Solved

ASA 9.1 NAT basic understanding

Posted on 2014-11-26
2
475 Views
Last Modified: 2015-01-19
Hi,

on ios 9.1 - im confused about  nat - I have a statement for example that forwards (port forward in a sense) port 80 that hits an "outside" public IP object - forwards to an inside object (inside LAN) Please disregard the poor security design of doing this - the question is for my understanding of nat on 9.1

eg   object network insidewebserver
 nat (inside,outside) static outsideobject service tcp www www

it works   - however my confusion in understanding is the "nat(inside,outside) order.  It has inside first and then outside. Why?  the traffic would be coming from the outside first - Joe Smith on the internet would hit the "outside on http and then forward to the inside object.  I thought the order of (inside,outside) meant that traffic flow means "in" on inside first and then "out" on the outside. Or is that old way pre 8.3 ios thinking. -  my question is really to understand the order of nat (inside,outside) and whether it is important for nat on asa 9.1 hardware  model 5515 thanks.
0
Comment
Question by:philb19
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 500 total points
ID: 40469362
Normally NAT is on an IP basis and doesn't care about which port, service, or direction the flow starts in. I only include the service if there is something special going on like you need to have 1 public IP point to different private IP depending on the port, or you need to translate 1 port to another. For classic NAT the NAT rule sets up the translation and an ACL controls the traffic. Even with your NAT rule you still need to configure the ACL on the outside interface to permit the tcp/80 traffic inbound.

The order of the objects in the NAT is from the higher security interface to the lower security interface, and is not related to where you expect the flow to originate from. I think it has been that way for at least 15 years. One possible issue with your NAT statement is that unless you have another NAT statement covering your server your server can't access the Internet unless the origination port is tcp/80. If there is another NAT you would see that the webserver has a different public IP than the one in your example because that only covers port 80.
0
 

Author Comment

by:philb19
ID: 40469878
Thanks for comment. I did some reading to find answer myself. Basically what I found is that the NAT on ASA is bidirectional.(basically what you have said :)   ) Also the order is "real" and then "mapped"  so real is the inside   and then mapped is the outside.  For IP address's this is reversed in the NAT statement. - So i think biderectional is the key. - if i was on the internal webserver itself surfing the net on 80 then its internal IP wold be natted to the outside IP specified in the NAT for port 80.

I got on to the internal webserver and checked this out
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question