<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic natting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/natting/m-p/707037#M1027570</link>
    <description>&lt;P&gt;i have configured on my pix a static which will allow our partnet to access our network through the vpn tunnel like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 420 192.168.1.1 420 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now he can access our network without any problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question is, that is there a possibility that i can further nat 1.1.1.1 after coming inside to one specific ip address and provide access to one server e.g nat 1.1.1.1 to 192.168.1.50. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i believe it should be possible. &lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:25:53 GMT</pubDate>
    <dc:creator>zulqurnain</dc:creator>
    <dc:date>2019-03-11T09:25:53Z</dc:date>
    <item>
      <title>natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707037#M1027570</link>
      <description>&lt;P&gt;i have configured on my pix a static which will allow our partnet to access our network through the vpn tunnel like below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 420 192.168.1.1 420 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now he can access our network without any problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question is, that is there a possibility that i can further nat 1.1.1.1 after coming inside to one specific ip address and provide access to one server e.g nat 1.1.1.1 to 192.168.1.50. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i believe it should be possible. &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:25:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707037#M1027570</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2019-03-11T09:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707038#M1027571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes. Port forwarding is possible.You can do so, as long as the ports are different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;in your example you are redirecting the traffic to port 420 on 1.1.1.1 to 192.168.1.1 on port 420.&lt;/P&gt;&lt;P&gt;If you want to nat a inside http server , you can do so by&lt;/P&gt;&lt;P&gt;redirecting the traffic to port 80 on 1.1.1.1 to 192.168.1.x on port 80.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 80 192.168.1.x 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 06:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707038#M1027571</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-30T06:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707039#M1027572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so what i understood is that as long as port forwarding is there, i can do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but what if there is no port forwarding then what is the possibility e.g&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;partner is connecting to 1.1.1.1 420&lt;/P&gt;&lt;P&gt;accessing to 192.168.1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for above i have this entry present in pix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 420 192.168.1.1 420 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;need to nat 1.1.1.1 on same port 420&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope it's clear&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 07:14:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707039#M1027572</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-01-30T07:14:15Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707040#M1027573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No, that wont be possible.&lt;/P&gt;&lt;P&gt;You can have one association with one combination of the natip,port to a inside host inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 07:17:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707040#M1027573</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-30T07:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707041#M1027574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;but what about Outside NAT. won't it be possible using it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 08:13:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707041#M1027574</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-01-30T08:13:26Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707042#M1027575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Let me know exactly what you are trying to achieve.&lt;/P&gt;&lt;P&gt;Whatever is the scenario, as stated earlier, you can only have one combination of a natip, port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 09:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707042#M1027575</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-30T09:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707043#M1027576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as i explained in my first post&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want to nat 1.1.1.1 IP address to 192.168.1.any .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am attaching the diagram for more explanation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 10:21:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707043#M1027576</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-01-30T10:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707044#M1027579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As stated earlier, when you have used the outside ip to static nat and forward a particular port,&lt;/P&gt;&lt;P&gt;you can further use the same outside to redirect other ports to your inside hosts/server.&lt;/P&gt;&lt;P&gt;However i dont think you can use that outside ip to do a one to one NAT to another inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 420 192.168.1.1 420 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can have,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 80 192.168.1.2 80 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;But not,&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 192.168.1.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 10:39:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707044#M1027579</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-30T10:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707045#M1027581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank VJ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got your point, but still i think my question is not clear enough. anyways here is another try to it, as you can see in the diagram i ve attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the server tries to establish session to 192.168.1.1 using faked IP e.g. 10.10.10.10, coming through the vpn tunnel on PIX. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then pix should further translates his IP i.e 10.10.10.10 to e.g. IP 45.54.45.54 and then it should connect to Host IP 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And when 192.168.1.1 reply back to 1.1.1.1 the PIX should change translate back 45.54.45.54 to 10.10.10.10 which 1.1.1.1 actually tried connecting to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it's clear enough.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 12:19:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707045#M1027581</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-01-30T12:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707046#M1027584</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry...Im totally lost here on understanding your requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To make this easy for me, Kindly explain me again with your diagram/ip addresses mentioned on the diagram along with your existing configuration in PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-VJ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 12:27:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707046#M1027584</guid>
      <dc:creator>vijayasankar</dc:creator>
      <dc:date>2007-01-30T12:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: natting</title>
      <link>https://community.cisco.com/t5/network-security/natting/m-p/707047#M1027585</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;VJ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All i want to do is that PIX should allow Host-A to connect, then PIX should change the Host-A Source from 1.1.1.1 to 10.10.10.10 and should tell Host-A to connect to Host-B (192.168.1.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the same should happen when Host-B reply, Then PIX should change back 10.10.10.10 to 1.1.1.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, Traffic coming to the PIX through this tunnel from Host-A, PIX should change the source to 10.10.10.10 and should tell Host-A how to connect to Host-B as 10.10.10.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope anyone can solve this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Jan 2007 17:58:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting/m-p/707047#M1027585</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2007-01-30T17:58:10Z</dc:date>
    </item>
  </channel>
</rss>

