<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connection issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782860#M1020815</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX/ASA has an sql inspection engine to prevent attacks. If you want to use a different port, then change the port in the SQL server and then allow that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa72/configuration/guide/inspect.html#wp1347071" target="_blank"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa72/configuration/guide/inspect.html#wp1347071&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Aug 2007 19:19:33 GMT</pubDate>
    <dc:creator>rigoberto.cintron</dc:creator>
    <dc:date>2007-08-15T19:19:33Z</dc:date>
    <item>
      <title>Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782851#M1020806</link>
      <description>&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I recently made some changes on our firewall to use port redirection. Essentially, I wanted to use a different port for people on the outside to connect to my SQL server. Thanks to those that answered my post, everthing works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I noticed that if someone on the local network uses the server (the one the changes effect) to make a connection to the Internet, suddenly, no one one on the outside can connect to the machine. I have to clear the XLATE table before it accepts connections. (all other connections are fine)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I examined the xlate table and it appears that when an outbound connection is made, it uses one of my global addresses instead of the static address I setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've posted a partial config and xlate table for review.  If someone could let me know what I did wrong, I would appreciate it...Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq 7505 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq 7506 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq pcanywhere-data &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq 5632 &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host x.x.x.109 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 5632 192.168.0.109 5632 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 pcanywhere-data 192.168.0.109 pcanywhere-data netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 7505 192.168.0.109 1433 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 7506 192.168.0.109 1434 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 www 192.168.0.109 www netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (inside,outside) tcp x.x.x.109 https 192.168.0.109 https netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.0.109 x.x.x.109 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XLATE Connection (partial)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAT Global x.x.x.109(80) Local 192.168.0.109(80) &lt;/P&gt;&lt;P&gt;Global x.x.x.111 Local 192.168.0.109&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above global statement should use the same .109 address when a connection is made to the outside, but for some reason it grabs one of the addresses from my dynamic pool (it starts at 110).&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:58:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782851#M1020806</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2019-03-11T10:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782852#M1020807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure what the following statement is meant to achieve&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.0.109 192.168.0.109 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is 192.168.0.109 on the inside of the pix which it seems to be from the config ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 15:50:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782852#M1020807</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T15:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782853#M1020808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the 192.168.0.109 address is on the inside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Forgive my ignorance, but I though with static translations, I need to translate from the outside interface to the inside interface AND from the Inside interface to the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this not the case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want folks from the outside to translate to the 192.168.0.109 address and any connections that originate from the inside to use the x.x.x.109 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 16:05:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782853#M1020808</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T16:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782854#M1020809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No you don't need this statement. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.109 80 192.168.0.109 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the outside you can access the 192.168.0.109 server on port 80 by connecting to x.x.x.109 on port 80. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also translates the the 192.168.0.109 server to x.x.x.109 when it connects out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) syntax is usually used for translating source IP addresses. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 16:26:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782854#M1020809</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T16:26:54Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782855#M1020810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the info Jon.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed the statement as you suggested, cleared xlate, and tried my scenario.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, it still doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound connections are redirected to the correct port.  However, as soon as I start an outbound connection (browser to Internet) from the machine, it grabs an address from my global pool.  At that time, any future inbound connections are unsuccessful.  If I clear xlate, then things resume normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know with PAT, once I specifically redirect a port, I must use additional static statements for any other ports I want opened.  But what tells the PIX to use the address I defined when it is outbound?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I never had this problem until I started to redirect one port to another.  As you might guess, I had many individuals attempting logins on my SQL server with the standard port. Since I've redirected the ports, this has ended, yet I have this new problem...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 16:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782855#M1020810</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T16:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782856#M1020811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you are translating the x.x.x.109 address to 192.168.0.109 for all the ports so why not just have one static statement &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.109 192.168.0.109 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 16:53:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782856#M1020811</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T16:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782857#M1020812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And then restrict which ports you want open with ACL's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 17:17:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782857#M1020812</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-15T17:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782858#M1020813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did have it the way you suggested. The problem is that is I do as you suggest, and open the port for SQL (1433), everyone attempts to hack into my SQL database.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By using port redirection, 7505 ---&amp;gt; 1433, it makes it a little tougher for someone on the outside.  They don't know it is an SQL port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:10:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782858#M1020813</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T19:10:53Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782859#M1020814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is a better way to do this, then please let me know&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782859#M1020814</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T19:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782860#M1020815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The PIX/ASA has an sql inspection engine to prevent attacks. If you want to use a different port, then change the port in the SQL server and then allow that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/customer/docs/security/asa/asa72/configuration/guide/inspect.html#wp1347071" target="_blank"&gt;http://www.cisco.com/en/US/customer/docs/security/asa/asa72/configuration/guide/inspect.html#wp1347071&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782860#M1020815</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-15T19:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782861#M1020816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you are using a different port than the standard SQL port then who are your users ? How do you communciate to them that they have to connect to a different port ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is the any. Is this because your users can access the server from any IP address ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:38:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782861#M1020816</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T19:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782862#M1020817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My users are customers that hit the SQL server from a website we've developed. I can easily control what port they connect to, so for this reason, changing the port isn't an issue.  My main concern is the bozo's that find an open SQL port and attempt to access the SQL database through the standard SA, ADMIN, or Root accounts.  My logs show 5-6 attempts per second at guessing the password for these accounts.  We've hardened the system by disabling these common accounts, but I was hoping that redirecting the port would cure most of the attempts.  Once I added the static statement to change the port numbers, the entries in the log stopped. As I posted the issue is when I create an outgoing connection from the server.  All I have to do is open a browser and access a webpage, and it uses an address from the NAT pool instead of the static address I want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An option is to change the actual port that SQL operates on, but I was hoping I wouldn't have too.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:47:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782862#M1020817</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T19:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782863#M1020818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the users are coming from a website you have developed do you not know the source IP address that is making the query against your SQL server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it the customer IP addresses or does your web server make the request on their behalf ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782863#M1020818</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T19:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782864#M1020819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I stand corrected.  It is not a website, but software that is developed.  The source addresses will vary. Our developers can make the connection using any port.  By using a port other than 1433, and redirecting it, I minimize the attacks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 19:55:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782864#M1020819</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T19:55:27Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782865#M1020820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, just though it might be worth pursuing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can probably guess the answer &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; but i don't suppose you have any spare public IP addresses ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 20:00:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782865#M1020820</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T20:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782866#M1020821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What did you have in mind?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 20:01:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782866#M1020821</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-15T20:01:43Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782867#M1020822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually was about to edit last post saying scrap that. I just need to log on to a pix at work in our lab and test something. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Aug 2007 20:07:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782867#M1020822</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-15T20:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782868#M1020824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Scott &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After much messing around i managed to get some version of this working :). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup i had was &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server on inside of pix - 10.231.224.50 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 10.15.1.10 5000 10.231.224.50 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to connect to the web service on 10.231.224.50 user would use url &lt;A class="jive-link-custom" href="http://10.15.1.10:5000" target="_blank"&gt;http://10.15.1.10:5000&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also had nat and global setup for hosts to get out to Internet ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 &lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The outside interface address was 10.15.1.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found with this setup i could connect from the 10.231.224.50 server to a router on the outside with telnet and it created this dynamic translation &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAT Global 10.15.1.2(1031) Local 10.231.224.50(41347)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this translation in the xlate table i then tried to connect from outside on port 5000 to 10.15.1.10 and it worked fine. It added the following to the xlate table&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAT Global 10.15.1.10(5000) Local 10.231.224.50(80)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both the xlate entries exist at the same time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was all tested on v6.3 and it needs a bit more testing as it does not exactly match your test case and you would need a spare public IP address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i get time i will do some more testing but unfortunately i have a day job &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; so i thought i'd let you know where i was in case you want to test it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 07:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782868#M1020824</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-16T07:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782869#M1020825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delay in getting back. I had to be out of the office yesterday. I appreciate the testing you did. I will take a deeper look at it and see where I go. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I may end up calling Cisco on this one.  If I do, I will let you know what I find out.&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 12:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782869#M1020825</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-17T12:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Connection issue</title>
      <link>https://community.cisco.com/t5/network-security/connection-issue/m-p/782870#M1020826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's what I found of from Cisco...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT where we mapped one IP to another. ie. x.x.x.109 -&amp;gt; 192.168.0.109 is bidirectional.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static PAT (port redirection) is unidirectional and only works for outside to inside connections.  Connections initiated from the inside will either use an address from my dynamic pool, or the address of the outside interface of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To force it to use the address that I want, I had to create another dynamic pool (containing 1 address), and use a nat statement to tell it to use it.  So, all I had to do was add the following statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 2 x.x.x.109&lt;/P&gt;&lt;P&gt;nat (inside) 2 192.168.0.109 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I did this, it works fine.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for all of your help. I appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 14:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connection-issue/m-p/782870#M1020826</guid>
      <dc:creator>sgoethals1</dc:creator>
      <dc:date>2007-08-17T14:03:51Z</dc:date>
    </item>
  </channel>
</rss>

