<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Pat for Cisco ASA 5506 to Microsoft SQL server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048932#M1067967</link>
    <description>&lt;P&gt;Hello Christian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for taking the time to reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to configure the rule so that any traffic that comes in from my outside interface on port 1433 goes to 192.168.1.10&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it would look like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;67.205.185.195 &amp;gt; 96.70.36.89 &amp;gt; ASA &amp;gt;&amp;nbsp; 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Mar 2020 20:51:59 GMT</pubDate>
    <dc:creator>arits2004</dc:creator>
    <dc:date>2020-03-19T20:51:59Z</dc:date>
    <item>
      <title>Static Pat for Cisco ASA 5506 to Microsoft SQL server</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048893#M1067958</link>
      <description>&lt;P&gt;I am trying to setup a dynamic nat from a public IP address to an internal IP address to allow access to a Microsoft SQL database. I want to configure this to allow my network object Cybernautic to access the network object&amp;nbsp;MicrosoftSql. This is my current nat statment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat (outside,inside_6) source static Cybernautic Cybernautic destination static DC01 DC01 service sql-1433 sql-1433&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I am still unable to access the SQL database remotely. Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Running Config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip local pool anyconnect 192.168.2.1-192.168.2.200 mask 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface GigabitEthernet1/1&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address 96.70.36.89 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/2&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_1&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/3&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_2&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/4&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_3&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/5&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_4&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/6&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_5&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/7&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_6&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet1/8&lt;BR /&gt;bridge-group 1&lt;BR /&gt;nameif inside_7&lt;BR /&gt;security-level 100&lt;BR /&gt;!&lt;BR /&gt;interface Management1/1&lt;BR /&gt;management-only&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface BVI1&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.1.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;same-security-traffic permit inter-interface&lt;BR /&gt;object network obj_any1&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any2&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any3&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any4&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any5&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any6&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network obj_any7&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network vpn&lt;BR /&gt;subnet 10.0.0.0 255.255.255.0&lt;BR /&gt;description ahall&lt;BR /&gt;object network NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;object network NETWORK_OBJ_192.168.2.0_24&lt;BR /&gt;subnet 192.168.2.0 255.255.255.0&lt;BR /&gt;object network AnyHost&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network outsideIP&lt;BR /&gt;host 96.70.36.89&lt;BR /&gt;object network MicrosoftSql&lt;BR /&gt;host 192.168.1.10&lt;BR /&gt;object network remoteip&lt;BR /&gt;host 50.235.80.83&lt;BR /&gt;object network DC01_Outside&lt;BR /&gt;host 192.168.1.10&lt;BR /&gt;object network ahallvpn&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;BR /&gt;object network TS02&lt;BR /&gt;host 192.168.1.17&lt;BR /&gt;object service RDP&lt;BR /&gt;service tcp destination eq 3389&lt;BR /&gt;object service sql-1433&lt;BR /&gt;service tcp source eq 1433 destination eq 1433&lt;BR /&gt;object network Cybernautic&lt;BR /&gt;host 67.205.185.195&lt;BR /&gt;description cybernautic remote ip address&lt;BR /&gt;object-group network DM_INLINE_NETWORK_1&lt;BR /&gt;network-object object ahallvpn&lt;BR /&gt;network-object object vpn&lt;BR /&gt;access-list global_access extended permit ip any any&lt;BR /&gt;access-list inside_6_access_in extended permit ip any any&lt;BR /&gt;access-list outside_access_in extended permit ip any any&lt;BR /&gt;access-list outside_cryptomap_1 extended permit ip 192.168.1.0 255.255.255.0 object-group DM_INLINE_NETWORK_1&lt;BR /&gt;access-list SplitTunnel standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list SplitTunnel standard permit 192.168.2.0 255.255.255.0&lt;BR /&gt;access-list outside_cryptomap extended permit ip 192.168.1.0 255.255.255.0 object vpn&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended deny ip any4 any4&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq lpd&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark IPP: Internet Printing Protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 631&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark Windows' printing port&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 9100&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark mDNS: multicast DNS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.251 eq 5353&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark LLMNR: Link Local Multicast Name Resolution protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 host 224.0.0.252 eq 5355&lt;BR /&gt;access-list AnyConnect_Client_Local_Print remark TCP/NetBIOS protocol&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit tcp any4 any4 eq 137&lt;BR /&gt;access-list AnyConnect_Client_Local_Print extended permit udp any4 any4 eq netbios-ns&lt;BR /&gt;access-list inside_6_access_out extended permit ip any any&lt;BR /&gt;access-list global_access_1 extended permit ip any any&lt;BR /&gt;access-list inside_access_in extended permit ip any any&lt;BR /&gt;access-list outside_cryptomap_3 extended permit ip 192.168.1.0 255.255.255.0 object vpn&lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside_1 1500&lt;BR /&gt;mtu inside_2 1500&lt;BR /&gt;mtu inside_3 1500&lt;BR /&gt;mtu inside_4 1500&lt;BR /&gt;mtu inside_5 1500&lt;BR /&gt;mtu inside_6 1500&lt;BR /&gt;mtu inside_7 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;arp rate-limit 16384&lt;BR /&gt;nat (outside,inside_6) source static Cybernautic Cybernautic destination static DC01 DC01 service sql-1433 sql-1433&lt;BR /&gt;nat (any,any) source static NETWORK_OBJ_192.168.2.0_24 NETWORK_OBJ_192.168.2.0_24 destination static NETWORK_OBJ_192.168.1.0_24 NETWORK_OBJ_192.168.1.0_24&lt;BR /&gt;nat (any,any) source static vpn vpn no-proxy-arp&lt;BR /&gt;nat (any,any) source static ahallvpn ahallvpn no-proxy-arp&lt;BR /&gt;!&lt;BR /&gt;object network obj_any1&lt;BR /&gt;nat (inside_1,outside) dynamic interface&lt;BR /&gt;object network obj_any2&lt;BR /&gt;nat (inside_2,outside) dynamic interface&lt;BR /&gt;object network obj_any3&lt;BR /&gt;nat (inside_3,outside) dynamic interface&lt;BR /&gt;object network obj_any4&lt;BR /&gt;nat (inside_4,outside) dynamic interface&lt;BR /&gt;object network obj_any5&lt;BR /&gt;nat (inside_5,outside) dynamic interface&lt;BR /&gt;object network obj_any6&lt;BR /&gt;nat (inside_6,outside) dynamic interface&lt;BR /&gt;object network obj_any7&lt;BR /&gt;nat (inside_7,outside) dynamic interface&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_6_access_in in interface inside_6&lt;BR /&gt;access-group inside_6_access_out out interface inside_6&lt;BR /&gt;access-group inside_access_in in interface inside&lt;BR /&gt;access-group global_access_1 global&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 96.70.36.94 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;timeout conn-holddown 0:00:15&lt;BR /&gt;timeout igp stale-route 0:01:10&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;aaa authentication ssh console LOCAL&lt;BR /&gt;aaa authentication login-history&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_1&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_2&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_3&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_4&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_5&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_6&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside_7&lt;BR /&gt;http 66.94.211.96 255.255.255.248 outside&lt;BR /&gt;http 75.150.205.88 255.255.255.248 outside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;service sw-reset-button&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS esp-aes esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-128-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS esp-aes-192 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS esp-aes-192 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-192-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS esp-aes-256 esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-256-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS esp-3des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-3DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5 esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS esp-des esp-sha-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-SHA-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS esp-des esp-md5-hmac&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-DES-MD5-TRANS mode transport&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal DES&lt;BR /&gt;protocol esp encryption des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal 3DES&lt;BR /&gt;protocol esp encryption 3des&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES&lt;BR /&gt;protocol esp encryption aes&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES192&lt;BR /&gt;protocol esp encryption aes-192&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec ikev2 ipsec-proposal AES256&lt;BR /&gt;protocol esp encryption aes-256&lt;BR /&gt;protocol esp integrity sha-1 md5&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set ikev2 ipsec-proposal AES256 AES192 AES&lt;BR /&gt;crypto map outside_map 2 match address outside_cryptomap_1&lt;BR /&gt;crypto map outside_map 2 set pfs&lt;BR /&gt;crypto map outside_map 2 set peer 74.120.200.141&lt;BR /&gt;crypto map outside_map 2 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 2 set ikev2 ipsec-proposal AES256 AES192 AES 3DES DES&lt;BR /&gt;crypto map outside_map 2 set security-association lifetime kilobytes unlimited&lt;BR /&gt;crypto map outside_map 3 match address outside_cryptomap&lt;BR /&gt;crypto map outside_map 3 set peer 74.121.200.141&lt;BR /&gt;crypto map outside_map 3 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 match address outside_cryptomap_3&lt;BR /&gt;crypto map outside_map 4 set peer 74.120.200.141&lt;BR /&gt;crypto map outside_map 4 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 4 set ikev2 ipsec-proposal DES 3DES AES AES192 AES256&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpoint ASDM_TrustPoint0&lt;BR /&gt;enrollment self&lt;BR /&gt;subject-name CN=ciscoasa&lt;BR /&gt;crl configure&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ca certificate chain ASDM_TrustPoint0&lt;BR /&gt;certificate 6476485e&lt;BR /&gt;308202d4 308201bc a0030201 02020464 76485e30 0d06092a 864886f7 0d01010b&lt;BR /&gt;0500302c 3111300f 06035504 03130863 6973636f 61736131 17301506 092a8648&lt;BR /&gt;86f70d01 09021608 63697363 6f617361 301e170d 32303032 32303134 34363235&lt;BR /&gt;5a170d33 30303231 37313434 3632355a 302c3111 300f0603 55040313 08636973&lt;BR /&gt;636f6173 61311730 1506092a 864886f7 0d010902 16086369 73636f61 73613082&lt;BR /&gt;0122300d 06092a86 4886f70d 01010105 00038201 0f003082 010a0282 010100e0&lt;BR /&gt;94ff0dfe fcd1359e 13212381 379cfe06 122c031f dfd20ca1 54391026 63824cb2&lt;BR /&gt;0b6ccc60 ce8d90c2 6e33bfc8 beda8c1b e36e416f a3adbfe7 58c95488 97965ccc&lt;BR /&gt;b7f8fa61 ec39f8df 33677360 774c5b48 3ce339c4 4e3f4fa6 54691fe3 cc40106f&lt;BR /&gt;6a929096 957e68c9 ee12d5fb 1e077973 dd994880 95358bed 14fff76d 584ed2ba&lt;BR /&gt;30e23bd4 54025843 0b9b4d53 b001c6bd d78d56de 955bba8f 271e8db4 5f7ee76a&lt;BR /&gt;2fbc93d2 07af8dee 1e79ee5c 74cfaefc 535ce9af 36a4b3b3 7b372134 8c0a6a68&lt;BR /&gt;87e321ad ad89ef04 c55c6409 df5a13e9 f294da7a bdf2d75c 22f29673 6866d836&lt;BR /&gt;a442e1ae ed0877ee 2e3d0949 91efe7de 2b5f21ba 2f282e20 54b7628f 93e70502&lt;BR /&gt;03010001 300d0609 2a864886 f70d0101 0b050003 82010100 6f95e318 8162007e&lt;BR /&gt;7d0871d5 28b3c3c9 97c02ee1 3034f976 2d2d1a93 4e3446d7 4bf3f8fc b1b8875e&lt;BR /&gt;ff227966 94b1f5ff b42a6e8b 8c998020 41a9c586 75c8605f e79e9d0c 1ee4aacc&lt;BR /&gt;1457f422 209e1883 cabde9b1 23235a9b ea2c098c 89a71271 27b686cb f0bc991b&lt;BR /&gt;7f5416d7 73cf4dc0 bcd880cf 500c2eac 15fa3018 39c148c7 441f0576 8f50fff4&lt;BR /&gt;2651dca0 2260d90a 53268be6 113fc7bb 6c7c394d 8b6d6096 7311c32d c3de445b&lt;BR /&gt;c899adaf 972c873d 88ec6bce ec3620e4 577e6673 eacbf58f 3e718198 1a421181&lt;BR /&gt;597bdafa 1769713a 2ed0b4e2 a6fd329d 79e0a05f 510f788e dfd1c15f b090993f&lt;BR /&gt;55ae1b5b abaae30e a92b32fa 7927b76f db9a4aab d2e1c4a2&lt;BR /&gt;quit&lt;BR /&gt;crypto ikev2 policy 1&lt;BR /&gt;encryption aes-256&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 10&lt;BR /&gt;encryption aes-192&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 20&lt;BR /&gt;encryption aes&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 30&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 policy 40&lt;BR /&gt;encryption des&lt;BR /&gt;integrity sha&lt;BR /&gt;group 5 2&lt;BR /&gt;prf sha&lt;BR /&gt;lifetime seconds 86400&lt;BR /&gt;crypto ikev2 enable outside client-services port 443&lt;BR /&gt;crypto ikev2 remote-access trustpoint ASDM_TrustPoint0&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes-192&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption 3des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt;authentication rsa-sig&lt;BR /&gt;encryption des&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh stricthostkeycheck&lt;BR /&gt;ssh 66.94.211.96 255.255.255.248 outside&lt;BR /&gt;ssh 75.150.205.88 255.255.255.248 outside&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.1.100-192.168.1.199 inside&lt;BR /&gt;dhcpd dns 192.128.1.200 8.8.8.8 interface inside&lt;BR /&gt;dhcpd lease 96000 interface inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 outside&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_1&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_2&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_3&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_4&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_5&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_6&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside_7&lt;BR /&gt;ssl trust-point ASDM_TrustPoint0 inside&lt;BR /&gt;webvpn&lt;BR /&gt;enable outside&lt;BR /&gt;anyconnect image disk0:/anyconnect-macos-4.8.02045-webdeploy-k9.pkg 1&lt;BR /&gt;anyconnect image disk0:/anyconnect-win-4.8.02045-webdeploy-k9.pkg 2&lt;BR /&gt;anyconnect profiles AnyConnect2_client_profile disk0:/AnyConnect2_client_profile.xml&lt;BR /&gt;anyconnect profiles AnyConnect_client_profile disk0:/AnyConnect_client_profile.xml&lt;BR /&gt;anyconnect profiles Anyconnect2_client_profile disk0:/Anyconnect2_client_profile.xml&lt;BR /&gt;anyconnect enable&lt;BR /&gt;tunnel-group-list enable&lt;BR /&gt;cache&lt;BR /&gt;disable&lt;BR /&gt;error-recovery disable&lt;BR /&gt;group-policy GroupPolicy_AnyConnect internal&lt;BR /&gt;group-policy GroupPolicy_AnyConnect attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.168.1.10&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;split-tunnel-policy tunnelspecified&lt;BR /&gt;split-tunnel-network-list value SplitTunnel&lt;BR /&gt;default-domain value iuoe.local&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value AnyConnect_client_profile type user&lt;BR /&gt;group-policy GroupPolicy_AnyConnect2 internal&lt;BR /&gt;group-policy GroupPolicy_AnyConnect2 attributes&lt;BR /&gt;wins-server none&lt;BR /&gt;dns-server value 192.168.1.10&lt;BR /&gt;vpn-tunnel-protocol ikev2 ssl-client&lt;BR /&gt;default-domain value iuoe.local&lt;BR /&gt;webvpn&lt;BR /&gt;anyconnect profiles value AnyConnect2_client_profile type user&lt;BR /&gt;group-policy GroupPolicy_74.120.200.141 internal&lt;BR /&gt;group-policy GroupPolicy_74.120.200.141 attributes&lt;BR /&gt;vpn-tunnel-protocol ikev1 ikev2&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;username brett password $sha512$5000$XoW4Fl+JnzF+N8U1SwEDCA==$hfRBTVaUBqAkOXHNosQIIw== pbkdf2&lt;BR /&gt;username scott password $sha512$5000$j4omPvxMRd2Z4sKfzyf0UQ==$GBzjlct/tzBybF5MRrikzQ== pbkdf2&lt;BR /&gt;username aric password $sha512$5000$/A2HDWSG/E698i23RFkn6w==$C7Oz9Z6sKGly33V2TFuB4Q== pbkdf2 privilege 15&lt;BR /&gt;username joe password $sha512$5000$fTjCWPkuzQc7fZp8clSp/Q==$VuDOJvDGN5NnycWAsewjYQ== pbkdf2&lt;BR /&gt;username darren password $sha512$5000$PxaGxa6qmkZy4jg0LbwQ9A==$qT1h2pKpgLyJTQhXvtkzNg== pbkdf2&lt;BR /&gt;username learning1 password $sha512$5000$Uyl59gFusi+JaZjx+ywEbg==$YUIk+r1ZhAS5NBU4nVl+cQ== pbkdf2&lt;BR /&gt;username learning2 password $sha512$5000$VrxZaUN+8I4RNWsnJ94PDA==$I82bCZ/iYk6S27uXGo2gdg== pbkdf2&lt;BR /&gt;username learning4 password $sha512$5000$8ZJzSSLMdWzId0Q6GnPuCg==$dvAub8qMVy/yy190kUEihA== pbkdf2&lt;BR /&gt;username tony password $sha512$5000$PiZsYtEGKf4/r0HRv6vemQ==$9jNq0O0+eZDLR0JaCwca0A== pbkdf2&lt;BR /&gt;username Tony password $sha512$5000$fmbby6f8gCVudokt4nQckQ==$k3ZdmOabfKwJYetZQiU30w== pbkdf2&lt;BR /&gt;username sora-user password $sha512$5000$ZRxPfRB+fcSAypV+IKAH3g==$p4tV2nL8rZ45iL4W/RNaPg== pbkdf2 privilege 15&lt;BR /&gt;tunnel-group AnyConnect type remote-access&lt;BR /&gt;tunnel-group AnyConnect general-attributes&lt;BR /&gt;address-pool anyconnect&lt;BR /&gt;default-group-policy GroupPolicy_AnyConnect&lt;BR /&gt;nat-assigned-to-public-ip outside&lt;BR /&gt;tunnel-group AnyConnect webvpn-attributes&lt;BR /&gt;group-alias AnyConnect enable&lt;BR /&gt;tunnel-group AnyConnect2 type remote-access&lt;BR /&gt;tunnel-group AnyConnect2 general-attributes&lt;BR /&gt;address-pool anyconnect&lt;BR /&gt;default-group-policy GroupPolicy_AnyConnect2&lt;BR /&gt;tunnel-group AnyConnect2 webvpn-attributes&lt;BR /&gt;group-alias AnyConnect2 enable&lt;BR /&gt;tunnel-group 74.120.200.141 type ipsec-l2l&lt;BR /&gt;tunnel-group 74.120.200.141 general-attributes&lt;BR /&gt;default-group-policy GroupPolicy_74.120.200.141&lt;BR /&gt;tunnel-group 74.120.200.141 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;ikev2 remote-authentication pre-shared-key *****&lt;BR /&gt;ikev2 local-authentication pre-shared-key *****&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;parameters&lt;BR /&gt;message-length maximum client auto&lt;BR /&gt;message-length maximum 512&lt;BR /&gt;no tcp-inspection&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect dns preset_dns_map&lt;BR /&gt;inspect ftp&lt;BR /&gt;inspect h323 h225&lt;BR /&gt;inspect h323 ras&lt;BR /&gt;inspect rsh&lt;BR /&gt;inspect rtsp&lt;BR /&gt;inspect esmtp&lt;BR /&gt;inspect sqlnet&lt;BR /&gt;inspect skinny&lt;BR /&gt;inspect sunrpc&lt;BR /&gt;inspect xdmcp&lt;BR /&gt;inspect sip&lt;BR /&gt;inspect netbios&lt;BR /&gt;inspect tftp&lt;BR /&gt;inspect ip-options&lt;BR /&gt;inspect icmp&lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context&lt;BR /&gt;no call-home reporting anonymous&lt;BR /&gt;Cryptochecksum:f367c499d76f219f55aa8dc907ed9841&lt;BR /&gt;: end&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 19:48:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048893#M1067958</guid>
      <dc:creator>arits2004</dc:creator>
      <dc:date>2020-03-19T19:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Static Pat for Cisco ASA 5506 to Microsoft SQL server</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048916#M1067965</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;First of all, if this is a live (not lab) environment connected to the Internet, i don't see how you would expect the public IP of&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;67.205.185.195 to reach&amp;nbsp;your private IP of&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;192.168.1.10, via the Internet, without a VPN tunnel build, which i don't see in the config.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp;If&amp;nbsp;this is lab environment, your NAT statement points to an&amp;nbsp;&lt;/SPAN&gt;object which does not exist, fix the issue by using the same object name in both the object definition and NAT statement; also the wrong ingress interface is specified, you should be using&amp;nbsp;&lt;STRONG&gt;inside&lt;/STRONG&gt;, not&amp;nbsp;&lt;STRONG&gt;inside6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Wrong:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network &lt;STRONG&gt;DC01_Outside&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;host 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (outside,inside_6) source static Cybernautic Cybernautic destination static &lt;STRONG&gt;DC01&lt;/STRONG&gt; &lt;STRONG&gt;DC01&lt;/STRONG&gt; service sql-1433 sql-1433&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Correct:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;no nat (outside,inside_6) source static Cybernautic Cybernautic destination static DC01 DC01 service sql-1433 sql-1433&lt;/P&gt;&lt;P&gt;no&amp;nbsp;object network DC01_Outside&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network &lt;STRONG&gt;DC01&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;host 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (outside,&lt;STRONG&gt;inside&lt;/STRONG&gt;) source static Cybernautic Cybernautic destination static &lt;STRONG&gt;DC01&lt;/STRONG&gt; &lt;STRONG&gt;DC01&lt;/STRONG&gt; service sql-1433 sql-1433&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 20:31:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048916#M1067965</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-19T20:31:38Z</dc:date>
    </item>
    <item>
      <title>Re: Static Pat for Cisco ASA 5506 to Microsoft SQL server</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048932#M1067967</link>
      <description>&lt;P&gt;Hello Christian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for taking the time to reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to configure the rule so that any traffic that comes in from my outside interface on port 1433 goes to 192.168.1.10&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it would look like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;67.205.185.195 &amp;gt; 96.70.36.89 &amp;gt; ASA &amp;gt;&amp;nbsp; 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 20:51:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048932#M1067967</guid>
      <dc:creator>arits2004</dc:creator>
      <dc:date>2020-03-19T20:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: Static Pat for Cisco ASA 5506 to Microsoft SQL server</title>
      <link>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048972#M1067975</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use this config instead:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;no nat (outside,inside_6) source static Cybernautic Cybernautic destination static DC01 DC01 service sql-1433 sql-1433&lt;/P&gt;&lt;P&gt;no&amp;nbsp;object network DC01_Outside&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network outsideIP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;host 96.70.36.89&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;object network MicrosoftSql&lt;BR /&gt;host 192.168.1.10&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (inside, outside) static interface service tcp 1433 1433&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;To test it, run packet-tracer&amp;nbsp;input inside tcp&amp;nbsp;67.205.185.195 10000&amp;nbsp;96.70.36.89 1433 detailed&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cristian Matei&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2020 22:16:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-pat-for-cisco-asa-5506-to-microsoft-sql-server/m-p/4048972#M1067975</guid>
      <dc:creator>Cristian Matei</dc:creator>
      <dc:date>2020-03-19T22:16:11Z</dc:date>
    </item>
  </channel>
</rss>

