<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620527#M1034717</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an situation with Policy NAT.  I need to configure such that&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;1.  client (outside) from 192.168.28.0 255.255.255.0 to global addr 10.1.1.1 will be translated to inside 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. client (outside) from 192.168.30.0 255.255.255.0 to global addr 10.1.1.1 will be translated to inside 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to use the following config but was reject but the PIX (7.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix(config) access-list NET1 permit ip host 172.16.1.1 192.168.28.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pix(config) access-list NET1 permit ip host 172.16.1.2 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.1 access-list NET1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the error I received was:&lt;/P&gt;&lt;P&gt;ERROR: access-list used in static has different local addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone can advise if this config is possible?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:11:00 GMT</pubDate>
    <dc:creator>samuel_yip</dc:creator>
    <dc:date>2019-03-11T09:11:00Z</dc:date>
    <item>
      <title>Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620527#M1034717</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an situation with Policy NAT.  I need to configure such that&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;1.  client (outside) from 192.168.28.0 255.255.255.0 to global addr 10.1.1.1 will be translated to inside 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. client (outside) from 192.168.30.0 255.255.255.0 to global addr 10.1.1.1 will be translated to inside 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to use the following config but was reject but the PIX (7.2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pix(config) access-list NET1 permit ip host 172.16.1.1 192.168.28.0 255.255.255.0&lt;/P&gt;&lt;P&gt;pix(config) access-list NET1 permit ip host 172.16.1.2 192.168.30.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.1 access-list NET1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the error I received was:&lt;/P&gt;&lt;P&gt;ERROR: access-list used in static has different local addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone can advise if this config is possible?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:11:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620527#M1034717</guid>
      <dc:creator>samuel_yip</dc:creator>
      <dc:date>2019-03-11T09:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620528#M1034718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Im not 100% sure about this, but if your natting from the outside in shouldn't your static command be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(outside,inside) 10.1.1.1 access-list NET1 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static command has to be done in order of "pre nat" interface then "post nat" interface, this may not necessarily be inside then outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2006 10:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620528#M1034718</guid>
      <dc:creator>cbeswick</dc:creator>
      <dc:date>2006-12-19T10:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620529#M1034719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think nothing wrong with the natting.&lt;/P&gt;&lt;P&gt;Pls check out &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_2/conf_gd/firewall/cfgnat.htm#wp1042553" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_2/conf_gd/firewall/cfgnat.htm#wp1042553&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under the Policy static nat, you will find the config similar to what I have configured.  But I need more than to create an addition static entry for another inside host.   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Dec 2006 12:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620529#M1034719</guid>
      <dc:creator>samuel_yip</dc:creator>
      <dc:date>2006-12-19T12:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620530#M1034720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello CCIE, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your issue is that statics are set up as followed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real interface, mapped interface) mapped IP address, real ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using an access list, it goes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real interface, mapped interface) mapped IP address, access-list defining real ip address traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your case, you access-list would be incorrect:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NET1 permit ip 192.168.28.0 255.255.255.0 host 10.1.1.1&lt;/P&gt;&lt;P&gt;access-list NET2 permit ip 192.168.30.0 255.255.255.0 host 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which defines the real traffic (access-list is evaluated first before nat)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As well as your static being backwards:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real, mapped) mapped real&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 172.16.1.1 access-list NET1&lt;/P&gt;&lt;P&gt;static (outside,inside) 172.16.1.2 access-list NET2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;because technically, the 'mapped' ip address is on the inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Assuming that your statements number 1 and 2 above, are correct, as summarized below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.28.0/24 going to 10.1.1.1 --&amp;gt; src address of 192.168.28.0/24 gets translated to 172.16.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.30.0/24 going to 10.1.1.1 --&amp;gt; src address of 192.168.30.0/24 gets translated to 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Giving cbeswick some points, because he was technically correct, your static statement was backwards from what you stated your requirements were in 1. and 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As always, do a 'clear xlate' after making nat changes so that they can be rebuilt properly&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Jason&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate this message if it solved some or all of your issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2006 03:22:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620530#M1034720</guid>
      <dc:creator>jgervia_2</dc:creator>
      <dc:date>2006-12-20T03:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620531#M1034721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jason,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not understand my requirement.  If is so simple, I will not need to post it.  I don't get CCIE for nothing.  Btw, I prefer u address me as Samuel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to translated the destination address when clients source from 192.168.28.0/24 access global addr 10.1.1.1, which means 10.1.1.1 will be translated to 172.16.1.1  and not the client ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I need to translate the source, nat outside or static outside will have serve my purpose.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if you misunderstand my requirement, no points for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for putting in the efforts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rdgs&lt;/P&gt;&lt;P&gt;Samuel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2006 06:21:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620531#M1034721</guid>
      <dc:creator>samuel_yip</dc:creator>
      <dc:date>2006-12-20T06:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/620532#M1034722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Samuel,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  It seems like others are on the right track, but that we aren't fully understanding what you really need to accomplish here.  I might not be understanding it either, but I'm going to give it a shot anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  Traffic is initiated from the outside subnets of 192.168.28.0 and 192.168.30.0.  These are the source IP's and you do not need to do any source NAT.  Correct so far?  You do need to translate both destinations 172.16.1.1 and 172.16.1.2 to the same global address of 10.1.1.1, according to how it matches the access-list.  If I'm still correct, the problem with this is going to be if traffic from the 192.168.28.0 and 192.168.30.0 both try to establish connections at the same time, I believe only one of the static translations will be built.  The configuration you have going so far is for policy static NAT, not policy static PAT.  This is what I think the commands should be so far,&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.1 access-l NET1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-l NET1 permit ip 192.168.28.0 255.255.255.0 host 172.16.1.1&lt;/P&gt;&lt;P&gt;access-l NET1 permit ip 192.168.30.0 255.255.255.0 host 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I don't think this will work for simultaneous inbound connections, the PIX will build the first translation that matches the access-list and 10.1.1.1 will be persistently translated to only 1 internal IP until the translation is torn down.   Using static PAT in your configuration will allow the single global to map to the different internals, but then you won?t be able to define a policy to match.  Will the inbound connections for 172.16.1.1 and 172.16.1.2 being using the same service ports?  If not, they you could go back to the simpler configuration of something like this to make it use the PAT translation and utilize access-list to control the access.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 10.1.1.1 www 172.16.1.1 www&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 10.1.1.1 https 172.16.1.2 https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really don't think this was your goal, but it's the only way I could image it might work.  If I?m wrong here and someone finds a config that will make this work, with policy nat, it will interesting to learn about.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 20 Dec 2006 15:16:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/620532#M1034722</guid>
      <dc:creator>john.stephens</dc:creator>
      <dc:date>2006-12-20T15:16:22Z</dc:date>
    </item>
  </channel>
</rss>

