<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CSS outbound NAT in Application Networking</title>
    <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690305#M13140</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is a very helpful link.  Out of the 20 or so hosts on the inside segment, I only want to NAT four of them to a public IP address.  To prevent NAT'ing the other hosts, would I use something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 5 permit any 192.168.1.10 255.255.255.255 destination any sourcegroup outbound&lt;/P&gt;&lt;P&gt;clause 10 bypass any 192.168.1.0 255.255.255.0 destination any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing I'm confused about is that in the original link I saw, the ACL had permit statements for internal networks _to_ the internal networks, i.e. permit any 192.168.1.0 255.255.255.0 destination 192.168.1.0 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of these statements and why would they not be shown in the second link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I'm assuming that if I only want to NAT outbound traffic and not permit inbound connections, I don't have to apply a "permit any any" ACL to the outside interface, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Jan 2007 23:41:50 GMT</pubDate>
    <dc:creator>mbell</dc:creator>
    <dc:date>2007-01-16T23:41:50Z</dc:date>
    <item>
      <title>CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690303#M13138</link>
      <description>&lt;P&gt;I've seen several posts in this forum relating to outbound (source) NAT'ing on a CSS but am still confused as to what I need to accomplish this.  I've got four servers behind a CSS that need to be PAT'd to a single public address for outbound access.    I've read through this page:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_tech_note09186a0080093dfc.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_tech_note09186a0080093dfc.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but still have some questions since this page does not discuss topology.  First, which circuit should the "apply circuit-" command be used for?  Is that for the public side or private side?  Second, is this all the configuration I need to enable outbound NAT?  Third, what (if any) impact does this have on the inbound configuration for these servers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anybody has a config showing how to do this, that would be great!&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jan 2007 19:15:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690303#M13138</guid>
      <dc:creator>mbell</dc:creator>
      <dc:date>2007-01-07T19:15:35Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690304#M13139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess this one would be more explicit&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_configuration_example09186a008009470e.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/contnetw/ps789/products_configuration_example09186a008009470e.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2007 07:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690304#M13139</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-01-08T07:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690305#M13140</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is a very helpful link.  Out of the 20 or so hosts on the inside segment, I only want to NAT four of them to a public IP address.  To prevent NAT'ing the other hosts, would I use something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;clause 5 permit any 192.168.1.10 255.255.255.255 destination any sourcegroup outbound&lt;/P&gt;&lt;P&gt;clause 10 bypass any 192.168.1.0 255.255.255.0 destination any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The thing I'm confused about is that in the original link I saw, the ACL had permit statements for internal networks _to_ the internal networks, i.e. permit any 192.168.1.0 255.255.255.0 destination 192.168.1.0 255.255.255.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the purpose of these statements and why would they not be shown in the second link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I'm assuming that if I only want to NAT outbound traffic and not permit inbound connections, I don't have to apply a "permit any any" ACL to the outside interface, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Jan 2007 23:41:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690305#M13140</guid>
      <dc:creator>mbell</dc:creator>
      <dc:date>2007-01-16T23:41:50Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690306#M13141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we often nat when a server itself open a connection with a vip.  This is because the CSS will forward the request to a server [could even be the same one that opened the connection] that resides in the same subnet as the source and to guarantee that the response goes back to the CSS client is necessary.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case, you want to nat outbound traffic.&lt;/P&gt;&lt;P&gt;So simply make an acl that matches your source/destination and you should be ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jan 2007 08:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690306#M13141</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-01-17T08:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690307#M13142</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if I want to NAT these four servers to the Internet but not the other servers behind the CSS, then what entries in the ACL do I need for the servers that I do not want to NAT?  Would I use "deny" or "bypass"?  I thought CSS ACLs have implicit "denies" like IOS ACLs and I need something to allow the other traffic through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm assuming I'll need four ACL entries that permit traffic from the four hosts I want to NAT to the source-group plus some other entries that allow non-NAT'd traffic to "any".  I'm just trying to figure out what the entries should look like for the inside hosts that will not be NAT'd.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 05:14:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690307#M13142</guid>
      <dc:creator>mbell</dc:creator>
      <dc:date>2007-01-18T05:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690308#M13143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you need a permit for the rest of the traffic if you simply want the traffic to be processed by the CSS.  A Deny if you want to drop it or a bypass if you want the css to only route the traffic [no match possible on any content rule].&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so you should end up with something like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acl 1&lt;/P&gt;&lt;P&gt;  clause 10 permit any X destination Y sourcegroup Z&lt;/P&gt;&lt;P&gt;  ...&lt;/P&gt;&lt;P&gt;  clause 99 permit any any destination any&lt;/P&gt;&lt;P&gt;  apply all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 15:04:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690308#M13143</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-01-18T15:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690309#M13144</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;clause 5 permit any 192.168.1.10 255.255.255.255 destination any sourcegroup outbound &lt;/P&gt;&lt;P&gt;clause 10 bypass any 192.168.1.0 255.255.255.0 destination any &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above would definitely fix your issue as stated earlier by a contributor. You would need to bypass the content rules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Jan 2007 21:58:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690309#M13144</guid>
      <dc:creator>frankamankwah</dc:creator>
      <dc:date>2007-01-18T21:58:31Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690310#M13145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Once again, great information.  Something else that I just want to double-check...  If I already have these four servers configured to provide inbound services _from_ the Internet, i.e.:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  content manager &lt;/P&gt;&lt;P&gt;    add service manager5 &lt;/P&gt;&lt;P&gt;    add service manager6 &lt;/P&gt;&lt;P&gt;    protocol tcp &lt;/P&gt;&lt;P&gt;    port 8080 &lt;/P&gt;&lt;P&gt;    add service manager3 &lt;/P&gt;&lt;P&gt;    add service manager4 &lt;/P&gt;&lt;P&gt;    advanced-balance arrowpoint-cookie &lt;/P&gt;&lt;P&gt;    vip address 60.1.1.1 &lt;/P&gt;&lt;P&gt;    active &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will the new outbound NAT configuration have any impact on the inbound services and the replies for those services?  In the link you provided originally, I found "The CSS 11000/11500 does not apply ACLs to response traffic because you already have a flow established." so I am assuming that this new ACL/NAT configuration would not have any impact on the services or content rules that are already configured for these hosts, correct?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2007 08:29:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690310#M13145</guid>
      <dc:creator>mbell</dc:creator>
      <dc:date>2007-01-22T08:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: CSS outbound NAT</title>
      <link>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690311#M13146</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you are correct, the ACL will only apply to new connections opened from the servers.&lt;/P&gt;&lt;P&gt;This could have an impact on UDP connection, if you have udp content rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gilles.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2007 09:30:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/application-networking/css-outbound-nat/m-p/690311#M13146</guid>
      <dc:creator>Gilles Dufour</dc:creator>
      <dc:date>2007-01-22T09:30:54Z</dc:date>
    </item>
  </channel>
</rss>

