<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/732999#M1007277</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, what are you trying to accomplish.. do you want to  have public inbound connections to connect to your local machine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems you are applying the static nat for outside interface using a private ip block 172.18.x.x instead of a public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;usually:&lt;/P&gt;&lt;P&gt;static (inside,outside) publicIP localIP netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then your access list to permit inbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For outbound internet your static NAT which is your public IP should get you internet outbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 13 Apr 2007 16:24:22 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2007-04-13T16:24:22Z</dc:date>
    <item>
      <title>nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/732998#M1007276</link>
      <description>&lt;P&gt;Can someone explain to me what's happening here?  When I set up a static nat on my machine on the firewall I'm not able to get out to the internet, if I remove that nat and go over the global pat then everything works fine:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.10.39 10.14.2.39 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;FW# sh xlate | i 2.39&lt;/P&gt;&lt;P&gt;Global 172.18.10.39 Local 10.14.2.39&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apr 13 2007 10:04:44: %PIX-6-302020: Built ICMP connection for faddr 72.14.207.99/0 gaddr 172.18.10.39/0 laddr 10.14.2.39/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internet router has these lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 1 pool public&lt;/P&gt;&lt;P&gt;access-list 1 permit 172.18.10.39&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/732998#M1007276</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2019-03-11T09:59:52Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/732999#M1007277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi, what are you trying to accomplish.. do you want to  have public inbound connections to connect to your local machine. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems you are applying the static nat for outside interface using a private ip block 172.18.x.x instead of a public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;usually:&lt;/P&gt;&lt;P&gt;static (inside,outside) publicIP localIP netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then your access list to permit inbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For outbound internet your static NAT which is your public IP should get you internet outbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Apr 2007 16:24:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/732999#M1007277</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2007-04-13T16:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733000#M1007280</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yea the firewall is natting to another private block which is our dmz...the router then nats it to a public ip with ip nat inside source list 1 pool public.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;List 1 includes both the static nat I created on the firewall and the pat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;really the only reason I want to do this is to tftp configs from the dmz equipment to my machine.  I got it working using a policy nat but I'm just wondering why the the static nat I set up earlier wasn't working properly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Apr 2007 17:42:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733000#M1007280</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-13T17:42:52Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733001#M1007282</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anybody shed some light on why that setup wasn't working?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 12:25:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733001#M1007282</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-16T12:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733002#M1007283</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's see if I understand the topology here.  You have an "internet router."  That nats a pool of addresses to one host.  That router connects the your PIX.  This PIX is generally configured for PAT on the outside interface of 172.18.10.39.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you add the static command, connectivity to the Internet from 10.14.2.39 should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But any other host inside that PIX going out to the WWW will not.  Always remember that a static command trumps a dynamic in ASA world.  It trumps any NAT rules in any ID number.  It also trumps NAT 0 rules IIRC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So what you need to do is do a Static PAT not Static NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is how it would look if 10.14.2.39 were  a Web server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.18.10.39 80 10.14.2.39 80.  Just pick one port though per Static PAT entry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Use this in conjuction with your existing dynamic PAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 15:14:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733002#M1007283</guid>
      <dc:creator>tcscadmin</dc:creator>
      <dc:date>2007-04-16T15:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733003#M1007285</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;right...here is the topology:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;insidenet - pix - dmz - router - internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But...I do have a pat already...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 172.18.10.100&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.14.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Everything works fine...however, when I add this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.18.10.39 10.14.2.39 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the other ip's still work obviously...but from 10.14.2.39 I can't access the internet anymore.  The router translates both 172.18.10.39 and 172.18.10.100 to our public internet IP, and I verified that it has the right translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did a ping test and I see the pings coming back in the logs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apr 13 2007 10:04:44: %PIX-6-302020: Built ICMP connection for faddr 72.14.207.99/0 gaddr 172.18.10.39/0 laddr 10.14.2.39/0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I noticed the port numbers are all 0's...when I do a ping test going over the pat it's right:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apr 16 2007 11:48:35: %PIX-6-302020: Built ICMP connection for faddr 64.233.167.&lt;/P&gt;&lt;P&gt;99/0 gaddr 172.18.10.100/5050 laddr 10.14.2.39/512&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the setup and the nat pool on the router the 172.18.10.39 nat should still work...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 16:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733003#M1007285</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-16T16:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733004#M1007289</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What logical network is configured in the DMZ network?  Where does 10.14.2.39 connect physically?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 16:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733004#M1007289</guid>
      <dc:creator>tcscadmin</dc:creator>
      <dc:date>2007-04-16T16:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733005#M1007291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;10.14.2.x/24 is internal and 172.18.10.x/24 is the DMZ&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 16:51:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733005#M1007291</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-16T16:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733006#M1007294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is 172.18.10.39 the outside interface of the PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, your problem is the Internet router thinks 172.18.10.100 is directly connected to itself in the DMZ.  It works in the firewall's case because the firewwall broadcasts the ARP reply for .39 but not for .100.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 16:55:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733006#M1007294</guid>
      <dc:creator>tcscadmin</dc:creator>
      <dc:date>2007-04-16T16:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733007#M1007296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No...the outside interface is actually 172.18.10.254&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 17:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733007#M1007296</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-16T17:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733008#M1007298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ip nat inside source list 1 pool public &lt;/P&gt;&lt;P&gt;access-list 1 permit 172.18.10.39&lt;/P&gt;&lt;P&gt;access-list 1 permit 172.18.10.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was staring me in the face.  Add 172.18.10.100 to this ACL on the Internet Router.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 17:09:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733008#M1007298</guid>
      <dc:creator>tcscadmin</dc:creator>
      <dc:date>2007-04-16T17:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: nat issues</title>
      <link>https://community.cisco.com/t5/network-security/nat-issues/m-p/733009#M1007301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yea it's already there...i didn't add it to the original post because it's already working, probably should have to be more clear. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But yea it's there, 172.18.10.100 and 172.18.10.39 and I verified that both get translated to the public IP with sh ip nat trans.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The weird thing is when I add the 172.18.10.39 static nat to the firewall (and lose internet access)...I can do a tcpdump on a spanned port and I see the icmp traffic coming back to my machine...but my machine shows it as timing out.  I guess I should try a to capture those packets on my machine to see what I'm getting.  But I'm not sure why I'm getting those /0's in the firewall logs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Apr 2007 17:19:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issues/m-p/733009#M1007301</guid>
      <dc:creator>niro</dc:creator>
      <dc:date>2007-04-16T17:19:49Z</dc:date>
    </item>
  </channel>
</rss>

