<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5506-X PAT,NAT,ACL Single Public IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700363#M13689</link>
    <description>&lt;P&gt;Thanks for the reply, I did find that same article and it doesn't work in my lab. That was the second option I did with the network object NAT policy. The packet is dropped at the Firewall by the global deny all ACL.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Sep 2018 13:11:33 GMT</pubDate>
    <dc:creator>Ryeloc</dc:creator>
    <dc:date>2018-09-04T13:11:33Z</dc:date>
    <item>
      <title>ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3699920#M13686</link>
      <description>&lt;P&gt;I'm having a confusing moment configuring static NAT with a Single IP address.&lt;/P&gt;
&lt;P&gt;I want to allow TCP-1723 traffic through to a server on the inside interface, while using a single IP address for this static NAT and PAT from inside to outside.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for starters I'm using&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This gets me up and running using PAT. Now I want to configure my internal server to allow the connections for a static TCP port inbound&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;object service TCP-1723&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;service tcp destination eq pptp&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;object network SERVER-1&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;host&lt;SPAN&gt;&amp;nbsp;1&lt;/SPAN&gt;0.1.1.10&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;object network WAN-2&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;host&lt;SPAN&gt;&amp;nbsp;1&lt;/SPAN&gt;.1.1.2&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;nat (outside,inside) source static any any destination static WAN-2 SERVER-1 service TCP-1723 TCP-1723 unidirectional no-proxy-arp&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;ERROR: Address 1.1.1.2 overlaps with outside interface address.&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;ERROR: NAT Policy is not downloaded&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;That doesn't seem to work... so I went another route&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;object network SERVER-1&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;nat (inside,outside) static interface service tcp 1723 1723&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;access-list outside_access_in extended permit tcp any object&amp;nbsp;SERVER-1&amp;nbsp;eq 1723&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;access-group outside_access_in in interface outside&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;The ASA seems to have accepted the commands and created a network object NAT rule.&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s570a4-10 iEJDri"&gt;I test, and nothing. I check my ACL and it has 0 hit counts. Not sure what the issue is here, I don't seem to have any issues when using a public IP address that's not assigned to my outside interface. For example, if I used 1.1.1.3/29. In my environment I only have a single public IP address so that's not going to be doable.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:11:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3699920#M13686</guid>
      <dc:creator>Ryeloc</dc:creator>
      <dc:date>2020-02-21T16:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3699953#M13687</link>
      <description>&lt;P&gt;Look out good example and explained well&amp;nbsp; :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.packet6.com/configuring-nat-for-a-public-server-using-same-outside-interface/" target="_blank"&gt;https://www.packet6.com/configuring-nat-for-a-public-server-using-same-outside-interface/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 20:08:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3699953#M13687</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-09-03T20:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700203#M13688</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The configuration looks okay. Can you please attach a packet-tracer output:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;packet-tracer input outside tcp 4.2.2.2 3344 &amp;lt;outside interface IP&amp;gt; 1723 det&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;also, you would need to enable pptp inspection so that secondary channel for GRE can be opened dynamically by the Firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 08:43:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700203#M13688</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2018-09-04T08:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700363#M13689</link>
      <description>&lt;P&gt;Thanks for the reply, I did find that same article and it doesn't work in my lab. That was the second option I did with the network object NAT policy. The packet is dropped at the Firewall by the global deny all ACL.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 13:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700363#M13689</guid>
      <dc:creator>Ryeloc</dc:creator>
      <dc:date>2018-09-04T13:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700367#M13690</link>
      <description>&lt;P&gt;Ajay,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was able to get this figured out for the original nat. Instead of using the network object for my WAN-IP I just used the interface command instead. Example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (outside,inside) source static any any destination static interface SERVER-1 service TCP-1723 TCP-1723 unidirectional no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I still wasn't able to get it to work with the network object NAT policy but that's probably because I don't understand the network object NAT policies as much. I will rebuild the lab later today and send you the packet tracer outputs for the network object NAT.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 13:14:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3700367#M13690</guid>
      <dc:creator>Ryeloc</dc:creator>
      <dc:date>2018-09-04T13:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5506-X PAT,NAT,ACL Single Public IP</title>
      <link>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3705178#M13691</link>
      <description>&lt;P&gt;Sorry for the late reply, I ended up figuring this out. The reason I couldn't get it to work is because I needed to use my outside IP address. For that I had to use the "interface" command rather than the "object" command in the NAT line.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OLD:&amp;nbsp;&lt;SPAN&gt;nat (outside,inside) source static any any destination static WAN-2 SERVER-1 service TCP-1723 TCP-1723 unidirectional no-proxy-arp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;NEW:&amp;nbsp;nat (outside,inside) source static any any destination static interface SERVER-1 service TCP-1723 TCP-1723 unidirectional no-proxy-arp&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 21:34:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5506-x-pat-nat-acl-single-public-ip/m-p/3705178#M13691</guid>
      <dc:creator>Ryeloc</dc:creator>
      <dc:date>2018-09-11T21:34:42Z</dc:date>
    </item>
  </channel>
</rss>

