<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Issue on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683403#M1034917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  in tat case you need to use another static as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) x.x.x.x y.y.y.y netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where x.x.x.x is the IP address which will be seen on the inside network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and y.y.y.y is the real IP address of the server on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access-list applied to the inside interface needs to allow that access as &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host x.x.x.x eq &lt;PORT number=""&gt;&lt;/PORT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also access list applied to the DMZ interface need to allow the access to the inside hosts ( real IP addresses or NATed if you are using it )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 18 Dec 2006 01:22:02 GMT</pubDate>
    <dc:creator>Fernando_Meza</dc:creator>
    <dc:date>2006-12-18T01:22:02Z</dc:date>
    <item>
      <title>NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683394#M1034907</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have three devices, 2 on the Inside network and 1 on the DMZ that need to talk to each other for server replication. I tried creating a NAT pool and a static translation for bi-directional traffic but I could not get it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My config was as follows;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (dmz) 1 10.1.0.190-10.1.0.200 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;global (dmz) 1 10.1.0.201 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 10.1.0.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.0.27 10.0.0.209 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.1.0.27 was the address of the server on the DMZ&lt;/P&gt;&lt;P&gt;10.0.0.209 was the free address on the Inside that I wanted the DMZ server translated to&lt;/P&gt;&lt;P&gt;10.0.0.52 was the address of the server on the Inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It did work however, when I used the following command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be great in troubleshooting this problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS - ACLs wernt the issue as I put in a permit any any on both interfaces to rule it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683394#M1034907</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2019-03-11T09:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683395#M1034908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The "static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.255.255.0" line was correct. That's why it allows DMZ to access Inside successfully.&lt;/P&gt;&lt;P&gt;Basically, you mapped and allow the two segments to access each other freely using respective original IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use this method, but apply access-list (ACL) on both inside and DMZ interfaces to restrict access from unwanted devices on each side from flowing across. Allow only specific IP/host via specific tcp/udp port(s).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Add/create new ACL and bind them to Inside and DMZ interfaces. Example here is to allow TCP/FTP services. Change according to your desired tcp/udp port:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. For inside interface/segment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-access-out permit icmp any any --&amp;gt; for testing purposes only. Use this to test inside-DMZ server communication. Remove after used.&lt;/P&gt;&lt;P&gt;access-list inside-access-out permit tcp host 10.0.0.52 host 10.1.0.27 eq 21 --&amp;gt; permit only 10.0.0.52 to access DMZ's 10.1.0.27&lt;/P&gt;&lt;P&gt;access-list inside-access-out deny ip any 10.1.0.0 255.255.255.0 --&amp;gt; deny other inside's hosts to access DMZ network/segment&lt;/P&gt;&lt;P&gt;access-list inside-access-out permit ip any any --&amp;gt; permit all inside hosts to access internet/other segment (if any)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group inside-access-out in interface inside --&amp;gt; bind acl to inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. For DMZ interface/segment:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ-access-out permit icmp any any --&amp;gt; for testing purposes only. Use this to test DMZ-inside server communication. Remove after used.&lt;/P&gt;&lt;P&gt;access-list DMZ-access-out permit tcp host 10.1.0.27 host 10.0.0.52 eq 21 --&amp;gt; permit DMZ's 10.1.0.27 to access inside's 10.0.0.52&lt;/P&gt;&lt;P&gt;access-list DMZ-access-out deny ip any 10.0.0.0 255.255.255.0 --&amp;gt; deny other DMZ's hosts to access inside network/segment&lt;/P&gt;&lt;P&gt;access-list DMZ-access-out permit ip any any --&amp;gt; permit all DMZ hosts to access internet/other segment (if any)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ-access-out in interface inside --&amp;gt; bind acl to DMZ interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise, use the previous config line with condition you change the IP of 10.1.0.27 to another unused/free IP. It was not working mainly because the IP that you used here has already been assigned to your server, and you are supposed (must) to use any unassigned IP to make it work. The rule is, used any free IP for the static mapping. Exammple:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Original config line: static (inside,dmz) 10.1.0.27 10.0.0.209 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;New: static (inside,dmz) 10.1.0.100 10.0.0.209 netmask 255.255.255.255 0 0  ----&amp;gt; assuming 10.1.0.100 is free/unused IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will allow your 10.1.0.27 to access inside server running on 10.0.0.209 using virtual IP of 10.1.0.100. Logically, both 10.1.0.27 and 10.1.0.100 will looks like sitting in the same segment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 09:50:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683395#M1034908</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-11T09:50:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683396#M1034909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I just comfirm that in your example, both addresses in the static command should be free addresses? For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) (free DMZ address) (free inside address) netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 10:11:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683396#M1034909</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-11T10:11:19Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683397#M1034910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would the following configuration work (bi-directional NAT)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,dmz) 10.1.0.100 10.0.0.27 ? (10.1.0.100 must be free or replaced with a free address on DMZ LAN range)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (dmz,inside) 10.0.0.100 10.1.0.52 ? (10.0.0.100 must be free or replaced with a free address on inside LAN range)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 11:40:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683397#M1034910</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-11T11:40:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683398#M1034911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;let me see if I get you right, you have a server on the inside (lets assume its ip address 10.10.1.1) and a server on the DMZ (10.10.2.1) and these two servers need to talk to each other, is that correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if so you can do it using a static command only and access list on the DMZ and the inside interfaces&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.10.2.2 10.10.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**10.10.2.2 is a free ip address on the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz-inside permit ip 10.10.2.1 10.10.2.2&lt;/P&gt;&lt;P&gt;access-group dmz-inside in interface dmz&lt;/P&gt;&lt;P&gt;and if you have an access-list on the inside interface you need to open a rule to permit traffic (do nothing if you don't have an access-list applied to the inside interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inside-dmz permit ip 10.10.1.1 10.10.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope that this helps &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Shadi`&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 18:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683398#M1034911</guid>
      <dc:creator>shomar</dc:creator>
      <dc:date>2006-12-11T18:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683399#M1034913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Q: Would the following configuration work (bi-directional NAT)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (inside,dmz) 10.1.0.100 10.0.0.27 ? (10.1.0.100 must be free or replaced with a free address on DMZ LAN range) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static (dmz,inside) 10.0.0.100 10.1.0.52 ? (10.0.0.100 must be free or replaced with a free address on inside LAN range) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A: No, the 2nd static config line is sufficient. Ignore the 1st line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "static (inside,dmz) &lt;INSIDE_SEGMENT&gt; &lt;INSIDE_SEGMENT&gt; netmask 255.255.255.0" means you are allowing inside segment to access DMZ via original IP, as well as permitting the whole DMZ segment to access inside via their original IP.&lt;/INSIDE_SEGMENT&gt;&lt;/INSIDE_SEGMENT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You only need both your static commands if you assigned them with same security level, and wanted to allow bi-directional traffic. The condition is you need to configure access between same security level interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_command_reference_chapter09186a00805fb9eb.html#wp1250643" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_command_reference_chapter09186a00805fb9eb.html#wp1250643&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;AK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 22:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683399#M1034913</guid>
      <dc:creator>a.kiprawih</dc:creator>
      <dc:date>2006-12-11T22:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683400#M1034914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  the most common way of configuring this type of access is by a static NAT and appropriate entries on the access control lists.  You don't need anything else .. so  if you want the inside host to appear as is on the DMZ side then  you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.52 10.0.0.52 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_Inside  extended permit ip host 10.1.0.27 host 10.0.0.52&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_Inside in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need the inside host to appear as 10.1.0.X on the dmz segment the you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.0.X 10.0.0.52 netmask 255.255.255.255  where X is an available address on the dmz segment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list DMZ_Inside  extended permit ip host 10.1.0.27 host 10.1.0.X&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group DMZ_Inside in interface dmz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate if it it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Dec 2006 23:36:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683400#M1034914</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-12-11T23:36:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683401#M1034915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I still dont understand how I get the DMZ to talk back to the Inside host though?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what you have put, I think that takes care of the Inside to DMZ translation, but I need both devices to be able to initiate comms so need the translation to go both ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it seems that the two examples above both work for the Inside appearing on the DMZ, but not the DMZ address translating to an Inside address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Dec 2006 12:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683401#M1034915</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-12T12:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683402#M1034916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks very much for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I just confirm that for traffic initiated from the inside server, do I need to configure a NAT and Global command so that the Inside server can NAT to "an address" on the DMZ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From my understanding, the command you entered was only for the DMZ server translating to an Inside address and not the other way around?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I right in what I am saying?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Dec 2006 12:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683402#M1034916</guid>
      <dc:creator>daniel.bowen</dc:creator>
      <dc:date>2006-12-12T12:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Issue on PIX</title>
      <link>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683403#M1034917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..  in tat case you need to use another static as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) x.x.x.x y.y.y.y netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where x.x.x.x is the IP address which will be seen on the inside network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and y.y.y.y is the real IP address of the server on the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The access-list applied to the inside interface needs to allow that access as &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp any host x.x.x.x eq &lt;PORT number=""&gt;&lt;/PORT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also access list applied to the DMZ interface need to allow the access to the inside hosts ( real IP addresses or NATed if you are using it )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Dec 2006 01:22:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-issue-on-pix/m-p/683403#M1034917</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-12-18T01:22:02Z</dc:date>
    </item>
  </channel>
</rss>

