Solved

Cisco ASA 5520 seems to be bypassing PAT statement

Posted on 2014-03-10
4
382 Views
Last Modified: 2014-03-15
I am in the process of converting our ASA 5520 from 7.2 to 8.3.2 and everything has worked except for my PAT from inside to DMZ.  

in 7.2 we had:
global (dmz) 1 192.168.0.10

In 8.3.2 I converted it to:
object network dmz_net
   subnet 0.0.0.0 0.0.0.0
   nat (inside,dmz) dynamic 192.168.0.10


From what I understand that should be the same as before, but when I test this config the PAT is just bypassed and my real IP's are hitting the DMZ.  Granted I know that by design the ASA is working as it should but pushing the real IP's, but the DMZ servers all have an internal network address which is causing a loop.  So I need this PAT "bandaid" to work so I can slowly change to allow my real IP's.  Any help would be great so I can try to figure out this problem.
0
Comment
Question by:Kishwaukee
  • 3
4 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39918269
Can you provide your full config?
0
 

Author Comment

by:Kishwaukee
ID: 39918333
what part do you want to look at?  I would rather not post the whole config, it is very long.
0
 

Accepted Solution

by:
Kishwaukee earned 0 total points
ID: 39918725
The issue resolved itself with time.  Not sure why it took a day for the stuff to work but it is now working.
0
 

Author Closing Comment

by:Kishwaukee
ID: 39931106
I resolved it myself, well it resolved it on its own.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now