<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Ajay, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063726#M135715</link>
    <description>&lt;P&gt;Hi Ajay,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Thanks for the reply. My question was more "What does the NAT COMMAND look like or what is the NAT COMMAND?"&lt;/P&gt;
&lt;P&gt;And possibly would it be easier to do the Natting on the router.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 10 May 2017 13:34:25 GMT</pubDate>
    <dc:creator>Afrederick123</dc:creator>
    <dc:date>2017-05-10T13:34:25Z</dc:date>
    <item>
      <title>Static NAT to Outside interface</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063724#M135713</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;I have the following configured:&amp;nbsp; ASA-5506 &amp;gt;&amp;gt;&amp;gt; ROUTER &amp;gt;&amp;gt;&amp;gt; ISP&lt;/P&gt;
&lt;P&gt;I have a range of public ip addresses of which the first X.X.X.49 is on the router interface and I need to have .50 traffic go to the ASA. I have already configured the router with a static route to pass all X.X.X.50 traffic to the ASA outside interface using the following:&lt;/P&gt;
&lt;P&gt;IP ROUTE X.X.X.50 255.255.255.255 192.168.56.2&lt;/P&gt;
&lt;P&gt;But what I'm struggling to configure is the static nat on the ASA. I'm finding lots of documentation on static nat to devices in the DMZ or Inside zones but nothing on how to make the Outside interface accept traffic for an IP address that isn't it's own.&lt;/P&gt;
&lt;P&gt;Any ideas welcome.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please understand the requirement before answering, I need the OUTSIDE interface(IP address 10.0.0.1) to accept traffic for (210.0.0.50)&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:20:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063724#M135713</guid>
      <dc:creator>Afrederick123</dc:creator>
      <dc:date>2019-03-12T09:20:20Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063725#M135714</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Apart from Static NAT, you need to add below command:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;arp permit-nonconnected&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/a3.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It will proxy arp on behalf of subnets that are not on ASA and for which NAT is configured.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 13:19:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063725#M135714</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-10T13:19:00Z</dc:date>
    </item>
    <item>
      <title>Hi Ajay,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063726#M135715</link>
      <description>&lt;P&gt;Hi Ajay,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Thanks for the reply. My question was more "What does the NAT COMMAND look like or what is the NAT COMMAND?"&lt;/P&gt;
&lt;P&gt;And possibly would it be easier to do the Natting on the router.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 13:34:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063726#M135715</guid>
      <dc:creator>Afrederick123</dc:creator>
      <dc:date>2017-05-10T13:34:25Z</dc:date>
    </item>
    <item>
      <title>ASA will accept any traffic</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063727#M135716</link>
      <description>&lt;P&gt;ASA will accept any traffic that comes on outside interface for&amp;nbsp;&lt;SPAN&gt;210.0.0.50 provided we have a NAT statement. The NAT statement depends on the requirement here - do you need&amp;nbsp;210.0.0.50 for PATing inside users trying to access internet or you want a static NAT in order to map some inside/dmz user with&amp;nbsp;210.0.0.50 to allow inbound connectivity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Below link, although is a comparison of 8.2 and 8.3 onwards NATs, but it consists of pretty much all possible NATs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/33921/asa-pre-83-83-nat-configuration-examples&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know the requirement and I can point into right direction.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 13:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063727#M135716</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-10T13:48:14Z</dc:date>
    </item>
    <item>
      <title>Hi Ajay,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063728#M135717</link>
      <description>&lt;P&gt;Hi Ajay,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;As I stated originally, I need traffic for the 210.0.0.50 IP address to come to the outside interface of the ASA. The traffic will be for the ASA itself. The ASA is inside the edge router as there's no way to terminate ADSL to the ASA hence we put the router at the edge. I am running Anyconnect on the ASA and so need it to receive traffic to the 210.0.0.50 IP address although it has 10.0.0.1 as it's IP address. I can make it no clearer than that. I've tried doing the NAT config on the router:&lt;/P&gt;
&lt;P&gt;IP NAT INSIDE SOURCE STATIC 10.0.0.1 255.255.255.255 210.0.0.50&lt;/P&gt;
&lt;P&gt;but still no joy.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 15:27:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063728#M135717</guid>
      <dc:creator>Afrederick123</dc:creator>
      <dc:date>2017-05-10T15:27:52Z</dc:date>
    </item>
    <item>
      <title>Hi Afrederick123,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063729#M135718</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://supportforums.cisco.com/users/afrederick123" title="View user profile." class="username" lang="" about="/users/afrederick123" typeof="sioc:UserAccount" property="foaf:name" datatype=""&gt;Afrederick123&lt;/A&gt;,&lt;/P&gt;
&lt;P&gt;You need to NAT on router and statement should be the following&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ip nat inside source static 10.0.0.1 210.0.0.50 extendable&lt;/P&gt;
&lt;P&gt;interface &amp;lt;ISP facing interface&amp;gt;&lt;/P&gt;
&lt;P&gt;ip nat ouside&lt;/P&gt;
&lt;P&gt;interface &amp;lt;ASA facing interface&amp;gt;&lt;/P&gt;
&lt;P&gt;ip nat inside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 15:39:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063729#M135718</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-05-10T15:39:37Z</dc:date>
    </item>
    <item>
      <title>That makes sense. Looks like</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063730#M135719</link>
      <description>&lt;P&gt;That makes sense. Looks like you are intending to use something like a secondary ip address on ASA but unfortunately that is not supported per my understanding.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Others might have some workaround for you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-AJ&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 15:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063730#M135719</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-05-10T15:41:43Z</dc:date>
    </item>
    <item>
      <title>Hey Team Spooster,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063731#M135720</link>
      <description>&lt;P&gt;Hey Team Spooster,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;That done it thanks, looks like I was just a bit out on my router command. Can you explain what the extendable part does please.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 16:10:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063731#M135720</guid>
      <dc:creator>Afrederick123</dc:creator>
      <dc:date>2017-05-10T16:10:22Z</dc:date>
    </item>
    <item>
      <title>Hi Afrederick123,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063732#M135721</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportforums.cisco.com/users/afrederick123" title="View user profile."&gt;Afrederick123&lt;/A&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"extendable" keyword&amp;nbsp;at the end of each NAT command will allow you to have two NAT entries for the same source IP address. Otherwise IOS will not allow that.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2017 16:55:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-to-outside-interface/m-p/3063732#M135721</guid>
      <dc:creator>Spooster IT Services</dc:creator>
      <dc:date>2017-05-10T16:55:09Z</dc:date>
    </item>
  </channel>
</rss>

