<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please share the current in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077486#M135592</link>
    <description>&lt;P&gt;Please share the current output of these two commands:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show run nat&lt;BR /&gt;&lt;BR /&gt;show run policy-map&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;Your Pix software is so old it does not support the packet-tracer command (introduced in 7.2(1)) that we would normally use for troubleshooting.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html&lt;/P&gt;</description>
    <pubDate>Mon, 15 May 2017 03:08:48 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2017-05-15T03:08:48Z</dc:date>
    <item>
      <title>PIX Firewall Config Setup Static &amp; NAT PIX 501 6.3</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077480#M135581</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have two Internal hosts that I would like to nat them but every time I'm trying to add the second host I'm getting a duplicate of existing static error.&lt;/P&gt;
&lt;P&gt;I also tried to create a group for this two hosts and add them statically into the nat rules but the same thing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internal IP address&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;192.168.11.122 &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;192.168.11.20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have this configuration into the PIX&amp;nbsp;&lt;/P&gt;
&lt;P&gt;global (outside) 1 192.168.100.1&lt;BR /&gt;static (inside,outside) 192.168.100.1 192.168.11.122 netmask 255.255.255.255 0 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;here is the error when I'm adding the second host&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;DC1N-AZAOC-PIX-02(config)# static (inside,outside) 192.168.100.1 192.168.11.20 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;ERROR: duplicate of existing static&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;from inside:192.168.11.122 to outside:192.168.200.3 netmask 255.255.255.255&lt;BR /&gt;Usage: [no] static [(real_ifc, mapped_ifc)]&lt;BR /&gt;{&amp;lt;mapped_ip&amp;gt;|interface}&lt;BR /&gt;{&amp;lt;real_ip&amp;gt; [netmask &amp;lt;mask&amp;gt;]} | {access-list &amp;lt;acl_name&amp;gt;}&lt;BR /&gt;[dns] [norandomseq] [&amp;lt;max_conns&amp;gt; [&amp;lt;emb_lim&amp;gt;]]&lt;BR /&gt;[no] static [(real_ifc, mapped_ifc)] {tcp|udp}&lt;BR /&gt;{&amp;lt;mapped_ip&amp;gt;|interface} &amp;lt;mapped_port&amp;gt;&lt;BR /&gt;{&amp;lt;real_ip&amp;gt; &amp;lt;real_port&amp;gt; [netmask &amp;lt;mask&amp;gt;]} |&lt;BR /&gt;{access-list &amp;lt;acl_name&amp;gt;}&lt;BR /&gt;[dns] [norandomseq] [&amp;lt;max_conns&amp;gt; [&amp;lt;emb_lim&amp;gt;]]&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please help&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:21:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077480#M135581</guid>
      <dc:creator>Laith7640</dc:creator>
      <dc:date>2019-03-12T09:21:34Z</dc:date>
    </item>
    <item>
      <title>You're cannot have a static</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077481#M135582</link>
      <description>&lt;P&gt;You're cannot have a static NAT for two hosts to the same outside address. You could let the dynamic nat (global type) handle it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 03:06:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077481#M135582</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-14T03:06:44Z</dc:date>
    </item>
    <item>
      <title>Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077482#M135584</link>
      <description>&lt;P&gt;Marvin,&lt;/P&gt;
&lt;P&gt;thanks for the quick response, would u please show me how to reconfigure it or what is going to be the correct syntax to do dynamic nat&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 03:15:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077482#M135584</guid>
      <dc:creator>Laith7640</dc:creator>
      <dc:date>2017-05-14T03:15:17Z</dc:date>
    </item>
    <item>
      <title>You're halfway there with</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077483#M135587</link>
      <description>&lt;P&gt;You're halfway there with your existing configuration.&lt;/P&gt;
&lt;P&gt;These two commands will dynamically NAT hosts in the 192.168.11.0 subnet to 192.168.100.1.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (inside) 1 192.168.11.0 255.255.255.0 &amp;nbsp; &amp;lt;--- this assumes it is a /24.&lt;BR /&gt;global (outside) 1 192.168.100.1&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 11:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077483#M135587</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2017-05-14T11:13:12Z</dc:date>
    </item>
    <item>
      <title>That's correct @jjohnston1127</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077484#M135589</link>
      <description>&lt;P&gt;That's correct&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/jjohnston1127"&gt;jjohnston1127&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/Laith7640"&gt;Laith7640&lt;/A&gt;&lt;/SPAN&gt;&amp;nbsp; Please let us know if that works for you.&lt;/P&gt;</description>
      <pubDate>Sun, 14 May 2017 15:13:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077484#M135589</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-14T15:13:07Z</dc:date>
    </item>
    <item>
      <title>still not working, I'm not</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077485#M135590</link>
      <description>&lt;P&gt;still not working, I'm not able to ping the other side public IP address, from the server &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;that has the IP address &lt;SPAN&gt;192.168.11.122&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp; everything works just fine but the other one&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with dynamic nat still not working&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 03:02:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077485#M135590</guid>
      <dc:creator>Laith7640</dc:creator>
      <dc:date>2017-05-15T03:02:17Z</dc:date>
    </item>
    <item>
      <title>Please share the current</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077486#M135592</link>
      <description>&lt;P&gt;Please share the current output of these two commands:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show run nat&lt;BR /&gt;&lt;BR /&gt;show run policy-map&lt;BR /&gt;&lt;BR /&gt;&lt;/PRE&gt;
&lt;P&gt;Your Pix software is so old it does not support the packet-tracer command (introduced in 7.2(1)) that we would normally use for troubleshooting.&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/I-R/cmdref2/p1.html&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 03:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077486#M135592</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-15T03:08:48Z</dc:date>
    </item>
    <item>
      <title>router# sh run policy-map:</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077487#M135593</link>
      <description>&lt;P&gt;router# sh run policy-map&lt;BR /&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;PIX Version 6.3&lt;GS id="0f61862c-4d2b-4d3f-b653-5a19eacba7d4" ginger_software_uiphraseguid="e02f810e-9c88-401d-a880-c6a0ed80d719" class="GINGER_SOFTWARE_mark"&gt;(&lt;/GS&gt;5)&lt;BR /&gt;&lt;GS id="6f289d8d-eeb1-44ba-87f8-e6c3ec794031" ginger_software_uiphraseguid="95af62ec-c834-4475-bc10-dd440a62f7c0" class="GINGER_SOFTWARE_mark"&gt;interface&lt;/GS&gt; ethernet0 auto&lt;BR /&gt;&lt;GS id="723d5538-5b43-4f87-a5aa-3e68e5ea0380" ginger_software_uiphraseguid="0ba4953b-ffaf-4cd4-8124-9ac4ae76aebe" class="GINGER_SOFTWARE_mark"&gt;interface&lt;/GS&gt; ethernet1 100full&lt;BR /&gt;&lt;G class="gr_ gr_17 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="17" data-gr-id="17"&gt;&lt;GS id="bbbda2ae-bf6d-4945-9d9a-56d55d7119b7" ginger_software_uiphraseguid="02967e0b-5ab8-44b7-adb1-35ef9ae936fd" class="GINGER_SOFTWARE_mark"&gt;nameif&lt;/GS&gt;&lt;/G&gt; ethernet0 outside security0&lt;BR /&gt;&lt;G class="gr_ gr_18 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="18" data-gr-id="18"&gt;&lt;GS id="33d276aa-65bc-4aae-aeb1-b140b83cf416" ginger_software_uiphraseguid="a8ac71de-2683-4d62-8a74-dd69df6e7a6c" class="GINGER_SOFTWARE_mark"&gt;nameif&lt;/GS&gt;&lt;/G&gt; ethernet1 inside security100&lt;/P&gt;
&lt;P&gt;&lt;GS id="5dbc074b-f278-42b2-a2a1-404a75ca353c" ginger_software_uiphraseguid="69a5e2bb-3b9c-4612-9f91-9660ec1b6cbc" class="GINGER_SOFTWARE_mark"&gt;access&lt;/GS&gt;-group 100 in interface outside&lt;/P&gt;
&lt;P&gt;&lt;GS id="aa85c01c-e47d-4571-b451-ccc88ecf45e0" ginger_software_uiphraseguid="cc2a6066-bbbd-4a00-a503-0fef26bca69c" class="GINGER_SOFTWARE_mark"&gt;access&lt;/GS&gt;-list 100 permit &lt;G class="gr_ gr_19 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="19" data-gr-id="19"&gt;icmp&lt;/G&gt; host 192.168.11.20 host 192.168.100.1 &lt;BR /&gt;&lt;GS id="d6e42ce6-7b2a-48d7-81eb-781bfc633ebb" ginger_software_uiphraseguid="f6e4b2ba-b439-4b9f-97a0-da496d3038b3" class="GINGER_SOFTWARE_mark"&gt;access&lt;/GS&gt;-list 100 permit &lt;G class="gr_ gr_20 gr-alert gr_spell gr_inline_cards gr_run_anim ContextualSpelling ins-del multiReplace" id="20" data-gr-id="20"&gt;icmp&lt;/G&gt; host 192.168.100.1 host &lt;SPAN&gt;192.168.11.20&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 03:59:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077487#M135593</guid>
      <dc:creator>Laith7640</dc:creator>
      <dc:date>2017-05-15T03:59:02Z</dc:date>
    </item>
    <item>
      <title>Sorry but the old software is</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077488#M135594</link>
      <description>&lt;P&gt;Sorry but the old software is not even giving the correct output for those basic statements.&lt;/P&gt;
&lt;P&gt;Could you just attach the whole configuration ("show run" output)?&lt;/P&gt;
&lt;P&gt;Oh - and by the way - you will never be able to ping (get an icmp echo reply) the server's public IP address from the server itself. You need to verify the configuration by trying to ping a remote system from the server or, if you have allowed icmp inbound access, by pinging the server's public IP address from a remote system.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2017 03:59:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077488#M135594</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-05-15T03:59:03Z</dc:date>
    </item>
    <item>
      <title>Marvin,jjohnston1127  </title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077489#M135595</link>
      <description>&lt;P&gt;Marvin&lt;GS id="c044f7b6-3012-4ce0-8e23-3179165073f8" ginger_software_uiphraseguid="0c22a12b-4f52-4ce1-a7ca-26f875bf0afd" class="GINGER_SOFTWARE_mark"&gt;,&lt;/GS&gt;&lt;SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/jjohnston1127" title="jjohnston1127"&gt;jjohnston1127&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Big Thanks to you guys finally I got this to work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I had to do to get this working &amp;nbsp;is the following&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;1- Remove&amp;nbsp;the static Nat&amp;nbsp;translation &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Static (inside, outside) 192.168.100.1 192.168.11.20 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2- Add the dynamic NAT&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;&lt;GS id="55318b9d-efc5-4f96-93a8-0432cd49bb10" ginger_software_uiphraseguid="1417d5d8-3d50-4550-bdf2-4f590e96cb38" class="GINGER_SOFTWARE_mark"&gt;nat&lt;/GS&gt; &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;1&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;192.168&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;11.0&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.255&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;.&lt;/SPAN&gt;&lt;SPAN class="lit"&gt;255.0&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3- Clear Xlate&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 May 2017 16:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-config-setup-static-nat-pix-501-6-3/m-p/3077489#M135595</guid>
      <dc:creator>Laith7640</dc:creator>
      <dc:date>2017-05-16T16:12:54Z</dc:date>
    </item>
  </channel>
</rss>

