<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Auto Archives - Think Netsec</title>
	<atom:link href="https://www.thinknetsec.com/tag/auto/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thinknetsec.com/tag/auto/</link>
	<description>Think Network Security</description>
	<lastBuildDate>Fri, 05 Jan 2018 23:43:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://www.thinknetsec.com/wp-content/uploads/2017/08/cropped-ThinkNetsec-Full-Logo-1-32x32.png</url>
	<title>Auto Archives - Think Netsec</title>
	<link>https://www.thinknetsec.com/tag/auto/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">133674323</site>	<item>
		<title>Different ASA NATs 8.3+</title>
		<link>https://www.thinknetsec.com/different-asa-nats-8-3/</link>
					<comments>https://www.thinknetsec.com/different-asa-nats-8-3/#comments</comments>
		
		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Sun, 20 Aug 2017 05:41:32 +0000</pubDate>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[ASA]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Auto]]></category>
		<category><![CDATA[Dynamic]]></category>
		<category><![CDATA[Manual]]></category>
		<category><![CDATA[NAT]]></category>
		<guid isPermaLink="false">http://www.thinknetsec.com/?p=262</guid>

					<description><![CDATA[<p>Different NAT Types There are three types of NAT on the ASA which have different processing orders and functions.  To understand the different ASA NAT types, we should first go over the the different types of NAT in general. General Types of NAT Static NAT—A consistent mapping between a real<a class="moretag" href="https://www.thinknetsec.com/different-asa-nats-8-3/"> Read more&#8230;</a></p>
<p>The post <a href="https://www.thinknetsec.com/different-asa-nats-8-3/">Different ASA NATs 8.3+</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>Different NAT Types</strong></h2>
<p>There are three types of NAT on the ASA which have different processing orders and functions.  To understand the different ASA NAT types, we should first go over the the different types of NAT in general.</p>
<h4><strong>General Types of NAT</strong></h4>
<ul>
<li class="pBu1_Bullet1"><strong>Static NAT</strong>—A consistent mapping between a real and mapped IP address. Allows bidirectional traffic initiation.</li>
<li class="pBu1_Bullet1"><strong>Dynamic NAT</strong>—Maps a group of IP addresses to another group of IP addresses (possibly smaller). This is done based on which ever IP initiates traffic first. Only the &#8216;real&#8217; hosts can initiate traffic.</li>
<li class="pBu1_Bullet1"><strong>Dynamic Port Address Translation (PAT)</strong>—Maps a group of IP addresses to a single IP address with a unique source port of that IP address. Only the &#8216;real&#8217; hosts can initiate traffic.</li>
<li class="pBu1_Bullet1"><strong>Identity NAT</strong>—Lets you translate a real address to itself, essentially bypassing NAT. You might want to configure NAT this way when you want to translate a large group of addresses, but then want to exempt a smaller subset of addresses.</li>
<li class="pBu1_Bullet1"><strong>Twice NAT</strong>—A NAT which can perform all the functions of the other NATs but NATs both the Source and Destination IP addresses. Sometimes called Selective NAT if you NAT the Source but NAT the Destination to itself. Selective NAT is useful when you need to NAT the Source to a different Mapped Address based on Destination.</li>
</ul>
<h2><strong>ASA NATs</strong></h2>
<ul>
<li><strong>Manual NAT</strong>—A NAT on the ASA to perform all of the NAT types mentioned above. Manual NATs are processed first and executed on the ASA in the order in which they are configured. These are often used in conjunction with VPNs as Identity NATs to exclude VPN traffic from being NAT&#8217;d</li>
<li class="pBu1_Bullet1"><strong>Auto NAT</strong>—Auto NAT can be used as any NAT type above except for Twice NAT or Selective NAT since the Destination IP address can not be specified. These are generally used for Static NATs and are processed after Manual NATs. These do not necessarily perform in their configured order on the ASA, but rather, perform in Alphabetical order. This can be troublesome if you plan on performing PATs within Auto Nats. You can see the processing order of Auto NATs if you do a &#8216;show xlate&#8217; on the ASA.</li>
<li class="pBu1_Bullet1"><strong>After Auto Nat</strong>—After Auto NATs are processed last but are written and performed similar to Manual NATs. These can have both Source and Destination IP Address but this type of NAT is generally used for PATs.</li>
</ul>
<h2><strong>Examples:</strong></h2>
<p>Not every scenario will be covered, nor every possible type of NAT, but NAT is a powerful tool on the ASA if one understands the way it functions. You can do something as simple as allowing a LAN out to the Internet by using a PAT or do something more complicated. For example, allow your Local LAN to communicate to many Remote LANs (VPNs for example) which have the exact same Local LAN as the Local environment. With NAT, we can fully control everything on the ASA without requesting the Remote side to make complicated NAT changes on their end or requesting that someone play rock paper scissors on who gets to re-IP their networks.</p>
<h2><strong>Manual Nat(Source only):</strong></h2>
<p>Here, we will use Manual NAT as a Static NAT. We will NAT our local internal IP 192.168.5.7 to the External IP of 83.24.5.34.</p>
<p>object network <strong>Web1-192.168.5.7</strong><br />
host <span style="color: #00ccff;">192.168.5.7</span></p>
<p>object network <strong>Web1-External-83.24.5.34</strong><br />
host <span style="color: #0000ff;">83.24.5.34</span></p>
<p><strong>     nat (<span style="color: #00ccff;">inside</span>,<span style="color: #0000ff;">outside</span>) source static <span style="color: #00ccff;">Web1-192.168.5.7</span> <span style="color: #0000ff;">Web1-External-83.24.5.34</span></strong></p>
<p>With Manual NATs, the IPs are referenced using objects or object-groups. You are not able to just type the IP addresses with these types of NATs so we need an object for every IP or IP network.</p>
<p>Notice the coloring of the text as this will help you identify which IP is for which segment. If the IP <span style="color: #00ff00;"><strong><span style="color: #00ccff;">192.168.5.7</span> </strong><span style="color: #000000;">comes into the <span style="color: #00ccff;"><strong>inside</strong></span> segment and its traffic is destined for the <strong><span style="color: #0000ff;">outside</span> </strong>segment, then it will NAT as <span style="color: #0000ff;"><strong>83.24.5.34</strong><span style="color: #000000;">. The same is true in the reverse if traffic is destined for the <strong><span style="color: #0000ff;">83.24.5.34</span> </strong>on the <span style="color: #0000ff;"><strong>outside</strong></span> interface. Note that the first segment in the (), in this case is the <span style="color: #00ccff;"><strong>inside</strong></span> segment, is the sourcing interface. The next interface, in this case <strong><span style="color: #0000ff;">outside</span>,</strong> is used as the destination so this will NAT anything <strong>Destined</strong> for <strong><span style="color: #0000ff;">83.24.5.34</span> </strong> to the <span style="color: #00ccff;"><strong>192.168.5.7</strong></span> in the <span style="color: #00ccff;"><strong>inside</strong></span> segment.</span></span></span></span></p>
<h2><strong>Manual NAT(Source and Destination):</strong></h2>
<p>Manual NAT is best used when you need to NAT your traffic differently for a specific Destination. In this example, I will be doing Selective NAT (Twice NAT). We want to NAT 192.168.5.7 to 83.24.5.34<strong> </strong>only when our destination is 72.84.56.78. To do this, we will reuse our NAT from earlier but add a destination.</p>
<p>object network <span style="color: #00ccff;"><strong>Web1-192.168.5.7</strong></span><br />
host <span style="color: #00ccff;">192.168.5.6</span></p>
<p>object network <span style="color: #0000ff;"><strong>Web1-External-83.24.5.34</strong></span><br />
host <span style="color: #0000ff;">83.24.5.34</span></p>
<p>object network <strong>Destination-72.84.56.78</strong><br />
host 72.84.56.78</p>
<p><strong>     nat (<span style="color: #00ccff;">inside</span>,<span style="color: #0000ff;">outside</span>) source static <span style="color: #00ccff;">Web1-192.168.5.7</span> <span style="color: #0000ff;">Web1-External-83.24.5.34</span> destination static <span style="color: #00ccff;">Destination-72.84.56.78</span> <span style="color: #0000ff;">Destination-72.84.56.78</span></strong></p>
<p>Notice that I have colored the Destination both <span style="color: #00ccff;"><strong>light blue</strong></span> and <span style="color: #0000ff;"><strong>blue<span style="color: #000000;">. </span></strong><span style="color: #000000;">This is because of how this NAT functions and which IP in the NAT talks to which IP. In this case, the <strong><span style="color: #00ccff;">inside</span> </strong>address 192.168.5.7 is using the first object (IP) referenced in the Destination portion of the NAT. The same is true for the <strong><span style="color: #0000ff;">outside</span></strong> portion of the NAT which talks to the second object (IP) referenced in the Destination. Always understand this order as it helps if we need to do a full Twice NAT where we map our Destination as a different IP.</span></span></p>
<p>Let&#8217;c complicate the same NAT a bit and NAT our Destination to a different remote host. We will state that when our 192.168.5.7 address is destined to 72.84.56.78 that we want to map this to googles DNS Server 8.8.8.8.</p>
<p>object network <strong>Google-8.8.8.8</strong><br />
host 8.8.8.8</p>
<p><strong>     nat (<span style="color: #00ccff;">inside</span>,<span style="color: #0000ff;">outside</span>) source static <span style="color: #00ccff;">Web1-192.168.5.7</span> <span style="color: #0000ff;">Web1-External-83.24.5.34</span> destination static <span style="color: #00ccff;">Destination-72.84.56.78</span><span style="color: #0000ff;"> Google-8.8.8.8</span></strong></p>
<p><span style="color: #000000;">With this addition to our NAT, when our <span style="color: #00ccff;"><strong>192.168.5.7</strong></span> is destined for <span style="color: #00ccff;"><strong>72.84.56.78</strong></span>, it will NAT <span style="color: #00ccff;"><strong>192.168.5.7</strong></span> to <strong><span style="color: #0000ff;">83.24.5.34</span></strong>. At the same time, it will NAT <strong><span style="color: #00ccff;">72.84.56.78</span> </strong>to <span style="color: #0000ff;"><strong>8.8.8.8</strong></span>. <span style="color: #000000;">By using this type of NAT, <span style="color: #0000ff;"><strong>8.8.8.8</strong></span> will see our Web1 Server as <strong><span style="color: #0000ff;">83.24.5.34</span></strong> but our Web1 Server <span style="color: #000000;">sourcing as <strong><span style="color: #00ccff;">192.168.5.7</span> </strong></span>will think it is talking to <span style="color: #00ff00;"><span style="color: #00ccff;"><strong>72.84.56.78</strong></span><span style="color: #000000;">.</span></span></span></span></p>
<h2><strong>Auto NAT:</strong></h2>
<p>Auto NAT is simpler to configure then Manual NAT and is mainly used for static NATs. We can perform PATs and other NAT types with Auto NAT but I would recommend that Auto NAT is only used for static NATs. As I stated before, these are processed in alphabetical order so if you try to make more specific port forwarding NATs etc with these, you may not get the outcome you want if you name your objects in the wrong alphabetical order.</p>
<p>Lets configure the same Static NAT we did earlier but with Auto NAT.</p>
<p>object network <strong>Web1-192.168.5.7</strong><br />
host <span style="color: #00ccff;"><strong>192.168.5.6</strong></span><br />
<strong>     nat (<span style="color: #00ccff;">inside</span>,<span style="color: #0000ff;">outside</span>) static <span style="color: #0000ff;">83.24.5.34</span></strong></p>
<p>You will notice it took less configuration to get the same desired outcome for the Static NAT. This NAT is configured within your object that you specify your host or subnet that you wish to be NAT&#8217;d. I will only cover Static NAT for Auto NAT as this is really the only time we should use Auto NAT.</p>
<h2><strong>After-Auto NAT:</strong></h2>
<p>After Auto NAT is the last NAT to be processed on the ASA. Since this is the last NAT to be processed, these are generally used as a catch all PAT type of NAT. Lets configure a PAT where we take our entire 192.168.5.0/24 Subnet and NAT (PAT) it to 83.24.5.35<strong>.</strong></p>
<p>object network <span style="color: #00ccff;"><strong>Inside-Subnet</strong></span><br />
subnet <span style="color: #00ccff;">192.168.5.0 255.255.255.0</span><br />
object network <span style="color: #0000ff;"><strong>Default-PAT-Outbound</strong></span><br />
host <span style="color: #0000ff;">83.24.5.35</span></p>
<p><strong>     nat (<span style="color: #00ccff;">inside</span>,<span style="color: #0000ff;">outside</span>) <span style="color: #ff0000;">after-auto</span> source <span style="color: #ff6600;">dynamic</span> <span style="color: #00ccff;">Inside-Subnet</span> <span style="color: #0000ff;">Default-PAT-Outbound</span></strong></p>
<p>Notice that this NAT looks a lot like the Manual NAT we did earlier except now we see the <strong><span style="color: #ff0000;">after-auto</span> </strong>keyword. This is what makes a Manual NAT into an <strong><span style="color: #ff0000;">After-Auto</span> </strong>NAT. I also changed the keyword static to <strong><span style="color: #ff6600;">dynamic</span></strong> which is what makes a NAT act as a PAT on the ASA. As with Auto-NAT, I will only cover PATs with After-Auto NATs as this is really the only time these should be used. Try to keep all of your more complicated NATs within Manual NATs since those are processed first and processed in configured order.</p>
<p>If you would like to know more or see more articles on NAT please let me know. You can <a href="https://www.thinknetsec.com/contact/">contact</a> me and I will do what I can to help.</p>
<p>The post <a href="https://www.thinknetsec.com/different-asa-nats-8-3/">Different ASA NATs 8.3+</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thinknetsec.com/different-asa-nats-8-3/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">262</post-id>	</item>
	</channel>
</rss>
