<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: View external ips accessing NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609287#M1090014</link>
    <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;&lt;SPAN&gt;show xlate | inc and the show local-host both work thank you.&amp;nbsp; One more thing I'll ask and maybe there isn't a way to do this, how do I get a days worth of these logs?&amp;nbsp; It looks like it shows the currently connected connections but once those connections are done it goes away and no longer shows.&amp;nbsp; I am assuming I will need to setup some kind of syslog server to track this somehow?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks again for the help.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 12 May 2022 18:41:38 GMT</pubDate>
    <dc:creator>mcliff</dc:creator>
    <dc:date>2022-05-12T18:41:38Z</dc:date>
    <item>
      <title>View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609165#M1090000</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I view what the external IP's are that are accessing a NAT on ASA 5515?&amp;nbsp; In the ASDM I've gone to the Access Rules tab and selected the one I want and I've picked show log but the window it opens doesn't show me anything.&amp;nbsp; Any help would be appreciated, thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 15:53:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609165#M1090000</guid>
      <dc:creator>mcliff</dc:creator>
      <dc:date>2022-05-12T15:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609177#M1090002</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;You can use command line for that: "show xlate". CLI on this case is easier to see.&lt;/P&gt;&lt;P&gt;You can also use the packetTracert&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 16:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609177#M1090002</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-12T16:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609201#M1090005</link>
      <description>&lt;P&gt;Hi Flavio,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I issue the show xlate command it looks the same to me as viewing the log in the ASDM, it just shows all of our internal ips going to our public ip.&amp;nbsp; Is there a way to only view external users ip's that are accessing the one internal ip that is being NAT'ed though?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The packet tracer seems to just show you what would happen if an external ip tried to access the NAT'ed IP, if it would be allowed or denied based on the rules?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if I am doing this wrong as I am sure I am.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 16:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609201#M1090005</guid>
      <dc:creator>mcliff</dc:creator>
      <dc:date>2022-05-12T16:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609215#M1090007</link>
      <description>&lt;P&gt;May be you can try : (not sure below help please let me know if that suites)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;# show xlate | inc XXXXX&amp;nbsp; (the Internal IP here)&lt;/P&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;P&gt;#show xlate local x.x.x.x&lt;/P&gt;
&lt;P&gt;# sh nat detail | include x.x.x.x&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 16:54:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609215#M1090007</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-05-12T16:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609226#M1090009</link>
      <description>&lt;P&gt;Use keyword &lt;STRONG&gt;detail&amp;nbsp;&lt;/STRONG&gt;with packet-tracer give you all nat use by this traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 17:05:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609226#M1090009</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-12T17:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609243#M1090011</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1353282"&gt;@mcliff&lt;/a&gt; use the command &lt;STRONG&gt;show local-host &amp;lt;private ip address&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example below determines there are 2 connections and lists the source public (external) IP addresses connecting to that server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="show localhost.PNG" style="width: 794px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/151119i62A96D5389D1B780/image-size/large?v=v2&amp;amp;px=999" role="button" title="show localhost.PNG" alt="show localhost.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 17:31:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609243#M1090011</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-05-12T17:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609287#M1090014</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The&amp;nbsp;&lt;SPAN&gt;show xlate | inc and the show local-host both work thank you.&amp;nbsp; One more thing I'll ask and maybe there isn't a way to do this, how do I get a days worth of these logs?&amp;nbsp; It looks like it shows the currently connected connections but once those connections are done it goes away and no longer shows.&amp;nbsp; I am assuming I will need to setup some kind of syslog server to track this somehow?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks again for the help.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 18:41:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609287#M1090014</guid>
      <dc:creator>mcliff</dc:creator>
      <dc:date>2022-05-12T18:41:38Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609293#M1090015</link>
      <description>&lt;P&gt;If you can config log with nat use by this host&amp;nbsp;&lt;/P&gt;&lt;P&gt;This make nat log when new entry add to xlate.&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 18:45:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609293#M1090015</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-05-12T18:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: View external ips accessing NAT</title>
      <link>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609413#M1090022</link>
      <description>&lt;P&gt;yes, that is the best approach if you looking for archive data,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 May 2022 22:11:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/view-external-ips-accessing-nat/m-p/4609413#M1090022</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-05-12T22:11:53Z</dc:date>
    </item>
  </channel>
</rss>

