<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic aIf you wish to configure S2S in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008264#M146085</link>
    <description>&lt;P&gt;If you wish to configure S2S VPN on ASA with its outside interface's IP address as a peer device IP then it should not be an issue since&amp;nbsp;&lt;SPAN&gt;IKE phase 1 uses UDP 500.&amp;nbsp;&amp;nbsp; If the the peers are behind NAT device then NAT Traversal comes into the picture where they discover that they are connected through a NAT device somewhere, they will use UDP 4500 for IKE phase 1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So, make sure that you do not have configure PAT related to these ports otherwise it can create issues.&lt;/P&gt;
&lt;P&gt;Once the tunnel is up, the intended traffic (proxy ids) are matched for Phase 2 and along with the rest of the parameters.&lt;/P&gt;
&lt;P&gt;The good practice recommends to allow "ip" traffic between VPN subnets and MUST have no-nat (nat exemption) configured on the ASA.&lt;/P&gt;
&lt;P&gt;I hope this answers your question.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Mar 2017 22:56:11 GMT</pubDate>
    <dc:creator>trdatta</dc:creator>
    <dc:date>2017-03-07T22:56:11Z</dc:date>
    <item>
      <title>can i configure the ASA outside interface public ip as static nat for one of the inside servers</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008261#M146082</link>
      <description>&lt;P&gt;can i configure the ASA outside interface public ip as static nat for one of the inside servers&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:00:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008261#M146082</guid>
      <dc:creator>Manjunath S Chickmath</dc:creator>
      <dc:date>2019-03-12T09:00:37Z</dc:date>
    </item>
    <item>
      <title>This is not a good practice</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008262#M146083</link>
      <description>&lt;P&gt;This is not a good practice and if you do that then ASA's outside interface IP address will only be bounded to that particular server's internal IP address and cannot be taken in use for anything else as static nat is one to one nat and it may affect the internet traffic. But yes that depends upon your topology too.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case, you do not have much free public IP addresses and needs to use outside interface IP address, then you can also check regular static PAT which is also static in nature but port based. For eg : If you have webserver, then you can bound port 80 of outside's public IP address for your server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below is the link which can give you more information about static PAT:&lt;/P&gt;
&lt;P&gt;Till 8.2:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/113024-asa-82-port-forward-00.html&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For 8.3 and above:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa84/asdm64/configuration_guide/asdm_64_config/nat_objects.html#wp1106703&lt;/P&gt;
&lt;P&gt;from CLI:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;https://supportforums.cisco.com/document/33921/asa-pre-83-83-nat-configuration-examples&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate if this resolves your concern/issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;</description>
      <pubDate>Fri, 03 Mar 2017 19:54:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008262#M146083</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-03T19:54:22Z</dc:date>
    </item>
    <item>
      <title>thanks for the info.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008263#M146084</link>
      <description>&lt;P&gt;thanks for the info.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Being said that still we can Nat outside interface ip, can we pass the outside Nat Interface ip in site 2 site vpn ? again we will using outside interface ip as vpn peer ip, is this possible ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Mar 2017 04:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008263#M146084</guid>
      <dc:creator>Manjunath S Chickmath</dc:creator>
      <dc:date>2017-03-04T04:39:21Z</dc:date>
    </item>
    <item>
      <title>aIf you wish to configure S2S</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008264#M146085</link>
      <description>&lt;P&gt;If you wish to configure S2S VPN on ASA with its outside interface's IP address as a peer device IP then it should not be an issue since&amp;nbsp;&lt;SPAN&gt;IKE phase 1 uses UDP 500.&amp;nbsp;&amp;nbsp; If the the peers are behind NAT device then NAT Traversal comes into the picture where they discover that they are connected through a NAT device somewhere, they will use UDP 4500 for IKE phase 1.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;So, make sure that you do not have configure PAT related to these ports otherwise it can create issues.&lt;/P&gt;
&lt;P&gt;Once the tunnel is up, the intended traffic (proxy ids) are matched for Phase 2 and along with the rest of the parameters.&lt;/P&gt;
&lt;P&gt;The good practice recommends to allow "ip" traffic between VPN subnets and MUST have no-nat (nat exemption) configured on the ASA.&lt;/P&gt;
&lt;P&gt;I hope this answers your question.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Tripat Kaur&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2017 22:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-the-asa-outside-interface-public-ip-as-static/m-p/3008264#M146085</guid>
      <dc:creator>trdatta</dc:creator>
      <dc:date>2017-03-07T22:56:11Z</dc:date>
    </item>
  </channel>
</rss>

