1.1.0 interface
object network obj-172.16.1.2
host 172.16.1.2
object network obj-194.1.1.254
host 194.1.1.254
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
access-list outside_in extended permit tcp any host 172.16.1.2 eq www
access-group outside_in in interface outside
“host 172.16.1.2 eq www”
real IP in this release!
10.1.1.0/24
172.16.1.0/24
194.1.1.254
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 32
ASA Dynamic NAT – 8.3+
%ASA-6-305011: Built dynamic TCP translation from inside:10.1.1.2/57126 to
outside:194.1.1.1/57126
%ASA-6-302013: Built outbound TCP connection 3 for outside:207.1.1.2/80
(207.1.1.2/80) to inside:10.1.1.2/57126 (194.1.1.1/57126)
ASA# show conn long
TCP outside:207.1.1.2/80 (207.1.1.2/80) inside:10.1.1.2/57126
(194.1.1.1/57126), flags U, idle 12s, uptime 12s, timeout 1h0m, bytes 0
ASA# show xlate
2 in use, 3 most used
Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice
e - extended
TCP PAT from inside:10.1.1.2/57126 to outside:194.1.1.1/57126 flags ri idle
0:00:23 timeout 0:00:30
Newest software tries to preserve source port if possible
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 33
ASA Static NAT – 8.3+
%ASA-6-302013: Built inbound TCP connection 4 for outside:207.1.1.2/41506
(207.1.1.2/41506) to dmz:172.16.1.2/80 (194.1.1.254/80)
ASA# show conn long
TCP outside:207.1.1.2/41506 (207.1.1.2/41506) dmz:172.16.1.2/80
(194.1.1.254/80), flags UB, idle 41s, uptime 43s, timeout 1h0m, bytes 0
ASA# show xlate
1 in use, 3 most used
Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice
e - extended
NAT from dmz:172.16.1.2 to outside:194.1.1.254
flags s idle 0:00:47 timeout 0:00:00
ASA# show access-list
access-list outside_in line 1 extended permit tcp any host 172.16.1.2 eq www
(hitcnt=1) 0xdae674c0
number of connections,
not packets!
public IP
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 34
NAT Rules Order (8.3+)
1. Section 1: Twice NAT
• default place for twice NAT rules
• in order, until the first match
1. Section 2: Object NAT
• static NAT (longest match)
• dynamic NAT (longest match)
1. Section 3: Twice NAT
• “after-auto” needs to be specified in “nat” command
• in order, until the first match
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 35
Опрос #2
Сталкивались ли Вы с проблемами при
использовании NAT на ASA
1. Нет, никогда. Все отлично работает
2. Иногда бывало, но это были ошибки настройки
3. Проблемы встречались, но они легко решались
переходом на новую версию
4. Проблемы возникали и их могли решить только
инженеры Cisco TAC
5. Сплошные проблемы, не знаю, что делать
6. Я не использую NAT на ASA, потому что он не
работает
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36Cisco Support Community
Troubleshooting Scenario #1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 37
Security Policy Example
ASA Internet
Server 172.16.1.2 should be accessible from
both Internet and Remote Office by 194.1.1.254.
Other DMZ servers should be accessible via
VPN without NAT.
VPN is terminated on some other device, such
as perimeter router.
DMZ servers should be able to talk to Internet
DNS servers.
inside outside
dmz
IPSec tunnelIPSec tunnel
172.16.1.0/24
Remote Office
10.2.2.0/24
to
194.1.1.254
172.16.1.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 38
ASA Interface Configuration
interface GigabitEthernet0/0.1
vlan 99
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.0
interface GigabitEthernet0/0.2
vlan 98
nameif dmz
security-level 50
ip address 172.16.1.1 255.255.255.0
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 194.1.1.1 255.255.255.0
route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 39
ASA NAT Configuration – 8.3+
object network obj-172.16.1.0
subnet 172.16.1.0 255.255.255.0
object network obj-172.16.1.2
host 172.16.1.2
object network obj-194.1.1.254
host 194.1.1.254
object network RemoteOfficeNet
subnet 10.2.2.0 255.255.255.0
object network RemoteOfficeNet-2
subnet 10.2.2.0 255.255.255.0
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination
static RemoteOfficeNet RemoteOfficeNet-2
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 40
Customer Symptom
ASA# show conn long
TCP outside:207.1.1.2/80 (207.1.1.2/80) dmz:172.16.1.2/37116
(194.1.1.1/23384), flags U, idle 9s, uptime 9s, timeout 1h0m, bytes 0
TCP outside:207.1.1.2/16123 (207.1.1.2/16123) dmz:172.16.1.2/80
(194.1.1.254/80), flags UB, idle 12s, uptime 12s, timeout 1h0m, bytes 0
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
Everything works, but 172.16.1.2 gets wrong IP
when goes to the Internet…
At the same time inbound connections to 194.1.1.254
work as expected…
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 41
Troubleshooting – Step #1
ASA# show run object
object network obj-172.16.1.0
subnet 172.16.1.0 255.255.255.0
object network obj-172.16.1.2
host 172.16.1.2
object network obj-194.1.1.254
host 194.1.1.254
object network RemoteOfficeNet
subnet 10.2.2.0 255.255.255.0
object network RemoteOfficeNet-2
subnet 10.2.2.0 255.255.255.0
ASA# show run nat
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination
static RemoteOfficeNet RemoteOfficeNet-2
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 42
Troubleshooting – Step #2
%ASA-6-305011: Built dynamic TCP
translation from dmz:172.16.1.2/37116
to outside:194.1.1.1/23384
%ASA-6-302013: Built outbound TCP connection 54
for outside:207.1.1.2/80 (207.1.1.2/80)
to dmz:172.16.1.2/37116 (194.1.1.1/23384)
ASA# show conn long
TCP outside:207.1.1.2/80 (207.1.1.2/80) dmz:172.16.1.2/37116
(194.1.1.1/23384), flags U, idle 9s, uptime 9s, timeout 1h0m, bytes 0
ASA# show xlate local 172.16.1.2 global 194.1.1.1
4 in use, 4 most used
Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice
TCP PAT from dmz:172.16.1.2/37116 to outside:194.1.1.1/23384 flags ri idle
0:02:03 timeout 0:00:30
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 43
Troubleshooting – Step #3
ASA# debug nat 255
nat: policy lock 0x73a1cb40, old count is 1
nat: translation - dmz:172.16.1.2/37116
to outside:194.1.1.1/23384
ASA# show nat detail
Manual NAT Policies (Section 1)
1 (dmz) to (outside) source static obj-172.16.1.2 obj-194.1.1.254
translate_hits = 0, untranslate_hits = 0
Source - Origin: 172.16.1.2/32, Translated: 194.1.1.254/32
2 (dmz) to (outside) source static obj-172.16.1.0 obj-172.16.1.0 destination
static RemoteOfficeNet RemoteOfficeNet-2
translate_hits = 0, untranslate_hits = 0
Source - Origin: 172.16.1.0/24, Translated: 172.16.1.0/24
Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24
3 (dmz) to (outside) source dynamic obj-172.16.1.0 interface
translate_hits = 1, untranslate_hits = 0
Source - Origin: 172.16.1.0/24, Translated: 194.1.1.1/24
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
Hmm… This is strange. It seems that dynamic PAT
(rule #3) takes precedence over static NAT (rule #1)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 44
Troubleshooting – Step #4
ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80
Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 outside
Phase: 2
Type: IP-OPTIONS
Subtype:
Result: ALLOW
Config:
Additional Information:
Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
Additional Information:
Dynamic translate 172.16.1.2/1234 to 194.1.1.1/40625
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
This again confirms that traffic is processed by
dynamic PAT rule, instead of static NAT rule…
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 45
Troubleshooting – Step #5
ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80 detail
Phase: 1
…
Phase: 2
…
Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
Additional Information:
Dynamic translate 172.16.1.2/1234 to 194.1.1.1/12386
Forward Flow based lookup yields rule:
in id=0x73a1de50, priority=6, domain=nat, deny=false
hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
The following command can be used to look at this NAT rule in Accelerated Security Path
(ASP) table:
show asp table classify domain nat
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 46
Troubleshooting – Step #6
ASA# show asp table classify domain nat
Input Table
in id=0x73984078, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1ca98, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0, port=0
dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=dmz
in id=0x73a1de50, priority=6, domain=nat, deny=false
hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x739f84d8, priority=6, domain=nat, deny=false
hits=0, user_data=0x73980550, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x73969338, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1c608, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24ASP tables are used to classify traffic
in data-path and apply different
security policies to it
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 47
Troubleshooting – Step #6
ASA# show asp table classify domain nat
Input Table
in id=0x73984078, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1ca98, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0, port=0
dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=dmz
in id=0x73a1de50, priority=6, domain=nat, deny=false
hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x739f84d8, priority=6, domain=nat, deny=false
hits=0, user_data=0x73980550, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x73969338, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1c608, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-
2
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
3
2
1
2
Incorrect order !
Incorrect order !
1
2
3
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 48
Troubleshooting – Root Cause
no nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
nat (dmz,outside) 1 source static obj-172.16.1.2 obj-194.1.1.254
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
It was found that the problem was caused by
editing of NAT lines as shown below
New bug was opened:
CSCtt11890 ASA: Manual NAT rules inserted
above others may fail to match traffic
which was fixed in 8.4(4)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 49
Troubleshooting – Solution
ASA(config)# clear conf nat
ASA(config)# nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
ASA(config)# nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination
static RemoteOfficeNet RemoteOfficeNet-2
ASA(config)# nat (dmz,outside) source dynamic obj-172.16.1.0 interface
ASA(config)# exit
ASA#
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
Clearing and re-entering configuration resolves
the problem (see next slide)…
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 50
Troubleshooting – Solution Verification
ASA# show asp table classify domain nat
Input Table
in id=0x739f84d8, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1e480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x73982f98, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1e8f8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0, port=0
dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=dmz
in id=0x73a1fbd8, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1e9a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
in id=0x739696a0, priority=6, domain=nat, deny=false
hits=0, user_data=0x73a1e528, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.0, mask=255.255.255.0, port=0
dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-
2
nat (dmz,outside) source dynamic obj-172.16.1.0 interface
3
2
1
2
Order is now correct!
1
2
3
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 51
Troubleshooting – Solution Verification
ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80 detail
Phase: 1
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in 0.0.0.0 0.0.0.0 outside
…
Phase: 3
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254
Additional Information:
Static translate 172.16.1.2/1234 to 194.1.1.254/1234
Forward Flow based lookup yields rule:
in id=0x739f84d8, priority=6, domain=nat, deny=false
hits=2, user_data=0x73a1e480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=172.16.1.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=dmz, output_ifc=outside
172.16.1.0/2
4
to 194.1.1.254
172.16.1.2
10.2.2.0/24
Now the correct rule is hit and static NAT works as
expected for traffic DMZ:172.16.1.2 -> Internet
1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 57Cisco Support Community
Troubleshooting Scenario #2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 58
Security Policy Example
Remote office server 10.2.2.2 needs to talk to inside server 10.1.1.2, but 10.1.1.2 has default route via
some internal router 10.1.1.x and cannot have routes through the ASA due to security reasons.
So, the decision was made to NAT all incoming requests, coming from 10.2.2.2, to 10.1.1.254.
Other hosts in 10.1.1.0/24 and 10.2.2.0/24 should be able to communicate without NAT.
ASA
Internet
inside outside
dmz
IPSec tunnelIPSec tunnel
Remote Office
10.2.2.0/24
Destination IP is
NATed to 10.1.1.254Corporate Network
10.1.1.0/24
.2
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 59
ASA Interface Configuration
interface GigabitEthernet0/0.1
vlan 99
nameif inside
security-level 100
ip address 10.1.1.1 255.255.255.0
interface GigabitEthernet0/0.2
vlan 98
nameif dmz
security-level 50
ip address 172.16.1.1 255.255.255.0
interface GigabitEthernet0/1
nameif outside
security-level 0
ip address 194.1.1.1 255.255.255.0
route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 60
ASA NAT Configuration – 8.3+
object network obj-10.1.1.0
subnet 10.1.1.0 255.255.255.0
object network obj-10.1.1.254
host 10.1.1.254
object network RemoteOfficeNet
subnet 10.2.2.0 255.255.255.0
object network RemoteServer
host 10.2.2.2
nat (outside,inside) source static RemoteServer obj-10.1.1.254
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination
static RemoteOfficeNet RemoteOfficeNet
nat (inside,outside) source dynamic any interface
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 61
Customer Symptom
ASA# show conn long
TCP outside:10.2.2.2/31444 (10.2.2.2/31444) inside:10.1.1.2/80 (10.1.1.2/80),
flags SaAB, idle 6s, uptime 12s, timeout 30s, bytes 0
Remote office server 10.2.2.2 cannot
access inside server 10.1.1.2.
Connection is created, but 10.2.2.2 is
not NATed to 10.1.1.254
%ASA-6-302013: Built inbound TCP connection 198 for outside:10.2.2.2/31444
(10.2.2.2/31444) to inside:10.1.1.2/80 (10.1.1.2/80)
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 62
Troubleshooting – Step #1
ASA# debug nat 255
nat: untranslation - outside:10.1.1.2/80 to inside:10.1.1.2/80
ASA# show nat detail
Manual NAT Policies (Section 1)
1 (outside) to (inside) source static RemoteServer obj-10.1.1.254
translate_hits = 0, untranslate_hits = 0
Source - Origin: 10.2.2.2/32, Translated: 10.1.1.254/32
2 (inside) to (outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
translate_hits = 0, untranslate_hits = 1
Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24
Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24
3 (inside) to (outside) source dynamic any interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 194.1.1.1/24
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
It seems that first NAT rule is not hit
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 63
Troubleshooting – Step #2
ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detail
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
Additional Information:
NAT divert to egress interface inside
Untranslate 10.1.1.2/80 to 10.1.1.2/80
…
Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside,inside) source static RemoteServer obj-10.1.1.254
…
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
UN-NAT chose another rule at step #1,
so static NAT rule was ignored and
NAT at step #4 wasn't performed
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 64
Troubleshooting – Step #3
ASA# show nat divert-table
Divert Table
id=0x73a92fc0, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0
input_ifc=inside, output_ifc=outside
id=0x73a944a0, domain=divert-route
type=static, hits=3, flags=0x1, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0
dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0
input_ifc=outside, output_ifc=inside
ASA# show run nat
nat (outside,inside) source static RemoteServer obj-10.1.1.254
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
nat (inside,outside) source dynamic any interface
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
There is only one rule for outside interface in “NAT divert table”.
This rule was created from NAT rule #2 and blocked execution of NAT rule #1…
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 65
Troubleshooting – Workaround
object network obj-10.1.1.0
subnet 10.1.1.0 255.255.255.0
object network obj-10.1.1.254
host 10.1.1.254
object network RemoteOfficeNet
subnet 10.2.2.0 255.255.255.0
object network RemoteServer
host 10.2.2.2
object network LocalServer
host 10.1.1.2
object network LocalServer-2
host 10.1.1.2
nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static
LocalServer LocalServer-2
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
nat (inside,outside) source dynamic any interface
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
The root cause of the problem is that “NAT divert table”
is not populated with an entry for 1st NAT rule.
So, we can try to reconfigure 1st NAT rule and correct
entry will be installed into the “NAT divert table”.
Note that it is necessary to use two different object names here: LocalServer and
LocalServer-2, otherwise “NAT divert” rule will not be installed
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 66
Troubleshooting – Verification
ASA# show nat divert-table
Divert Table
id=0x739f6ea8, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=10.1.1.2, mask=255.255.255.255 port=0-0
dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0
input_ifc=inside, output_ifc=outside
id=0x73a92fc0, domain=divert-route
type=static, hits=1, flags=0x1, protocol=0
src ip/id=10.2.2.2, mask=255.255.255.255 port=0-0
dst ip/id=10.1.1.2, mask=255.255.255.255 port=0-0
input_ifc=outside, output_ifc=inside
id=0x72f21768, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0
dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0
input_ifc=outside, output_ifc=inside
ASA# show run nat
nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static
LocalServer LocalServer-2
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
nat (inside,outside) source dynamic any interface
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 67
Troubleshooting – Verification
ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detail
Phase: 1
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static
LocalServer LocalServer-2
Additional Information:
NAT divert to egress interface inside
Untranslate 10.1.1.2/80 to 10.1.1.2/80
…
Phase: 4
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static
LocalServer LocalServer-2
Additional Information:
Static translate 10.2.2.2/1234 to 10.1.1.254/1234
Forward Flow based lookup yields rule:
in id=0x6dec91a0, priority=6, domain=nat, deny=false
hits=1, user_data=0x739f6ea8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0
src ip/id=10.2.2.2, mask=255.255.255.255, port=0
dst ip/id=10.1.1.2, mask=255.255.255.255, port=0, dscp=0x0
input_ifc=outside, output_ifc=inside
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
Correct rule is hit at both UN-NAT and
NAT steps
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 68
Troubleshooting – Verification
ASA# show nat detail
Manual NAT Policies (Section 1)
1 (outside) to (inside) source static RemoteServer obj-10.1.1.254 destination static
LocalServer LocalServer-2
translate_hits = 1, untranslate_hits = 1
Source - Origin: 10.2.2.2/32, Translated: 10.1.1.254/32
Destination - Origin: 10.1.1.2/32, Translated: 10.1.1.2/32
2 (inside) to (outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
translate_hits = 0, untranslate_hits = 0
Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24
Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24
3 (inside) to (outside) source dynamic any interface
translate_hits = 0, untranslate_hits = 0
Source - Origin: 0.0.0.0/0, Translated: 194.1.1.1/24
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
Correct rule is hit at both UN-NAT and
NAT steps
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 69
Troubleshooting – Permanent Fix
ASA# show run nat
nat (outside,inside) source static RemoteServer obj-10.1.1.254
nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static
RemoteOfficeNet RemoteOfficeNet
nat (inside,outside) source dynamic any interface
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
Permanent fix is available in 8.4(4.2)
CSCtq47028 ASA: Manual NAT rules
are not processed in order
The CSCtq47028 fix made above workaround unnecessary. NAT rules are installed
automatically into both “NAT divert” and NAT tables. This is a huge change in NAT
implementation!
1
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 70
Troubleshooting – Permanent Fix
ASA# show asp table classify domain nat
Input Table
in id=0x6decad08, priority=6, domain=nat, deny=false
hits=0, user_data=0x6deca528, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.2.2.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=inside
in id=0x6decaf80, priority=6, domain=nat, deny=false
hits=0, user_data=0x6deca5d0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=10.1.1.254, mask=255.255.255.255, port=0, dscp=0x0
input_ifc=inside, output_ifc=outside
in id=0x739c64f8, priority=6, domain=nat, deny=false
hits=0, user_data=0x739c0378, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.1.1.0, mask=255.255.255.0, port=0
dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=inside, output_ifc=outside
in id=0x739c6770, priority=6, domain=nat, deny=false
hits=0, user_data=0x6decd9f8, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0, port=0
dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=inside
in id=0x6decc5f0, priority=6, domain=nat, deny=false
hits=0, user_data=0x7307e530, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=inside, output_ifc=outside
in id=0x6decc9d8, priority=6, domain=nat, deny=false
hits=0, user_data=0x7307e3e0, cs_id=0x0, flags=0x0, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0, port=0
dst ip/id=194.1.1.1, mask=255.255.255.255, port=0, dscp=0x0
input_ifc=outside, output_ifc=inside
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
1
Rule (1) in ASP NAT table
is used to classify traffic,
coming from 10.2.2.2, and
translate source IP from
10.2.2.2 to 10.1.1.254
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 71
Troubleshooting – Permanent Fix
ASA# show nat divert-table
Divert Table
id=0x6deca528, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0
input_ifc=inside, output_ifc=outside
id=0x6deca5d0, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=10.2.2.2, mask=255.255.255.255 port=0-0
dst ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
input_ifc=outside, output_ifc=inside
id=0x739c0378, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0
dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0
input_ifc=outside, output_ifc=inside
id=0x6decd9f8, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=10.1.1.0, mask=255.255.255.0 port=0-0
dst ip/id=10.2.2.0, mask=255.255.255.0 port=0-0
input_ifc=inside, output_ifc=outside
id=0x7307e530, domain=divert-route
type=dynamic, hits=0, flags=0x1, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
dst ip/id=194.1.1.1, mask=255.255.255.255 port=0-0
input_ifc=outside, output_ifc=inside
id=0x7307e3e0, domain=divert-route
type=static, hits=0, flags=0x1, protocol=0
src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
dst ip/id=0.0.0.0, mask=0.0.0.0 port=0-0
input_ifc=inside, output_ifc=outside
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
1
Rule (1) in ASP “NAT
divert” table is used to
classify traffic, coming
from 10.2.2.2, and
translate destination IP
from a.b.c.d (i.e. any IP)
to itself
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 72
Troubleshooting – Permanent Fix
ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detailed
…
Phase: 2
Type: UN-NAT
Subtype: static
Result: ALLOW
Config:
nat (outside,inside) source static RemoteServer obj-10.1.1.254
Additional Information:
NAT divert to egress interface inside
Untranslate 10.1.1.2/80 to 10.1.1.2/80
…
Phase: 5
Type: NAT
Subtype:
Result: ALLOW
Config:
nat (outside,inside) source static RemoteServer obj-10.1.1.254
Additional Information:
Static translate 10.2.2.2/1234 to 10.1.1.254/1234
Forward Flow based lookup yields rule:
in id=0x6decad08, priority=6, domain=nat, deny=false
hits=1, user_data=0x6deca528, cs_id=0x0, flags=0x0, protocol=0
src ip/id=10.2.2.2, mask=255.255.255.255, port=0
dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0
input_ifc=outside, output_ifc=inside
10.1.1.0/24
.2
10.2.2.0/24
IPSec
Internet
.2
Correct rule is hit at both UN-NAT and
NAT steps
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 73
CSCtq47028 Fix – More Info
 In many customer cases problems were seen when
asymmetric or overlapping NAT rules were configured
 Definition of “asymmetric”
• If an outbound packet matches a specific NAT rule and the return packet
matches a different NAT rule in the table, then they are called asymmetric
NAT rules. Most common with usage of 'dynamic' or 'unidirectional' NAT.
 Definition of “overlapping”
• If two or more NAT rules matches both source and destination (ports
included) in the table, then they are called overlapping rules. This also
involves usage of 'any' keyword as source or destination network.
 In this case Twice NAT rules may not be processed in
order
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 74
CSCtq47028 Fix – More Info
 This behavior is fixed by CSCtq47028 in 8.4(4.2)
 For a Twice NAT rule, if the destination is not explicitly
specified, ASA implicitly adds “destination static any
any”
 This populates “NAT divert” table with required rules
and NAT rules order is strictly enforced
This change may affect existing configurations!
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 81Cisco Support Community
Final Recommendations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 82
Final Recommendations
 KISS: Keep It Simple, Stupid
 Use Object NAT whenever possible, use Twice NAT
when Policy NAT is really needed
 Design your network carefully, don’t use NAT to
workaround routing problems
 Don’t use NAT for policy control, use ACLs instead
 Remember that ASA is not a IOS router; learn how
NAT and routing interoperate on this platform
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 83
Final Recommendations
 Always issue “no nat-control” prior to upgrading to 8.3+
 Don’t upgrade to 8.3 on a Friday night just as you are
getting ready to go out of town for the weekend
 Test upgrade in a lab first (if you have one)
 Read documentation and Cisco Support Community
documents with ‘ASA’ and ‘nat’ tags
 Call in to the TAC in case of a trouble
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 84
FIN, ACK [ Thank you ! ]
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 85
Опрос #3
Какие темы семинаров по безопасности
Вам интересны?
1. Построение Remote Access VPN с помощью ASA
2. Построение Site-to-Site VPN на маршрутизаторах
3. DMVPN и GETVPN на маршрутизаторах Cisco
4. Использование платформы ASR1k для VPN
5. Любые вопросы использования Cisco ASA в
качестве межсетевого экрана
6. IOS Zone-based Firewall
7. Система обнаружения атак IPS 4200
8. Продукты IronPort
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 86Cisco Support Community
Q & A
Эксперт ответит на некоторые Ваши вопросы. Используйте
Q&A панель, чтобы задать еще вопросы
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 87
Вторник, 9 октября
10:00 по московскому времени
Эксперт Cisco:
Amit Singh
Расскажет об архитектуре лицензирования Cisco
Unified Call Manager (CUCM) версии 9.0х.
Регистрация:
http://tools.cisco.com/gems/cust/customerSite.do?METHOD=
Тема: Licensing Architecture: Cisco Unified Call
Manager Version 9.x
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 88
Вторник, 30 октября
18:00 по московскому времени
Эксперт Cisco:
Jazib Frahim
Расскажет о том как решать проблемы с SSL VPN на
Cisco Adaptive Security Appliance (ASA)
Регистрация
https://supportforums.cisco.com/community/netpro/expert-corner
Тема: Troubleshooting SSL VPN on ASA
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 89
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 90
Приглашаем Вас активно участвовать в Cisco
Support Community и социальных сетях
https://supportforms.cisco.com/community/russian
http://www.facebook.com/CiscoRu
http://twitter.com/CiscoRussia
http://www.youtube.com/user/CiscoRussiaMedia
http://itunes.apple.com/us/app/cisco-technical-support/id398104252?mt=8
http://www.linkedin.com/groups/CSC-Cisco-Support-Community-3210019
Newsletter Subscription: https://tools.cisco.com/gdrp/coiga/showsurvey.do?
surveyCode=589&keyCode=146298_2&PHYSICAL%20FULFILLMENT
%20Y/N=NO&SUBSCRIPTION%20CENTER=YES
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 91Cisco Support Community
Спасибо за
Ваше время
Пожалуйста, участвуйте в опросе
Understanding and Troubleshooting ASA NAT

Contenu connexe

Tendances

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to siteIT Tech
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 finalKwonSun Bae
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9Nil Menon
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6Nil Menon
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Bruno Teixeira
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routingWilfredzeng
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingMuhd Mu'izuddin
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNCisco Canada
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 MinutesCCNAResources
 
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLICCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLIHoàng Hải Nguyễn
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4Vuz Dở Hơi
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamRaja Mazhar
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4Nil Menon
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)ISMT College
 

Tendances (20)

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Vxlan deep dive session rev0.5 final
Vxlan deep dive session rev0.5   finalVxlan deep dive session rev0.5   final
Vxlan deep dive session rev0.5 final
 
CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9CCNA 1 Routing and Switching v5.0 Chapter 9
CCNA 1 Routing and Switching v5.0 Chapter 9
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
Introduction to vxlan
Introduction to vxlanIntroduction to vxlan
Introduction to vxlan
 
CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6CCNA 2 Routing and Switching v5.0 Chapter 6
CCNA 2 Routing and Switching v5.0 Chapter 6
 
IPv6
IPv6IPv6
IPv6
 
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
Cisco Live! :: Cisco ASR 9000 Architecture :: BRKARC-2003 | Las Vegas 2017
 
Vxlan control plane and routing
Vxlan control plane and routingVxlan control plane and routing
Vxlan control plane and routing
 
Lab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routingLab 6.4.1 InterVLAN routing
Lab 6.4.1 InterVLAN routing
 
Building DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPNBuilding DataCenter networks with VXLAN BGP-EVPN
Building DataCenter networks with VXLAN BGP-EVPN
 
Implementing cisco mpls
Implementing cisco mplsImplementing cisco mpls
Implementing cisco mpls
 
Ccna Commands In 10 Minutes
Ccna Commands In 10 MinutesCcna Commands In 10 Minutes
Ccna Commands In 10 Minutes
 
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLICCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
CCNA Security Lab 9 - Enabling SSH and HTTPS access to Cisco IOS Routers - CLI
 
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
CCNAv5 - S4: Chapter 5: Network Address Translation for ipv4
 
Ccna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_teamCcna new lab_manual_by_esp_team
Ccna new lab_manual_by_esp_team
 
CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4CCNA 2 Routing and Switching v5.0 Chapter 4
CCNA 2 Routing and Switching v5.0 Chapter 4
 
Router commands
Router commandsRouter commands
Router commands
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 

En vedette

Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Cisco Security
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context TrainingTariq Bader
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookRHC Technologies
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosCisco Canada
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewallAnwesh Dixit
 
Инфографика. Программы-вымогатели: реальное положение вещей
Инфографика. Программы-вымогатели: реальное положение вещейИнфографика. Программы-вымогатели: реальное положение вещей
Инфографика. Программы-вымогатели: реальное положение вещейCisco Russia
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Sumutiu Marius
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windowsdkaya
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasuresdkaya
 

En vedette (20)

Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)Troubleshooting Firewalls (2012 San Diego)
Troubleshooting Firewalls (2012 San Diego)
 
NAT in ASA Firewall
NAT in ASA FirewallNAT in ASA Firewall
NAT in ASA Firewall
 
ASA Multiple Context Training
ASA Multiple Context TrainingASA Multiple Context Training
ASA Multiple Context Training
 
Cisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBookCisco ASA Firewall Lab WorkBook
Cisco ASA Firewall Lab WorkBook
 
CCNP Security-Firewall
CCNP Security-FirewallCCNP Security-Firewall
CCNP Security-Firewall
 
IPSec VPN
IPSec VPNIPSec VPN
IPSec VPN
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
CCNP Security-IPS
CCNP Security-IPSCCNP Security-IPS
CCNP Security-IPS
 
Cisco asa cx firwewall
Cisco asa cx firwewallCisco asa cx firwewall
Cisco asa cx firwewall
 
Инфографика. Программы-вымогатели: реальное положение вещей
Инфографика. Программы-вымогатели: реальное положение вещейИнфографика. Программы-вымогатели: реальное положение вещей
Инфографика. Программы-вымогатели: реальное положение вещей
 
Par2 2 0901(1)
Par2 2 0901(1)Par2 2 0901(1)
Par2 2 0901(1)
 
Nat
NatNat
Nat
 
Cisco ASA Firewalls
Cisco ASA FirewallsCisco ASA Firewalls
Cisco ASA Firewalls
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
IPSec_VPN_Final_
IPSec_VPN_Final_IPSec_VPN_Final_
IPSec_VPN_Final_
 
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
Hacking Layer 2 - Enthernet Switcher Hacking Countermeasures.
 
Intrusion Discovery on Windows
Intrusion Discovery on WindowsIntrusion Discovery on Windows
Intrusion Discovery on Windows
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
Hacking Cisco Networks and Countermeasures
Hacking Cisco Networks and CountermeasuresHacking Cisco Networks and Countermeasures
Hacking Cisco Networks and Countermeasures
 

Similaire à Understanding and Troubleshooting ASA NAT

Cisco: Care and Feeding of Smart Licensing
Cisco: Care and Feeding of Smart LicensingCisco: Care and Feeding of Smart Licensing
Cisco: Care and Feeding of Smart Licensingdaxtindavon
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesRobb Boyd
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 knasiapsi
 
Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep divexKinAnx
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANLdgoodell
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002ccherel
 
Cisco ipics dispatch console user
Cisco ipics dispatch console userCisco ipics dispatch console user
Cisco ipics dispatch console userambichan
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSCisco Russia
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...wosborne03
 
Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013Puppet
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switchingparthasn83
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasBruno Teixeira
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecRobb Boyd
 
Next Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyNext Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyCisco Canada
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhereCisco Canada
 
IoT関連技術の動向@IETF87
IoT関連技術の動向@IETF87IoT関連技術の動向@IETF87
IoT関連技術の動向@IETF87Shoichi Sakane
 

Similaire à Understanding and Troubleshooting ASA NAT (20)

Cisco: Care and Feeding of Smart Licensing
Cisco: Care and Feeding of Smart LicensingCisco: Care and Feeding of Smart Licensing
Cisco: Care and Feeding of Smart Licensing
 
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series SwitchesTechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
TechWiseTV Workshop: Application Hosting on Catalyst 9000 Series Switches
 
Brkarc 2035-cat-9 k
Brkarc 2035-cat-9 kBrkarc 2035-cat-9 k
Brkarc 2035-cat-9 k
 
Presentation cisco data center security deep dive
Presentation   cisco data center security deep divePresentation   cisco data center security deep dive
Presentation cisco data center security deep dive
 
2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL2014/09/02 Cisco UCS HPC @ ANL
2014/09/02 Cisco UCS HPC @ ANL
 
Brkaci 1002
Brkaci 1002Brkaci 1002
Brkaci 1002
 
CCNA Icnd110 s04l04
CCNA Icnd110 s04l04CCNA Icnd110 s04l04
CCNA Icnd110 s04l04
 
L2 Attacks.pdf
L2 Attacks.pdfL2 Attacks.pdf
L2 Attacks.pdf
 
Cisco ipics dispatch console user
Cisco ipics dispatch console userCisco ipics dispatch console user
Cisco ipics dispatch console user
 
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCSПоиск и устранение неисправностей в вычислительной системе Cisco UCS
Поиск и устранение неисправностей в вычислительной системе Cisco UCS
 
Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...Chapter 9 lab a security policy development and implementation (instructor ve...
Chapter 9 lab a security policy development and implementation (instructor ve...
 
Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013Puppet for Production in WebEx - PuppetConf 2013
Puppet for Production in WebEx - PuppetConf 2013
 
Brk 135 t-ccna_switching
Brk 135 t-ccna_switchingBrk 135 t-ccna_switching
Brk 135 t-ccna_switching
 
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las VegasIntroduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
Introduction to SDN and Network Programmability - BRKRST-1014 | 2017/Las Vegas
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Next Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You ReadyNext Generation Campus Switching: Are You Ready
Next Generation Campus Switching: Are You Ready
 
Cisco Connect Toronto 2018 dc-aci-anywhere
Cisco Connect Toronto 2018   dc-aci-anywhereCisco Connect Toronto 2018   dc-aci-anywhere
Cisco Connect Toronto 2018 dc-aci-anywhere
 
Cisco DCACI
Cisco DCACICisco DCACI
Cisco DCACI
 
IoT関連技術の動向@IETF87
IoT関連技術の動向@IETF87IoT関連技術の動向@IETF87
IoT関連技術の動向@IETF87
 
BRKARC-3146_PoE_C3k.pdf
BRKARC-3146_PoE_C3k.pdfBRKARC-3146_PoE_C3k.pdf
BRKARC-3146_PoE_C3k.pdf
 

Plus de Cisco Russia

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18Cisco Russia
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?Cisco Russia
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииCisco Russia
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Russia
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Cisco Russia
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годCisco Russia
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoCisco Russia
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco Russia
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Cisco Russia
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Cisco Russia
 

Plus de Cisco Russia (20)

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информации
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series
 
Cisco Catalyst 9500
Cisco Catalyst 9500Cisco Catalyst 9500
Cisco Catalyst 9500
 
Cisco Catalyst 9400
Cisco Catalyst 9400Cisco Catalyst 9400
Cisco Catalyst 9400
 
Cisco Umbrella
Cisco UmbrellaCisco Umbrella
Cisco Umbrella
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Cisco FirePower
Cisco FirePowerCisco FirePower
Cisco FirePower
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined Access
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 год
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 

Understanding and Troubleshooting ASA NAT

  • 1. Created by Oleg Tipisov, Cisco TAC. Version 1.1. Cisco Public Understanding and Troubleshooting ASA NAT Cisco Support Community Expert Series Webcasts in Russian:
  • 2. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 2 Cisco Support Community – Expert Series Webcasts in Russian Сегодня на семинаре эксперт Cisco TAC Олег Типисов CCIE in Routing and Switching 2 Expert’s photo
  • 3. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 3 Спасибо, что посетили наш семинар сегодня Сегодняшняя презентация включает опросы аудитории Пожалуйста, участвуйте!
  • 4. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 4 Спасибо, что посетили наш семинар сегодня Если Вы хотите получить копию слайдов сегодняшнего семинара, пожалуйста, используйте следующие ссылки: https://supportforums.cisco.com/community/russian/security или, https://supportforums.cisco.com/docs/DOC-27135
  • 5. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 5 Опрос #1 Каков уровень ваших знаний о ASA NAT? 1. Я представляю, что такое NAT, но не работал с ним 2. Мне приходилось настраивать NAT на ASA с помощью графического интерфейса ASDM 3. Я владею настройкой NAT из CLI и ASDM и применяю эту технологию в своей сети 4. Я неоднократно настраивал различные варианты NAT на ASA во многих версиях ПО
  • 6. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 6Cisco Support Community Задавайте Ваши вопросы! Используйте Q&A панель, чтобы послать вопрос. Наши эксперты ответят на них
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 7Cisco Support Community Created by Oleg Tipisov, Cisco TAC. Version 1.1. Cisco Public Understanding and Troubleshooting ASA NAT
  • 8. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 8 Introduction  This session is mostly about ASA 8.3+ NAT  ASA 8.2 configuration example is given, but slides are hidden to save time  Two real-world troubleshooting scenarios are given  Students are expected to understand ASA NAT CLI  We will not discuss: • 8.2 -> 8.3 Configuration migration • NAT and Routing integration • NAT RPF Check and associated issues  Separate presentation is needed for each of the above
  • 9. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 9 Agenda  Introduction  NAT Terminology  ASA 8.2 Configuration Example  ASA 8.3+ Configuration Example  Troubleshooting Scenario #1  Troubleshooting Scenario #2  Final Recommendations
  • 10. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 10Cisco Support Community Introduction
  • 11. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 11 ASA Features  Stateful packet filter  Security policy is based on “interface security levels”  Application inspection  NAT/PAT, NAT ALG  Static & Dynamic IPv4 & IPv6 routing  Integration with IPS, CSC and CX modules  L2L & RA VPN (IPSec IKEv1, IPSec IKEv2, SSL)  Redundancy features and failover
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 12 ASA Features  Virtualization (multiple context mode)  Transparent mode  NetFlow v9 for security monitoring  Botnet traffic filtering (Ironport integration)  Identity firewall  ASA Phone Proxy and other UC integration features
  • 13. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 13 Latest Releases  8.4 – 5505, 5510-5550, 5580, 5585-X • 8.4(4) is the latest version  8.5 – ASA SM • 8.4(1) with few other features  8.6 – 5500-X • 8.4(2) with few other features  8.7 – ASA 1000V • ASA in a Nexus 1000V switch  9.0 – To be released soon
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 14Cisco Support Community NAT Terminology
  • 15. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 15 NAT Terminology  Real Address vs. Mapped Address  Connection vs. xlate  Source Translation vs. Destination Translation (UN-NAT)  Bidirectional NAT  Dynamic NAT vs. Static NAT  NAT vs. PAT  Identity NAT  NAT exemption or “NAT 0 ACL” (8.2- only)  Policy NAT
  • 16. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 25Cisco Support Community ASA 8.3+ Configuration Example
  • 17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 26 NAT in 8.3+  Completely new implementation  “NAT simplification”  Object NAT (Auto NAT)  Twice NAT (Manual NAT)  Bidirectional NAT is very easy to configure  Flexibility is higher, new features are being implemented
  • 18. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 27 Security Policy Example ASACorporate Network DMZ network Internet Internet allowed inbound access to DMZ Internet traffic blocked inbound to corporate network inside outside dmz Corporate network allowed to access DMZ network and the Internet
  • 19. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 28 Configuration Migration (8.2 –> 8.3) INFO: MIGRATION - Saving the startup configuration to file INFO: MIGRATION - Startup configuration saved to file 'flash:8_2_1_0_startup_cfg.sav' *** Output from config line 4, "ASA Version 8.2(1) " . Cryptochecksum (unchanged): 66abf6f4 1b22b1c8 2f06d057 62b2e46a NAT migration logs: The following 'nat' command didn't have a matching 'global' rule on interface 'dmz' and was not migrated. nat (inside) 1 10.1.1.0 255.255.255.0 INFO: NAT migration completed. Real IP migration logs: ACL <outside_in> has been migrated to real-ip version INFO: MIGRATION - Saving the startup errors to file 'flash:upgrade_startup_errors_200503292016.log' See this article about 8.2 -> 8.3+ software upgrade and configuration migration: https://supportforums.cisco.com/docs/DOC-12690
  • 20. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 29 ASA Interface Configuration interface GigabitEthernet0/0.1 vlan 99 nameif inside security-level 100 ip address 10.1.1.1 255.255.255.0 interface GigabitEthernet0/0.2 vlan 98 nameif dmz security-level 50 ip address 172.16.1.1 255.255.255.0 interface GigabitEthernet0/1 nameif outside security-level 0 ip address 194.1.1.1 255.255.255.0 route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
  • 21. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 30 ASA Object NAT – 8.3+ object network obj-10.1.1.0 subnet 10.1.1.0 255.255.255.0 object network obj-172.16.1.2 host 172.16.1.2 object network obj-10.1.1.0 nat (inside,outside) dynamic interface object network obj-172.16.1.2 nat (dmz,outside) static 194.1.1.254 access-list outside_in extended permit tcp any host 172.16.1.2 eq www access-group outside_in in interface outside “host 172.16.1.2 eq www” real IP in this release! 10.1.1.0/24 172.16.1.0/24 194.1.1.254 .2
  • 22. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 31 ASA Twice NAT – 8.3+ object network obj-10.1.1.0 subnet 10.1.1.0 255.255.255.0 nat (inside,outside) source dynamic obj-10.1.1.0 interface object network obj-172.16.1.2 host 172.16.1.2 object network obj-194.1.1.254 host 194.1.1.254 nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 access-list outside_in extended permit tcp any host 172.16.1.2 eq www access-group outside_in in interface outside “host 172.16.1.2 eq www” real IP in this release! 10.1.1.0/24 172.16.1.0/24 194.1.1.254 .2
  • 23. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 32 ASA Dynamic NAT – 8.3+ %ASA-6-305011: Built dynamic TCP translation from inside:10.1.1.2/57126 to outside:194.1.1.1/57126 %ASA-6-302013: Built outbound TCP connection 3 for outside:207.1.1.2/80 (207.1.1.2/80) to inside:10.1.1.2/57126 (194.1.1.1/57126) ASA# show conn long TCP outside:207.1.1.2/80 (207.1.1.2/80) inside:10.1.1.2/57126 (194.1.1.1/57126), flags U, idle 12s, uptime 12s, timeout 1h0m, bytes 0 ASA# show xlate 2 in use, 3 most used Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice e - extended TCP PAT from inside:10.1.1.2/57126 to outside:194.1.1.1/57126 flags ri idle 0:00:23 timeout 0:00:30 Newest software tries to preserve source port if possible
  • 24. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 33 ASA Static NAT – 8.3+ %ASA-6-302013: Built inbound TCP connection 4 for outside:207.1.1.2/41506 (207.1.1.2/41506) to dmz:172.16.1.2/80 (194.1.1.254/80) ASA# show conn long TCP outside:207.1.1.2/41506 (207.1.1.2/41506) dmz:172.16.1.2/80 (194.1.1.254/80), flags UB, idle 41s, uptime 43s, timeout 1h0m, bytes 0 ASA# show xlate 1 in use, 3 most used Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice e - extended NAT from dmz:172.16.1.2 to outside:194.1.1.254 flags s idle 0:00:47 timeout 0:00:00 ASA# show access-list access-list outside_in line 1 extended permit tcp any host 172.16.1.2 eq www (hitcnt=1) 0xdae674c0 number of connections, not packets! public IP
  • 25. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 34 NAT Rules Order (8.3+) 1. Section 1: Twice NAT • default place for twice NAT rules • in order, until the first match 1. Section 2: Object NAT • static NAT (longest match) • dynamic NAT (longest match) 1. Section 3: Twice NAT • “after-auto” needs to be specified in “nat” command • in order, until the first match
  • 26. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 35 Опрос #2 Сталкивались ли Вы с проблемами при использовании NAT на ASA 1. Нет, никогда. Все отлично работает 2. Иногда бывало, но это были ошибки настройки 3. Проблемы встречались, но они легко решались переходом на новую версию 4. Проблемы возникали и их могли решить только инженеры Cisco TAC 5. Сплошные проблемы, не знаю, что делать 6. Я не использую NAT на ASA, потому что он не работает
  • 27. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 36Cisco Support Community Troubleshooting Scenario #1
  • 28. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 37 Security Policy Example ASA Internet Server 172.16.1.2 should be accessible from both Internet and Remote Office by 194.1.1.254. Other DMZ servers should be accessible via VPN without NAT. VPN is terminated on some other device, such as perimeter router. DMZ servers should be able to talk to Internet DNS servers. inside outside dmz IPSec tunnelIPSec tunnel 172.16.1.0/24 Remote Office 10.2.2.0/24 to 194.1.1.254 172.16.1.2
  • 29. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 38 ASA Interface Configuration interface GigabitEthernet0/0.1 vlan 99 nameif inside security-level 100 ip address 10.1.1.1 255.255.255.0 interface GigabitEthernet0/0.2 vlan 98 nameif dmz security-level 50 ip address 172.16.1.1 255.255.255.0 interface GigabitEthernet0/1 nameif outside security-level 0 ip address 194.1.1.1 255.255.255.0 route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
  • 30. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 39 ASA NAT Configuration – 8.3+ object network obj-172.16.1.0 subnet 172.16.1.0 255.255.255.0 object network obj-172.16.1.2 host 172.16.1.2 object network obj-194.1.1.254 host 194.1.1.254 object network RemoteOfficeNet subnet 10.2.2.0 255.255.255.0 object network RemoteOfficeNet-2 subnet 10.2.2.0 255.255.255.0 nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-2 nat (dmz,outside) source dynamic obj-172.16.1.0 interface 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24
  • 31. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 40 Customer Symptom ASA# show conn long TCP outside:207.1.1.2/80 (207.1.1.2/80) dmz:172.16.1.2/37116 (194.1.1.1/23384), flags U, idle 9s, uptime 9s, timeout 1h0m, bytes 0 TCP outside:207.1.1.2/16123 (207.1.1.2/16123) dmz:172.16.1.2/80 (194.1.1.254/80), flags UB, idle 12s, uptime 12s, timeout 1h0m, bytes 0 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 Everything works, but 172.16.1.2 gets wrong IP when goes to the Internet… At the same time inbound connections to 194.1.1.254 work as expected…
  • 32. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 41 Troubleshooting – Step #1 ASA# show run object object network obj-172.16.1.0 subnet 172.16.1.0 255.255.255.0 object network obj-172.16.1.2 host 172.16.1.2 object network obj-194.1.1.254 host 194.1.1.254 object network RemoteOfficeNet subnet 10.2.2.0 255.255.255.0 object network RemoteOfficeNet-2 subnet 10.2.2.0 255.255.255.0 ASA# show run nat nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-2 nat (dmz,outside) source dynamic obj-172.16.1.0 interface 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24
  • 33. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 42 Troubleshooting – Step #2 %ASA-6-305011: Built dynamic TCP translation from dmz:172.16.1.2/37116 to outside:194.1.1.1/23384 %ASA-6-302013: Built outbound TCP connection 54 for outside:207.1.1.2/80 (207.1.1.2/80) to dmz:172.16.1.2/37116 (194.1.1.1/23384) ASA# show conn long TCP outside:207.1.1.2/80 (207.1.1.2/80) dmz:172.16.1.2/37116 (194.1.1.1/23384), flags U, idle 9s, uptime 9s, timeout 1h0m, bytes 0 ASA# show xlate local 172.16.1.2 global 194.1.1.1 4 in use, 4 most used Flags: D - DNS, i - dynamic, r - portmap, s - static, I - identity, T - twice TCP PAT from dmz:172.16.1.2/37116 to outside:194.1.1.1/23384 flags ri idle 0:02:03 timeout 0:00:30 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24
  • 34. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 43 Troubleshooting – Step #3 ASA# debug nat 255 nat: policy lock 0x73a1cb40, old count is 1 nat: translation - dmz:172.16.1.2/37116 to outside:194.1.1.1/23384 ASA# show nat detail Manual NAT Policies (Section 1) 1 (dmz) to (outside) source static obj-172.16.1.2 obj-194.1.1.254 translate_hits = 0, untranslate_hits = 0 Source - Origin: 172.16.1.2/32, Translated: 194.1.1.254/32 2 (dmz) to (outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-2 translate_hits = 0, untranslate_hits = 0 Source - Origin: 172.16.1.0/24, Translated: 172.16.1.0/24 Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24 3 (dmz) to (outside) source dynamic obj-172.16.1.0 interface translate_hits = 1, untranslate_hits = 0 Source - Origin: 172.16.1.0/24, Translated: 194.1.1.1/24 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 Hmm… This is strange. It seems that dynamic PAT (rule #3) takes precedence over static NAT (rule #1)
  • 35. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 44 Troubleshooting – Step #4 ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80 Phase: 1 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: in 0.0.0.0 0.0.0.0 outside Phase: 2 Type: IP-OPTIONS Subtype: Result: ALLOW Config: Additional Information: Phase: 3 Type: NAT Subtype: Result: ALLOW Config: nat (dmz,outside) source dynamic obj-172.16.1.0 interface Additional Information: Dynamic translate 172.16.1.2/1234 to 194.1.1.1/40625 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 This again confirms that traffic is processed by dynamic PAT rule, instead of static NAT rule…
  • 36. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 45 Troubleshooting – Step #5 ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80 detail Phase: 1 … Phase: 2 … Phase: 3 Type: NAT Subtype: Result: ALLOW Config: nat (dmz,outside) source dynamic obj-172.16.1.0 interface Additional Information: Dynamic translate 172.16.1.2/1234 to 194.1.1.1/12386 Forward Flow based lookup yields rule: in id=0x73a1de50, priority=6, domain=nat, deny=false hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 The following command can be used to look at this NAT rule in Accelerated Security Path (ASP) table: show asp table classify domain nat
  • 37. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 46 Troubleshooting – Step #6 ASA# show asp table classify domain nat Input Table in id=0x73984078, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1ca98, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0, port=0 dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=dmz in id=0x73a1de50, priority=6, domain=nat, deny=false hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x739f84d8, priority=6, domain=nat, deny=false hits=0, user_data=0x73980550, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x73969338, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1c608, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24ASP tables are used to classify traffic in data-path and apply different security policies to it
  • 38. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 47 Troubleshooting – Step #6 ASA# show asp table classify domain nat Input Table in id=0x73984078, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1ca98, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0, port=0 dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=dmz in id=0x73a1de50, priority=6, domain=nat, deny=false hits=5, user_data=0x73a1cb40, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x739f84d8, priority=6, domain=nat, deny=false hits=0, user_data=0x73980550, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x73969338, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1c608, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet- 2 nat (dmz,outside) source dynamic obj-172.16.1.0 interface 3 2 1 2 Incorrect order ! Incorrect order ! 1 2 3
  • 39. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 48 Troubleshooting – Root Cause no nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 nat (dmz,outside) 1 source static obj-172.16.1.2 obj-194.1.1.254 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 It was found that the problem was caused by editing of NAT lines as shown below New bug was opened: CSCtt11890 ASA: Manual NAT rules inserted above others may fail to match traffic which was fixed in 8.4(4)
  • 40. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 49 Troubleshooting – Solution ASA(config)# clear conf nat ASA(config)# nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 ASA(config)# nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet-2 ASA(config)# nat (dmz,outside) source dynamic obj-172.16.1.0 interface ASA(config)# exit ASA# 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 Clearing and re-entering configuration resolves the problem (see next slide)…
  • 41. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 50 Troubleshooting – Solution Verification ASA# show asp table classify domain nat Input Table in id=0x739f84d8, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1e480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x73982f98, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1e8f8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0, port=0 dst ip/id=172.16.1.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=dmz in id=0x73a1fbd8, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1e9a0, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside in id=0x739696a0, priority=6, domain=nat, deny=false hits=0, user_data=0x73a1e528, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.0, mask=255.255.255.0, port=0 dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 nat (dmz,outside) source static obj-172.16.1.0 obj-172.16.1.0 destination static RemoteOfficeNet RemoteOfficeNet- 2 nat (dmz,outside) source dynamic obj-172.16.1.0 interface 3 2 1 2 Order is now correct! 1 2 3
  • 42. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 51 Troubleshooting – Solution Verification ASA# packet-tracer input dmz tcp 172.16.1.2 1234 207.1.1.2 80 detail Phase: 1 Type: ROUTE-LOOKUP Subtype: input Result: ALLOW Config: Additional Information: in 0.0.0.0 0.0.0.0 outside … Phase: 3 Type: NAT Subtype: Result: ALLOW Config: nat (dmz,outside) source static obj-172.16.1.2 obj-194.1.1.254 Additional Information: Static translate 172.16.1.2/1234 to 194.1.1.254/1234 Forward Flow based lookup yields rule: in id=0x739f84d8, priority=6, domain=nat, deny=false hits=2, user_data=0x73a1e480, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=172.16.1.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=dmz, output_ifc=outside 172.16.1.0/2 4 to 194.1.1.254 172.16.1.2 10.2.2.0/24 Now the correct rule is hit and static NAT works as expected for traffic DMZ:172.16.1.2 -> Internet 1
  • 43. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 57Cisco Support Community Troubleshooting Scenario #2
  • 44. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 58 Security Policy Example Remote office server 10.2.2.2 needs to talk to inside server 10.1.1.2, but 10.1.1.2 has default route via some internal router 10.1.1.x and cannot have routes through the ASA due to security reasons. So, the decision was made to NAT all incoming requests, coming from 10.2.2.2, to 10.1.1.254. Other hosts in 10.1.1.0/24 and 10.2.2.0/24 should be able to communicate without NAT. ASA Internet inside outside dmz IPSec tunnelIPSec tunnel Remote Office 10.2.2.0/24 Destination IP is NATed to 10.1.1.254Corporate Network 10.1.1.0/24 .2 .2
  • 45. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 59 ASA Interface Configuration interface GigabitEthernet0/0.1 vlan 99 nameif inside security-level 100 ip address 10.1.1.1 255.255.255.0 interface GigabitEthernet0/0.2 vlan 98 nameif dmz security-level 50 ip address 172.16.1.1 255.255.255.0 interface GigabitEthernet0/1 nameif outside security-level 0 ip address 194.1.1.1 255.255.255.0 route outside 0.0.0.0 0.0.0.0 194.1.1.2 1
  • 46. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 60 ASA NAT Configuration – 8.3+ object network obj-10.1.1.0 subnet 10.1.1.0 255.255.255.0 object network obj-10.1.1.254 host 10.1.1.254 object network RemoteOfficeNet subnet 10.2.2.0 255.255.255.0 object network RemoteServer host 10.2.2.2 nat (outside,inside) source static RemoteServer obj-10.1.1.254 nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet nat (inside,outside) source dynamic any interface 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2
  • 47. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 61 Customer Symptom ASA# show conn long TCP outside:10.2.2.2/31444 (10.2.2.2/31444) inside:10.1.1.2/80 (10.1.1.2/80), flags SaAB, idle 6s, uptime 12s, timeout 30s, bytes 0 Remote office server 10.2.2.2 cannot access inside server 10.1.1.2. Connection is created, but 10.2.2.2 is not NATed to 10.1.1.254 %ASA-6-302013: Built inbound TCP connection 198 for outside:10.2.2.2/31444 (10.2.2.2/31444) to inside:10.1.1.2/80 (10.1.1.2/80) 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2
  • 48. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 62 Troubleshooting – Step #1 ASA# debug nat 255 nat: untranslation - outside:10.1.1.2/80 to inside:10.1.1.2/80 ASA# show nat detail Manual NAT Policies (Section 1) 1 (outside) to (inside) source static RemoteServer obj-10.1.1.254 translate_hits = 0, untranslate_hits = 0 Source - Origin: 10.2.2.2/32, Translated: 10.1.1.254/32 2 (inside) to (outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet translate_hits = 0, untranslate_hits = 1 Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24 Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24 3 (inside) to (outside) source dynamic any interface translate_hits = 0, untranslate_hits = 0 Source - Origin: 0.0.0.0/0, Translated: 194.1.1.1/24 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 It seems that first NAT rule is not hit
  • 49. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 63 Troubleshooting – Step #2 ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detail Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet Additional Information: NAT divert to egress interface inside Untranslate 10.1.1.2/80 to 10.1.1.2/80 … Phase: 4 Type: NAT Subtype: Result: ALLOW Config: nat (outside,inside) source static RemoteServer obj-10.1.1.254 … 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 UN-NAT chose another rule at step #1, so static NAT rule was ignored and NAT at step #4 wasn't performed
  • 50. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 64 Troubleshooting – Step #3 ASA# show nat divert-table Divert Table id=0x73a92fc0, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0 input_ifc=inside, output_ifc=outside id=0x73a944a0, domain=divert-route type=static, hits=3, flags=0x1, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0 dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0 input_ifc=outside, output_ifc=inside ASA# show run nat nat (outside,inside) source static RemoteServer obj-10.1.1.254 nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet nat (inside,outside) source dynamic any interface 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 There is only one rule for outside interface in “NAT divert table”. This rule was created from NAT rule #2 and blocked execution of NAT rule #1…
  • 51. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 65 Troubleshooting – Workaround object network obj-10.1.1.0 subnet 10.1.1.0 255.255.255.0 object network obj-10.1.1.254 host 10.1.1.254 object network RemoteOfficeNet subnet 10.2.2.0 255.255.255.0 object network RemoteServer host 10.2.2.2 object network LocalServer host 10.1.1.2 object network LocalServer-2 host 10.1.1.2 nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static LocalServer LocalServer-2 nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet nat (inside,outside) source dynamic any interface 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 The root cause of the problem is that “NAT divert table” is not populated with an entry for 1st NAT rule. So, we can try to reconfigure 1st NAT rule and correct entry will be installed into the “NAT divert table”. Note that it is necessary to use two different object names here: LocalServer and LocalServer-2, otherwise “NAT divert” rule will not be installed
  • 52. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 66 Troubleshooting – Verification ASA# show nat divert-table Divert Table id=0x739f6ea8, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=10.1.1.2, mask=255.255.255.255 port=0-0 dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0 input_ifc=inside, output_ifc=outside id=0x73a92fc0, domain=divert-route type=static, hits=1, flags=0x1, protocol=0 src ip/id=10.2.2.2, mask=255.255.255.255 port=0-0 dst ip/id=10.1.1.2, mask=255.255.255.255 port=0-0 input_ifc=outside, output_ifc=inside id=0x72f21768, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0 dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0 input_ifc=outside, output_ifc=inside ASA# show run nat nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static LocalServer LocalServer-2 nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet nat (inside,outside) source dynamic any interface 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2
  • 53. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 67 Troubleshooting – Verification ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detail Phase: 1 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static LocalServer LocalServer-2 Additional Information: NAT divert to egress interface inside Untranslate 10.1.1.2/80 to 10.1.1.2/80 … Phase: 4 Type: NAT Subtype: Result: ALLOW Config: nat (outside,inside) source static RemoteServer obj-10.1.1.254 destination static LocalServer LocalServer-2 Additional Information: Static translate 10.2.2.2/1234 to 10.1.1.254/1234 Forward Flow based lookup yields rule: in id=0x6dec91a0, priority=6, domain=nat, deny=false hits=1, user_data=0x739f6ea8, cs_id=0x0, use_real_addr, flags=0x0, protocol=0 src ip/id=10.2.2.2, mask=255.255.255.255, port=0 dst ip/id=10.1.1.2, mask=255.255.255.255, port=0, dscp=0x0 input_ifc=outside, output_ifc=inside 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 Correct rule is hit at both UN-NAT and NAT steps
  • 54. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 68 Troubleshooting – Verification ASA# show nat detail Manual NAT Policies (Section 1) 1 (outside) to (inside) source static RemoteServer obj-10.1.1.254 destination static LocalServer LocalServer-2 translate_hits = 1, untranslate_hits = 1 Source - Origin: 10.2.2.2/32, Translated: 10.1.1.254/32 Destination - Origin: 10.1.1.2/32, Translated: 10.1.1.2/32 2 (inside) to (outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet translate_hits = 0, untranslate_hits = 0 Source - Origin: 10.1.1.0/24, Translated: 10.1.1.0/24 Destination - Origin: 10.2.2.0/24, Translated: 10.2.2.0/24 3 (inside) to (outside) source dynamic any interface translate_hits = 0, untranslate_hits = 0 Source - Origin: 0.0.0.0/0, Translated: 194.1.1.1/24 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 Correct rule is hit at both UN-NAT and NAT steps
  • 55. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 69 Troubleshooting – Permanent Fix ASA# show run nat nat (outside,inside) source static RemoteServer obj-10.1.1.254 nat (inside,outside) source static obj-10.1.1.0 obj-10.1.1.0 destination static RemoteOfficeNet RemoteOfficeNet nat (inside,outside) source dynamic any interface 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 Permanent fix is available in 8.4(4.2) CSCtq47028 ASA: Manual NAT rules are not processed in order The CSCtq47028 fix made above workaround unnecessary. NAT rules are installed automatically into both “NAT divert” and NAT tables. This is a huge change in NAT implementation! 1
  • 56. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 70 Troubleshooting – Permanent Fix ASA# show asp table classify domain nat Input Table in id=0x6decad08, priority=6, domain=nat, deny=false hits=0, user_data=0x6deca528, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.2.2.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=inside in id=0x6decaf80, priority=6, domain=nat, deny=false hits=0, user_data=0x6deca5d0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0 dst ip/id=10.1.1.254, mask=255.255.255.255, port=0, dscp=0x0 input_ifc=inside, output_ifc=outside in id=0x739c64f8, priority=6, domain=nat, deny=false hits=0, user_data=0x739c0378, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.1.1.0, mask=255.255.255.0, port=0 dst ip/id=10.2.2.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=inside, output_ifc=outside in id=0x739c6770, priority=6, domain=nat, deny=false hits=0, user_data=0x6decd9f8, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0, port=0 dst ip/id=10.1.1.0, mask=255.255.255.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=inside in id=0x6decc5f0, priority=6, domain=nat, deny=false hits=0, user_data=0x7307e530, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=inside, output_ifc=outside in id=0x6decc9d8, priority=6, domain=nat, deny=false hits=0, user_data=0x7307e3e0, cs_id=0x0, flags=0x0, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0, port=0 dst ip/id=194.1.1.1, mask=255.255.255.255, port=0, dscp=0x0 input_ifc=outside, output_ifc=inside 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 1 Rule (1) in ASP NAT table is used to classify traffic, coming from 10.2.2.2, and translate source IP from 10.2.2.2 to 10.1.1.254
  • 57. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 71 Troubleshooting – Permanent Fix ASA# show nat divert-table Divert Table id=0x6deca528, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 dst ip/id=10.1.1.254, mask=255.255.255.255 port=0-0 input_ifc=inside, output_ifc=outside id=0x6deca5d0, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=10.2.2.2, mask=255.255.255.255 port=0-0 dst ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 input_ifc=outside, output_ifc=inside id=0x739c0378, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=10.2.2.0, mask=255.255.255.0 port=0-0 dst ip/id=10.1.1.0, mask=255.255.255.0 port=0-0 input_ifc=outside, output_ifc=inside id=0x6decd9f8, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=10.1.1.0, mask=255.255.255.0 port=0-0 dst ip/id=10.2.2.0, mask=255.255.255.0 port=0-0 input_ifc=inside, output_ifc=outside id=0x7307e530, domain=divert-route type=dynamic, hits=0, flags=0x1, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 dst ip/id=194.1.1.1, mask=255.255.255.255 port=0-0 input_ifc=outside, output_ifc=inside id=0x7307e3e0, domain=divert-route type=static, hits=0, flags=0x1, protocol=0 src ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 dst ip/id=0.0.0.0, mask=0.0.0.0 port=0-0 input_ifc=inside, output_ifc=outside 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 1 Rule (1) in ASP “NAT divert” table is used to classify traffic, coming from 10.2.2.2, and translate destination IP from a.b.c.d (i.e. any IP) to itself
  • 58. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 72 Troubleshooting – Permanent Fix ASA# packet-tracer input outside tcp 10.2.2.2 1234 10.1.1.2 80 detailed … Phase: 2 Type: UN-NAT Subtype: static Result: ALLOW Config: nat (outside,inside) source static RemoteServer obj-10.1.1.254 Additional Information: NAT divert to egress interface inside Untranslate 10.1.1.2/80 to 10.1.1.2/80 … Phase: 5 Type: NAT Subtype: Result: ALLOW Config: nat (outside,inside) source static RemoteServer obj-10.1.1.254 Additional Information: Static translate 10.2.2.2/1234 to 10.1.1.254/1234 Forward Flow based lookup yields rule: in id=0x6decad08, priority=6, domain=nat, deny=false hits=1, user_data=0x6deca528, cs_id=0x0, flags=0x0, protocol=0 src ip/id=10.2.2.2, mask=255.255.255.255, port=0 dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0 input_ifc=outside, output_ifc=inside 10.1.1.0/24 .2 10.2.2.0/24 IPSec Internet .2 Correct rule is hit at both UN-NAT and NAT steps
  • 59. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 73 CSCtq47028 Fix – More Info  In many customer cases problems were seen when asymmetric or overlapping NAT rules were configured  Definition of “asymmetric” • If an outbound packet matches a specific NAT rule and the return packet matches a different NAT rule in the table, then they are called asymmetric NAT rules. Most common with usage of 'dynamic' or 'unidirectional' NAT.  Definition of “overlapping” • If two or more NAT rules matches both source and destination (ports included) in the table, then they are called overlapping rules. This also involves usage of 'any' keyword as source or destination network.  In this case Twice NAT rules may not be processed in order
  • 60. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 74 CSCtq47028 Fix – More Info  This behavior is fixed by CSCtq47028 in 8.4(4.2)  For a Twice NAT rule, if the destination is not explicitly specified, ASA implicitly adds “destination static any any”  This populates “NAT divert” table with required rules and NAT rules order is strictly enforced This change may affect existing configurations!
  • 61. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 81Cisco Support Community Final Recommendations
  • 62. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 82 Final Recommendations  KISS: Keep It Simple, Stupid  Use Object NAT whenever possible, use Twice NAT when Policy NAT is really needed  Design your network carefully, don’t use NAT to workaround routing problems  Don’t use NAT for policy control, use ACLs instead  Remember that ASA is not a IOS router; learn how NAT and routing interoperate on this platform
  • 63. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 83 Final Recommendations  Always issue “no nat-control” prior to upgrading to 8.3+  Don’t upgrade to 8.3 on a Friday night just as you are getting ready to go out of town for the weekend  Test upgrade in a lab first (if you have one)  Read documentation and Cisco Support Community documents with ‘ASA’ and ‘nat’ tags  Call in to the TAC in case of a trouble
  • 64. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 84 FIN, ACK [ Thank you ! ]
  • 65. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 85 Опрос #3 Какие темы семинаров по безопасности Вам интересны? 1. Построение Remote Access VPN с помощью ASA 2. Построение Site-to-Site VPN на маршрутизаторах 3. DMVPN и GETVPN на маршрутизаторах Cisco 4. Использование платформы ASR1k для VPN 5. Любые вопросы использования Cisco ASA в качестве межсетевого экрана 6. IOS Zone-based Firewall 7. Система обнаружения атак IPS 4200 8. Продукты IronPort
  • 66. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 86Cisco Support Community Q & A Эксперт ответит на некоторые Ваши вопросы. Используйте Q&A панель, чтобы задать еще вопросы
  • 67. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 87 Вторник, 9 октября 10:00 по московскому времени Эксперт Cisco: Amit Singh Расскажет об архитектуре лицензирования Cisco Unified Call Manager (CUCM) версии 9.0х. Регистрация: http://tools.cisco.com/gems/cust/customerSite.do?METHOD= Тема: Licensing Architecture: Cisco Unified Call Manager Version 9.x
  • 68. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 88 Вторник, 30 октября 18:00 по московскому времени Эксперт Cisco: Jazib Frahim Расскажет о том как решать проблемы с SSL VPN на Cisco Adaptive Security Appliance (ASA) Регистрация https://supportforums.cisco.com/community/netpro/expert-corner Тема: Troubleshooting SSL VPN on ASA
  • 69. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 89
  • 70. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco PublicCisco Support Community 90 Приглашаем Вас активно участвовать в Cisco Support Community и социальных сетях https://supportforms.cisco.com/community/russian http://www.facebook.com/CiscoRu http://twitter.com/CiscoRussia http://www.youtube.com/user/CiscoRussiaMedia http://itunes.apple.com/us/app/cisco-technical-support/id398104252?mt=8 http://www.linkedin.com/groups/CSC-Cisco-Support-Community-3210019 Newsletter Subscription: https://tools.cisco.com/gdrp/coiga/showsurvey.do? surveyCode=589&keyCode=146298_2&PHYSICAL%20FULFILLMENT %20Y/N=NO&SUBSCRIPTION%20CENTER=YES
  • 71. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Public 91Cisco Support Community Спасибо за Ваше время Пожалуйста, участвуйте в опросе

Notes de l'éditeur

  1. TWO PRESENTERS SLIDE TEMPLATE OPTIONAL for video webcast
  2. Applies to ON24 webcast console
  3. Applies to ON24 webcast console
  4. © 2009, Cisco Systems, Inc. All rights reserved. Presentation_ID.scr