<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static NAT for FTD? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511294#M133102</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pranay, thanks for your response, however this is the part of the document that creates confusion;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Configure the basic rule options:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;• Source Interface, Destination Interface—(Required for bridge group member interfaces.) The interfaces where this NAT rule applies. Source is the real interface, the one through which the traffic enters the device. Destination is the mapped interface, the one through which traffic exits the device. By default, the rule applies to all interfaces (Any) except for bridge group member interface.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here inlines the problem. In an ASA, the "real interface" would typically be the "inside interface" where the actual host with the private IP address resides. However, it describes the "real interface" as "&lt;EM&gt;one through which the traffic enters the device.&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;For a publicly accessible server I would expect my unsolicited traffic would be entering from the "outside" or "mapped interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thoughts?&lt;/P&gt;&lt;DIV class="column"&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 05 Nov 2017 20:26:48 GMT</pubDate>
    <dc:creator>andrew.er.brown</dc:creator>
    <dc:date>2017-11-05T20:26:48Z</dc:date>
    <item>
      <title>Static NAT for FTD?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511292#M133098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;I have been attempting to find documentation that shows how to create a static 1:1 NAT statement in FTD for a server that needs to be accessible on the Internet.&lt;/P&gt;&lt;P&gt;The only documentation I can find talks about how NAT works in FTD but does not give a step by step procedure of how to do so in the FMC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, in my lab, I have a web server that needs to be accessible on port 80.&lt;/P&gt;&lt;P&gt;Private IP address: 192.168.254.3&lt;/P&gt;&lt;P&gt;Public IP address: 10.13.1.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Port opening: TCP/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have a cut and dry method for doing this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2017 15:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511292#M133098</guid>
      <dc:creator>andrew.er.brown</dc:creator>
      <dc:date>2017-11-01T15:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for FTD?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511293#M133100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;Below link has all the procedure of how you can create NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/Network_Address_Translation__NAT__for_Threat_Defense.pdf" rel="nofollow" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/601/configuration/guide/fpmc-config-guide-v601/Network_Address_Translation__NAT__for_Threat_Defense.pdf&lt;/A&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Nov 2017 16:31:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511293#M133100</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-11-01T16:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for FTD?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511294#M133102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pranay, thanks for your response, however this is the part of the document that creates confusion;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Configure the basic rule options:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;• Source Interface, Destination Interface—(Required for bridge group member interfaces.) The interfaces where this NAT rule applies. Source is the real interface, the one through which the traffic enters the device. Destination is the mapped interface, the one through which traffic exits the device. By default, the rule applies to all interfaces (Any) except for bridge group member interface.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here inlines the problem. In an ASA, the "real interface" would typically be the "inside interface" where the actual host with the private IP address resides. However, it describes the "real interface" as "&lt;EM&gt;one through which the traffic enters the device.&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;For a publicly accessible server I would expect my unsolicited traffic would be entering from the "outside" or "mapped interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thoughts?&lt;/P&gt;&lt;DIV class="column"&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 05 Nov 2017 20:26:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511294#M133102</guid>
      <dc:creator>andrew.er.brown</dc:creator>
      <dc:date>2017-11-05T20:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT for FTD?</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511295#M133104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andrew,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my opinion both you and the document is correct. NAT is always configured from the perspective of where the host resides. See in below example &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Inside)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Server A&amp;nbsp; ----------&amp;nbsp; FTD&lt;/P&gt;&lt;P&gt; (192.168.75.14)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; (DMZ)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Host B (192.168.76.14)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Host B wants to access the server on IP 192.168.76.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The rule that I will create is on firepower is &lt;/P&gt;&lt;P&gt;firepower# show run nat&lt;/P&gt;&lt;P&gt;nat (inside,dmz) source static Host-A Host-B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where the object is &lt;/P&gt;&lt;P&gt;firepower# show run object&lt;/P&gt;&lt;P&gt;object network Host-A&lt;/P&gt;&lt;P&gt; host 192.168.75.14&lt;/P&gt;&lt;P&gt;object network Host-B&lt;/P&gt;&lt;P&gt; host 192.168.76.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So on firepower while creating the rule,the source interface is "inside" and destination interface is "dmz". However this is because if we assume that traffic is bidirectional then traffic going from inside to DMZ is source NAT and in this case source interface is inside and destination is DMZ. If we reverse the traffic then it is destination NAT (destination address is translating) which we need in case of servers. But the rule that we created is from inside perspective.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Pranay &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Nov 2017 07:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-for-ftd/m-p/3511295#M133104</guid>
      <dc:creator>Pranay Prasoon</dc:creator>
      <dc:date>2017-11-06T07:42:12Z</dc:date>
    </item>
  </channel>
</rss>

