<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Excluding one destination from nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454037#M1055692</link>
    <description>&lt;P&gt;CISCO 800 IOS 12.3&lt;/P&gt;&lt;P&gt;Hi, I have several VPNs set up between my site and the sites of asociates. The original requirements were for me to have two public IPs for this setup, ne which is a real interface (and the tunnel endpoint), and one which is used for nating my internal private adress onto, so that my internal machine can be reached by normal routing from sites which I do not have a VPN with.&lt;/P&gt;&lt;P&gt;My problem is that I now need to create a new VPN with a site that needs to see my private adreess through the tunnel.&lt;/P&gt;&lt;P&gt;So is there a way to have nating in place exept when talking with one specific peer ?&lt;/P&gt;&lt;P&gt;All conections will be initiated by me and directed to this peers provate IP address.&lt;/P&gt;&lt;P&gt;The tunnel is in place, and through ping, we know that he sees my request, but for him they apear from my second public IP, which he can not route to his internal network. Having them nat their side in order for us to talk with them from our public address is not an option (we count as client-side in this setup) .&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:29:12 GMT</pubDate>
    <dc:creator>kyriacossakkas</dc:creator>
    <dc:date>2020-02-21T08:29:12Z</dc:date>
    <item>
      <title>Excluding one destination from nat</title>
      <link>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454037#M1055692</link>
      <description>&lt;P&gt;CISCO 800 IOS 12.3&lt;/P&gt;&lt;P&gt;Hi, I have several VPNs set up between my site and the sites of asociates. The original requirements were for me to have two public IPs for this setup, ne which is a real interface (and the tunnel endpoint), and one which is used for nating my internal private adress onto, so that my internal machine can be reached by normal routing from sites which I do not have a VPN with.&lt;/P&gt;&lt;P&gt;My problem is that I now need to create a new VPN with a site that needs to see my private adreess through the tunnel.&lt;/P&gt;&lt;P&gt;So is there a way to have nating in place exept when talking with one specific peer ?&lt;/P&gt;&lt;P&gt;All conections will be initiated by me and directed to this peers provate IP address.&lt;/P&gt;&lt;P&gt;The tunnel is in place, and through ping, we know that he sees my request, but for him they apear from my second public IP, which he can not route to his internal network. Having them nat their side in order for us to talk with them from our public address is not an option (we count as client-side in this setup) .&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454037#M1055692</guid>
      <dc:creator>kyriacossakkas</dc:creator>
      <dc:date>2020-02-21T08:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Excluding one destination from nat</title>
      <link>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454038#M1055694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Cisco IOS allows you to use NAT exclusions through the use of ACLs.  For example, if your network is 192.168.1.0 and the remote network that you do not want to NAT to is 192.168.2.0 then the commands would be:&lt;/P&gt;&lt;P&gt;access-list 101 deny ip 192.168.1.0 255.255.255.0 192.168.2.x 255.255.255.255 (where x is the ip of the host to exclude)&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.1.0 255.255.255.0 any (permit for everything else)&lt;/P&gt;&lt;P&gt;nat inside source list 101 interface (apply NAT)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Post your config if this isn't helpful and I will take a closer look at it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bob&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Oct 2005 16:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454038#M1055694</guid>
      <dc:creator>bobd</dc:creator>
      <dc:date>2005-10-27T16:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: Excluding one destination from nat</title>
      <link>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454039#M1055696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, got the local CISCO rep to come over, and he tried something like what you describe, but for some reason it did not work, nating kept taking place on all traffic. Here are parts of my config, which include his modifications:&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0&lt;/P&gt;&lt;P&gt; description Connection to SMSC Client Application&lt;/P&gt;&lt;P&gt; ip address 192.168.0.1 255.255.255.0&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; no ip mroute-cache&lt;/P&gt;&lt;P&gt; no cdp enable&lt;/P&gt;&lt;P&gt; hold-queue 32 in&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;ip classless&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 212.xxx.xxx.209&lt;/P&gt;&lt;P&gt;ip route 192.168.7.17 255.255.255.255 80.xxx.xxx.xxx&lt;/P&gt;&lt;P&gt;no ip http server&lt;/P&gt;&lt;P&gt;no ip http secure-server&lt;/P&gt;&lt;P&gt;ip nat pool mypool 212.xxx.xxx.213 212.xxx.xxx.213 prefix-length 30&lt;/P&gt;&lt;P&gt;ip nat inside source list 110 pool mypool&lt;/P&gt;&lt;P&gt;&lt;SNIP&gt;&lt;/SNIP&gt;&lt;/P&gt;&lt;P&gt;access-list 110 deny   ip host 192.168.0.10 host 192.168.7.17&lt;/P&gt;&lt;P&gt;access-list 110 permit ip host 192.168.0.10 any&lt;/P&gt;&lt;P&gt;&lt;END&gt;&lt;/END&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this makes sence, even with the snipping and masking.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance to anybody that might spot where we are going wrong.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2005 15:53:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454039#M1055696</guid>
      <dc:creator>kyriacossakkas</dc:creator>
      <dc:date>2005-10-31T15:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: Excluding one destination from nat</title>
      <link>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454040#M1055699</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there was already a NAT translation in place when you implemented the ACL, you may need to clear the existing translations.&lt;/P&gt;&lt;P&gt;clear ip nat trans *&lt;/P&gt;&lt;P&gt;the ACL in your snip should exclude traffic coming from 192.168.0.10 to 192.168.7.17 from NAT and NAT everything else from the same host.&lt;/P&gt;&lt;P&gt;Looks like it shoudl work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2005 17:26:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/excluding-one-destination-from-nat/m-p/454040#M1055699</guid>
      <dc:creator>bobd</dc:creator>
      <dc:date>2005-10-31T17:26:44Z</dc:date>
    </item>
  </channel>
</rss>

