<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Destination NAT based on source IP? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783283#M1008321</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, great.  But I'm still confused on the syntax Here's what I have so far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list host1 permit tcp host 10.1.1.1 host 172.16.0.1 eq 80&lt;/P&gt;&lt;P&gt;access-list host2 permit tcp host 10.1.1.2 host 172.16.0.1 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list host1 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list host2 outside&lt;/P&gt;&lt;P&gt;global (inside) 2 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, I don't think the static command will let you map the same IP twice:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 80 192.168.1.1 80&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 80 192.168.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help is greatly appreciated,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Apr 2007 14:02:48 GMT</pubDate>
    <dc:creator>dan.shalinsky</dc:creator>
    <dc:date>2007-04-04T14:02:48Z</dc:date>
    <item>
      <title>Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783279#M1008316</link>
      <description>&lt;P&gt;Is it possible to NAT to 1 of 2 different inside destination IP's based solely on the external source IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is something similar described but it doesn't work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list WEB permit tcp host 10.1.2.1 209.165.201.11 255.255.255.255 eq 80&lt;/P&gt;&lt;P&gt;access-list TELNET permit tcp host 10.1.3.1 209.165.201.11 255.255.255.255 eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list WEB outside&lt;/P&gt;&lt;P&gt;global (inside) 1 209.165.202.129&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list TELNET outside&lt;/P&gt;&lt;P&gt;global (inside) 2 209.165.202.130&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:55:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783279#M1008316</guid>
      <dc:creator>dan.shalinsky</dc:creator>
      <dc:date>2019-03-11T09:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783280#M1008318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your question isn't totally clear.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config above is accurate (assuming you know what it is doing).  You are missing the translation for the internal host you are attempting to access.  (ie:  static (inside,outside) 209.165.201.11 &lt;INSIDE_IP&gt; ...)  However, I can't add much more without more specifics, and things like the version you are running, etc.. as there are a lot of other variables involved.&lt;/INSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 02:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783280#M1008318</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-04T02:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783281#M1008319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's a better description of my scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two outside source IPs:  10.1.1.1 and 10.1.1.2&lt;/P&gt;&lt;P&gt;Both connecting to 172.16.0.1 on port 80&lt;/P&gt;&lt;P&gt;If 10.1.1.1 connects to 172.16.0.1 on port 80, NAT to inside IP 192.168.1.1 port 80.&lt;/P&gt;&lt;P&gt;If 10.1.1.2 connects to 172.16.0.1 on port 80, NAT to inside IP 192.168.2.2 port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It makes sense that this requires a corresponding static entry as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 13:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783281#M1008319</guid>
      <dc:creator>dan.shalinsky</dc:creator>
      <dc:date>2007-04-04T13:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783282#M1008320</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then ok that will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 13:46:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783282#M1008320</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-04T13:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783283#M1008321</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, great.  But I'm still confused on the syntax Here's what I have so far:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list host1 permit tcp host 10.1.1.1 host 172.16.0.1 eq 80&lt;/P&gt;&lt;P&gt;access-list host2 permit tcp host 10.1.1.2 host 172.16.0.1 eq 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 access-list host1 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list host2 outside&lt;/P&gt;&lt;P&gt;global (inside) 2 192.168.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, I don't think the static command will let you map the same IP twice:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 80 192.168.1.1 80&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 80 192.168.2.2 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your help is greatly appreciated,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 14:02:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783283#M1008321</guid>
      <dc:creator>dan.shalinsky</dc:creator>
      <dc:date>2007-04-04T14:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783284#M1008322</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Think of NATing in 2 parts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) Internal device's source IP being NATed when it accesses devices on the outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) External device's source IP being NATed when it access devices on the inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the config you have been focusing on, that covers (b).  Whereby you are policy-nating the source IP of the hosts on the outside (10.1.1.1 and 10.1.1.2) when they attempt to access 172.16.0.1 on the inside.  Each outside host will be translated to a different inside IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the case of (a) you just need a single static, as both outside hosts are accessing the same server.  (right?)   If that server's IP address is not being translated, then the command would just be:&lt;/P&gt;&lt;P&gt;  static (inside,outside) 172.16.0.1 172.16.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;That statement just tells the PIX to translate the source (172.16.0.1) to itself when it goes from inside -&amp;gt; outside.  It also tells external devices that if they connect to destination address 172.16.0.1, then the address would be translated to itself on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, (hopefully this won't complicate things more) if you _additionally_ wanted the two external hosts to go to the same global address, but that global address would be translated to two different internal addresses, then that would also be possible, but a bit more complicated &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS&amp;gt; Please don't forget to check the solution off if it solves your problem so we can cross it off the list.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 16:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783284#M1008322</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-04T16:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783285#M1008326</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry, I think I still wasn't clear on my scenario.  I want to redirect to one of two different inside servers but based on which source IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two outside source IPs: 10.1.1.1 and 10.1.1.2&lt;/P&gt;&lt;P&gt;Both connecting to 172.16.0.1 on port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 10.1.1.1 connects to 172.16.0.1 on port 80, redirect to inside server 192.168.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If 10.1.1.2 connects to 172.16.0.1 on port 80, redirect to inside server 192.168.2.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the midunderstanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 17:04:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783285#M1008326</guid>
      <dc:creator>dan.shalinsky</dc:creator>
      <dc:date>2007-04-04T17:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783286#M1008329</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here we need static port redirection which is only unidirectional , however you CANNOT nat 172.16.0.1 on port 80 to two different servers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;though this can be done...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 80 192.168.1.1 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 172.16.0.1 8080 192.168.2.2 8080&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2007 17:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783286#M1008329</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2007-04-04T17:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783287#M1008332</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, we don't have a way to achieve that currently.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 00:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783287#M1008332</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-05T00:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT based on source IP?</title>
      <link>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783288#M1008334</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One final follow-up to this conversation (just for completeness).  If you happened to use policy-nat, please note that it does not support using ports in the ACL.  The ACL must only contain IPs/networks and no ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for not mentioning that sooner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Apr 2007 03:10:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/destination-nat-based-on-source-ip/m-p/783288#M1008334</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-04-05T03:10:42Z</dc:date>
    </item>
  </channel>
</rss>

