<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401211#M1080693</link>
    <description>&lt;P&gt;Understood, thank you. The main issue appeared to be with IPSec. A device on the inside was trying to make a IPSec connection out and couldn’t due conflict, I think it was related to ISAKMP 500...?Ended up creating a static NAT with an different public IP for that device which resolved the issue. I think it was&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 11 May 2021 14:57:07 GMT</pubDate>
    <dc:creator>Jack G</dc:creator>
    <dc:date>2021-05-11T14:57:07Z</dc:date>
    <item>
      <title>Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401177#M1080689</link>
      <description>&lt;P&gt;I generally I see the outside interface IP used for the dynamic NAT, though after enabling RAVPN, etc. there appears to be a warning in FMC about possible conflict, etc. Is it a best practice to use a different IP than the outside interface for dynamic NAT assuming you have more than 1 public IP to work with?&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 14:31:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401177#M1080689</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2021-05-11T14:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401183#M1080690</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/175212"&gt;@Jack G&lt;/a&gt;&amp;nbsp;General practice, yes use a unique IP address or pool of IP addresses for outbound Dynamic PAT.&lt;/P&gt;
&lt;P&gt;Obviously if you don't have spare IP addresses you won't have that luxury.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 14:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401183#M1080690</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-11T14:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401184#M1080691</link>
      <description>&lt;P&gt;Neither way is more or less secure than the other.&lt;/P&gt;
&lt;P&gt;As far as best practices, from an engineering point of view you want to make sure the dynamic NAT/PAT has enough resources for the potential clients. If you have more than a couple hundred devices that will be using the NAT, then it's advised to use a larger address pool.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 14:38:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401184#M1080691</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-05-11T14:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401211#M1080693</link>
      <description>&lt;P&gt;Understood, thank you. The main issue appeared to be with IPSec. A device on the inside was trying to make a IPSec connection out and couldn’t due conflict, I think it was related to ISAKMP 500...?Ended up creating a static NAT with an different public IP for that device which resolved the issue. I think it was&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 14:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401211#M1080693</guid>
      <dc:creator>Jack G</dc:creator>
      <dc:date>2021-05-11T14:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Dynamic NAT for internet access, best practice to use outside interface IP or different IP then interface?</title>
      <link>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401216#M1080694</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/175212"&gt;@Jack G&lt;/a&gt; If the outbound IPSec connection from the inside was translated behind the ASA interface IP address and the ASA's outside interface itself was listening on udp/500, then yes I can imagine why that would not have worked. Your static NAT using a different public IP address was the correct way to resolve it.&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 15:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dynamic-nat-for-internet-access-best-practice-to-use-outside/m-p/4401216#M1080694</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-05-11T15:02:28Z</dc:date>
    </item>
  </channel>
</rss>

