<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926463#M1104411</link>
    <description>&lt;P&gt;Nat(in'in) source static 192.168.1.1 1.1.1.1 destiantion static 192.168.1.2 to 1.1.1.2&lt;/P&gt;
&lt;P&gt;This what you need&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Sep 2023 09:50:09 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-09-20T09:50:09Z</dc:date>
    <item>
      <title>Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926462#M1104410</link>
      <description>&lt;P&gt;hi&lt;/P&gt;
&lt;P&gt;i have an issue with nat i need to solve&lt;/P&gt;
&lt;P&gt;i have two servers that they are natted to two public IPs&lt;/P&gt;
&lt;P&gt;let say 192.168.1.1 to 1.1.1.1&lt;/P&gt;
&lt;P&gt;192.168.1.2 to 1.1.1.2&lt;/P&gt;
&lt;P&gt;i want them they can connect to each other by public IPs&lt;/P&gt;
&lt;P&gt;when 192.168.1.1 pings to 1.1.1.2 there is no reply&lt;/P&gt;
&lt;P&gt;how can i do this in my senario&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 09:41:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926462#M1104410</guid>
      <dc:creator>Mohammed.Fawzi</dc:creator>
      <dc:date>2023-09-20T09:41:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926463#M1104411</link>
      <description>&lt;P&gt;Nat(in'in) source static 192.168.1.1 1.1.1.1 destiantion static 192.168.1.2 to 1.1.1.2&lt;/P&gt;
&lt;P&gt;This what you need&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 09:50:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926463#M1104411</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-20T09:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926995#M1104448</link>
      <description>&lt;P&gt;But I want the destination 1.1.1.2 not 192.168.1.2&lt;/P&gt;
&lt;P&gt;the problem is when the two public IPs from same range block NATed on the same firewall interface they can't communicate normally if you get my idea&lt;/P&gt;
&lt;P&gt;thanks for your attention&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 07:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4926995#M1104448</guid>
      <dc:creator>Mohammed.Fawzi</dc:creator>
      <dc:date>2023-09-21T07:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4927015#M1104450</link>
      <description>&lt;P&gt;The source and destination will NAT with command I share above.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 08:10:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4927015#M1104450</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-09-21T08:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA NAT</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4927053#M1104453</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="c"&gt;
nat (inside,inside) source static 192.168.1.1 1.1.1.1 destination static 1.1.1.2 192.168.1.2 no-proxy-arp
nat (inside,inside) source static 192.168.1.2 1.1.1.2 destination static 1.1.1.1 192.168.1.1 no-proxy-arp
!
!
access-list inside_access_in extended permit icmp host 192.168.1.1 host 1.1.1.2
access-list inside_access_in extended permit icmp host 192.168.1.2 host 1.1.1.1
!
!
access-group inside_access_in in interface inside
&lt;/LI-CODE&gt;
&lt;P&gt;or&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;object network Server1_Internal
 host 192.168.1.1
 nat (inside,outside) static 1.1.1.1
!
object network Server2_Internal
 host 192.168.1.2
 nat (inside,outside) static 1.1.1.2
!
access-list outside_access_in extended permit icmp host 1.1.1.1 host 1.1.1.2
access-list outside_access_in extended permit icmp host 1.1.1.2 host 1.1.1.1
!
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 09:06:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-nat/m-p/4927053#M1104453</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-09-21T09:06:08Z</dc:date>
    </item>
  </channel>
</rss>

