<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Pix 501 - NAT / ACL in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416673#M1081462</link>
    <description>&lt;P&gt;if you like to do the NAT on PiX Look at the below example : (test and advise)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (inside) 1 192.168.44.0 255.255.255.0 &amp;nbsp; &lt;BR /&gt;global (outside) 1 192.168.45.241&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/en/US/docs/security/pix/pix42/configuration/guide/pix42exs.html" target="_blank"&gt;https://www.cisco.com/en/US/docs/security/pix/pix42/configuration/guide/pix42exs.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jun 2021 09:13:48 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-06-11T09:13:48Z</dc:date>
    <item>
      <title>Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416423#M1081445</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Pix 501 that has been in place for quite some time acting as a firewall between two LANs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LANA - ip address outside 192.168.45.241 255.255.255.0&lt;BR /&gt;LANB - ip address inside 192.168.44.240 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This config has worked ok as devices in each LAN have two way communication.&amp;nbsp; There is a desire now for devices in LANA to be able to communicate with a gateway in LANB to reach the internet.&amp;nbsp; The current access lists / NAT statements are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_out permit ip LANB LANA&lt;BR /&gt;access-list outside_in permit ip LANA LANB&lt;/P&gt;&lt;P&gt;nat (inside) 0 0.0.0.0 0.0.0.0 0 0&lt;BR /&gt;static (inside,outside) 192.168.45.0 192.168.45.0 netmask 255.255.255.0 0 0&lt;BR /&gt;static (inside,outside) 192.168.44.0 192.168.44.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am unsure of how to make this work for clients in LANA be able to reach the gateway 192.168.44.237 in LANB and onward to the internet.&amp;nbsp; I think I need to NAT any connections from LANA that are destined for the internet to be behind the inside interface address of 192.168.44.240 and ajust the access list to allow this traffic.&amp;nbsp; My proposed access list would be to add:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside_out permit ip any LANA&lt;BR /&gt;access-list outside_in permit ip LANA any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am unsure of how the NAT statements would need to be modified to masquerade the LANA clients behind the interface address 192.168.44.240 to be able to reach the internet.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;There is an IP route for:&lt;/P&gt;&lt;P&gt;route inside 0.0.0.0 0.0.0.0 192.168.44.237 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any pointers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:09:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416423#M1081445</guid>
      <dc:creator>00uxd140f5Tn1UtQn5d6</dc:creator>
      <dc:date>2021-06-10T21:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416434#M1081446</link>
      <description>&lt;P&gt;&lt;SPAN&gt;LANA - ip address outside 192.168.45.241 255.255.255.0&amp;nbsp; - why this address required to be outside ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;is this IP address from ISP ?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416434#M1081446</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-10T21:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416442#M1081447</link>
      <description>&lt;P&gt;It is just the way it has been setup. The address is not from the ISP. Internet is reachable via the gateway 192.168.44.237 which is another router.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:46:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416442#M1081447</guid>
      <dc:creator>00uxd140f5Tn1UtQn5d6</dc:creator>
      <dc:date>2021-06-10T21:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416446#M1081448</link>
      <description>&lt;P&gt;what is that router, is that other router able to do NAT Translation or you like to NAT translation on PIX (12+years lost touch, but i will try see recap my knowledge here)&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jun 2021 21:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416446#M1081448</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-10T21:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416450#M1081449</link>
      <description>&lt;P&gt;The other router is the ISP gateway.&amp;nbsp; It only knows about the 192.168.44.0/24 network. I think Nat would need to be done on the Pix to masquerade 192.168.45.0/24 behind 192.168.44.240 interface address when traffic is destined for the Internet as this would be accepted by the upstream router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 07:10:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416450#M1081449</guid>
      <dc:creator>00uxd140f5Tn1UtQn5d6</dc:creator>
      <dc:date>2021-06-11T07:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Pix 501 - NAT / ACL</title>
      <link>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416673#M1081462</link>
      <description>&lt;P&gt;if you like to do the NAT on PiX Look at the below example : (test and advise)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (inside) 1 192.168.44.0 255.255.255.0 &amp;nbsp; &lt;BR /&gt;global (outside) 1 192.168.45.241&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/en/US/docs/security/pix/pix42/configuration/guide/pix42exs.html" target="_blank"&gt;https://www.cisco.com/en/US/docs/security/pix/pix42/configuration/guide/pix42exs.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jun 2021 09:13:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-pix-501-nat-acl/m-p/4416673#M1081462</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-11T09:13:48Z</dc:date>
    </item>
  </channel>
</rss>

