<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX525 - Policy NAT, problem with two outside interfaces in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616635#M1036293</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do u solved it already? ive got a similar problem.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc25a46" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc25a46&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 14 Nov 2008 10:46:22 GMT</pubDate>
    <dc:creator>p.schmidt</dc:creator>
    <dc:date>2008-11-14T10:46:22Z</dc:date>
    <item>
      <title>PIX525 - Policy NAT, problem with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616631#M1036289</link>
      <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PIX with two virtual outside, inside and dmz interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside 1: outside-205 - 195.1.1.10/24&lt;/P&gt;&lt;P&gt;Outside 2: outside-500 - 220.2.2.20/24&lt;/P&gt;&lt;P&gt;inside - 192.168.3.0/24&lt;/P&gt;&lt;P&gt;dmz - 192.168.4.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My task is to translate inside hosts to 195.1.1.10 and dmz hosts - to 220.2.2.20 (using PAT).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside hosts are translated correctly, but dmz translation fails with error &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX-3-305006: portmap translation creation failed for icmp src dmz:192.168.4.x dst outside-205:x.x.x.x (type 8, code 0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is my configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; === 8&amp;lt; ===&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 7.2(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0.10&lt;/P&gt;&lt;P&gt; vlan 205&lt;/P&gt;&lt;P&gt; nameif outside-205&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 195.1.1.10 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0.500&lt;/P&gt;&lt;P&gt; vlan 500&lt;/P&gt;&lt;P&gt; nameif outside-500&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 220.2.2.20 255.255.255.248&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.20&lt;/P&gt;&lt;P&gt; vlan 20&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.3.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet1.30&lt;/P&gt;&lt;P&gt; vlan 30&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 192.168.4.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list INSIDE-TO-NAT extended permit ip 192.168.3.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list DMZ-TO-NAT extended permit ip 192.168.4.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside-205) 1 interface&lt;/P&gt;&lt;P&gt;global (outside-500) 2 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list INSIDE-TO-NAT&lt;/P&gt;&lt;P&gt;nat (dmz) 2 access-list DMZ-TO-NAT&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route outside-205 0.0.0.0 0.0.0.0 195.1.1.1 1&lt;/P&gt;&lt;P&gt;route outside-500 0.0.0.0 0.0.0.0 220.2.2.2 2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; === 8&amp;lt; ===&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What am I doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:01:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616631#M1036289</guid>
      <dc:creator>anton_lva</dc:creator>
      <dc:date>2019-03-11T09:01:20Z</dc:date>
    </item>
    <item>
      <title>Re: PIX525 - Policy NAT, problem with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616632#M1036290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..  your configuration is OK the problem is caused because any packets to the Internet are routed by interface outside-205 ..  Inside hosts go out OK because there is a nat-global pair for this access applied to the outside-205 interface, however the hosts on the dmz don't have a global applied to the outside-205 interface only to the outside-500 interface which will only be used when the outside-205 is down.  The same issue will happened with the inside hosts when outside-500 is up and outside-205 is down &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you could add as below to get this working&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside-205) 2 &lt;AVAILABLE public="" ip=""&gt; &lt;/AVAILABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps  ..  please rate it if it does &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 10:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616632#M1036290</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2006-11-28T10:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: PIX525 - Policy NAT, problem with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616633#M1036291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, Fernando, I’ve added &lt;/P&gt;&lt;P&gt;"global (outside-205) 2 220.2.2.2" &lt;/P&gt;&lt;P&gt;to my configuration, and it really helped to get rid of message "portmap translation failed".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But... The problem still exists.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, when I try to connect to some external www-server from the host in dmz, I have the next error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX-7-710005: TCP request discarded from x.x.x.x/80 to outside-500:220.2.2.2/1035&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How I can understand, PIX doesn't have a valid translation entry for interface outside-500 (but does for outside-205?) and doesn't expect reply from the remote www-server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a part of my translations table by "show xlate detail":&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;TCP PAT from dmz:192.168.4.x/32990 to outside-205(DMZ-TO-NAT):220.2.2.2/1035 flags ri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to add some static entries or additional access-lists?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 11:45:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616633#M1036291</guid>
      <dc:creator>anton_lva</dc:creator>
      <dc:date>2006-11-28T11:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: PIX525 - Policy NAT, problem with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616634#M1036292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm... The problem still exists. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried everything, but it doesn't help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Someone, please, help me!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Nov 2006 09:09:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616634#M1036292</guid>
      <dc:creator>anton_lva</dc:creator>
      <dc:date>2006-11-29T09:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX525 - Policy NAT, problem with two outside interfaces</title>
      <link>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616635#M1036293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do u solved it already? ive got a similar problem.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc25a46" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;forum=Security&amp;amp;topic=Firewalling&amp;amp;topicID=.ee6e1fa&amp;amp;fromOutline=&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.2cc25a46&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2008 10:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix525-policy-nat-problem-with-two-outside-interfaces/m-p/616635#M1036293</guid>
      <dc:creator>p.schmidt</dc:creator>
      <dc:date>2008-11-14T10:46:22Z</dc:date>
    </item>
  </channel>
</rss>

