<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble with NAT/Policy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/trouble-with-nat-policy/m-p/639375#M1028712</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your configuration seems ok, but i would try to create an access-list for the traffic from the DMZ-network and attach this access-list to an access-group like you have done with the outside access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, please check the log. You should see the error quite clearly there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Jan 2007 08:57:26 GMT</pubDate>
    <dc:creator>thult</dc:creator>
    <dc:date>2007-01-19T08:57:26Z</dc:date>
    <item>
      <title>Trouble with NAT/Policy</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-policy/m-p/639374#M1028711</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I was wondering if someone can lend a hand and look over this config for me.  &lt;/P&gt;&lt;P&gt;The config below appears to work fine, inside network is able to get out to the internet, outside users are able to get to the website hosted in the dmz and internally.  &lt;/P&gt;&lt;P&gt;The problem is that the servers with a static NAT translation are unable to get out to the internet(10.0.0.105, 192.168.0.106, 192.168.107). If I removed the static NAT translation than they can get internet access, but then outside can't access the websites.   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2) &lt;/P&gt;&lt;P&gt;hostname FIREWALL&lt;/P&gt;&lt;P&gt;name 10.0.0.105 SYSLOG&lt;/P&gt;&lt;P&gt;name 70.x.x.97 INTERNET&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 70.x.x.98 255.255.255.240 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.0.0.1 255.255.252.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet2&lt;/P&gt;&lt;P&gt; speed 100&lt;/P&gt;&lt;P&gt; duplex full&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;dns server-group DefaultDNS&lt;/P&gt;&lt;P&gt; domain-name domain.NET&lt;/P&gt;&lt;P&gt;access-list NONAT extended permit ip 10.0.0.0 255.255.252.0 10.1.0.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list DMZ_NONAT extended permit ip 192.168.0.0 255.255.255.0 10.1.0.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL_LIST standard permit 10.0.0.0 255.255.252.0 &lt;/P&gt;&lt;P&gt;access-list SPLIT_TUNNEL_LIST standard permit 192.168.0.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.x.x.106 eq ftp &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.x.x.105 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.x.x.106 eq www &lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 70.x.x.107 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool VPN_POOL 10.1.0.10-10.1.0.254&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;asdm image flash:/asdm-522.bin&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 70.x.x.100-70.x.x.101&lt;/P&gt;&lt;P&gt;global (outside) 1 70.x.x.102&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NONAT&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list DMZ_NONAT&lt;/P&gt;&lt;P&gt;nat (dmz) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (dmz,outside) 70.x.x.106 192.168.0.106 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside) 70.x.x.105 SYSLOG netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (dmz,outside) 70.x.x.107 192.168.0.107 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 INTERNET 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group-policy REMOTE_VPN_GP internal&lt;/P&gt;&lt;P&gt;group-policy REMOTE_VPN_GP attributes&lt;/P&gt;&lt;P&gt; dns-server value 10.0.0.100 10.0.0.101&lt;/P&gt;&lt;P&gt; vpn-tunnel-protocol IPSec &lt;/P&gt;&lt;P&gt; split-tunnel-policy tunnelspecified&lt;/P&gt;&lt;P&gt; split-tunnel-network-list value SPLIT_TUNNEL_LIST&lt;/P&gt;&lt;P&gt; default-domain value domain.net&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set STRONGER esp-aes esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set STRONG esp-3des esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto ipsec transform-set STRONGEST esp-aes-256 esp-sha-hmac &lt;/P&gt;&lt;P&gt;crypto dynamic-map CLIENT_MAP 1 set transform-set STRONGEST STRONGER STRONG&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 50 set pfs &lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 50 set transform-set STRONGEST STRONGER STRONG&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP 65535 ipsec-isakmp dynamic CLIENT_MAP&lt;/P&gt;&lt;P&gt;crypto map VPN_MAP interface outside&lt;/P&gt;&lt;P&gt;crypto isakmp enable outside&lt;/P&gt;&lt;P&gt;crypto isakmp policy 150&lt;/P&gt;&lt;P&gt; authentication pre-share&lt;/P&gt;&lt;P&gt; encryption aes&lt;/P&gt;&lt;P&gt; hash sha&lt;/P&gt;&lt;P&gt; group 2&lt;/P&gt;&lt;P&gt; lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group REMOTE_VPN type ipsec-ra&lt;/P&gt;&lt;P&gt;tunnel-group REMOTE_VPN general-attributes&lt;/P&gt;&lt;P&gt; address-pool VPN_POOL&lt;/P&gt;&lt;P&gt; default-group-policy REMOTE_VPN_GP&lt;/P&gt;&lt;P&gt;tunnel-group REMOTE_VPN ipsec-attributes&lt;/P&gt;&lt;P&gt; pre-shared-key *&lt;/P&gt;&lt;P&gt; isakmp keepalive threshold 30 retry 5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map type inspect dns preset_dns_map&lt;/P&gt;&lt;P&gt; parameters&lt;/P&gt;&lt;P&gt;  message-length maximum 512&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns preset_dns_map &lt;/P&gt;&lt;P&gt;  inspect h323 h225 &lt;/P&gt;&lt;P&gt;  inspect h323 ras &lt;/P&gt;&lt;P&gt;  inspect rsh &lt;/P&gt;&lt;P&gt;  inspect rtsp &lt;/P&gt;&lt;P&gt;  inspect esmtp &lt;/P&gt;&lt;P&gt;  inspect sqlnet &lt;/P&gt;&lt;P&gt;  inspect skinny &lt;/P&gt;&lt;P&gt;  inspect sunrpc &lt;/P&gt;&lt;P&gt;  inspect xdmcp &lt;/P&gt;&lt;P&gt;  inspect sip &lt;/P&gt;&lt;P&gt;  inspect netbios &lt;/P&gt;&lt;P&gt;  inspect tftp &lt;/P&gt;&lt;P&gt;  inspect ftp &lt;/P&gt;&lt;P&gt;  inspect icmp &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:20:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-policy/m-p/639374#M1028711</guid>
      <dc:creator>danielkaiser</dc:creator>
      <dc:date>2019-03-11T09:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with NAT/Policy</title>
      <link>https://community.cisco.com/t5/network-security/trouble-with-nat-policy/m-p/639375#M1028712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your configuration seems ok, but i would try to create an access-list for the traffic from the DMZ-network and attach this access-list to an access-group like you have done with the outside access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, please check the log. You should see the error quite clearly there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2007 08:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/trouble-with-nat-policy/m-p/639375#M1028712</guid>
      <dc:creator>thult</dc:creator>
      <dc:date>2007-01-19T08:57:26Z</dc:date>
    </item>
  </channel>
</rss>

