<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Yes, from the local network I in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954789#M148754</link>
    <description>&lt;P&gt;Yes, from the local network I can still ping the interface after enabling &lt;SPAN style="text-decoration: underline;"&gt;nat outside&lt;/SPAN&gt; on it but ports 22/23 instantly close&lt;/P&gt;</description>
    <pubDate>Sun, 06 Nov 2016 23:43:10 GMT</pubDate>
    <dc:creator>gpettydpmg</dc:creator>
    <dc:date>2016-11-06T23:43:10Z</dc:date>
    <item>
      <title>NAT on a stick disabling ssh</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954787#M148752</link>
      <description>&lt;P&gt;I've got a standard single interface router hosting a number of ipsec tunnels.&amp;nbsp; I'm attempting to add a loopback interface and enable nat outside on the physical interface.&amp;nbsp; The second I enable ip nat outside I lose ssh and telnet access from both inside and outside.&amp;nbsp; This being a azure csr router I have no console access to it and have to reboot it each time to get it back.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there some reason nat outside is blocking access?&amp;nbsp; I intend on using route maps to nat some specific tunnel traffic but simply enabling nat kicks me off entirely.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface Loopback1&lt;BR /&gt;&amp;nbsp;ip address 11.1.1.1 255.255.255.255&lt;BR /&gt;&amp;nbsp;ip nat inside&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/0&lt;BR /&gt;&amp;nbsp;ip address 172.31.3.4 255.255.255.0&lt;BR /&gt;&amp;nbsp;ip nat outside&lt;BR /&gt;&amp;nbsp;duplex auto&lt;BR /&gt;&amp;nbsp;speed auto&lt;BR /&gt;&amp;nbsp;crypto map clientvpn&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;ip nat inside source list NAT interface FastEthernet0/0 overload&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;permit ip 172.31.0.0&amp;nbsp;&amp;nbsp; 0.0.255.255 any&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:29:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954787#M148752</guid>
      <dc:creator>gpettydpmg</dc:creator>
      <dc:date>2019-03-12T08:29:54Z</dc:date>
    </item>
    <item>
      <title>what IP address are you</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954788#M148753</link>
      <description>&lt;P&gt;what IP address are you connecting to when ssh-ing into the machine? &amp;nbsp;172.31.3.4?&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2016 23:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954788#M148753</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2016-11-06T23:01:44Z</dc:date>
    </item>
    <item>
      <title>Yes, from the local network I</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954789#M148754</link>
      <description>&lt;P&gt;Yes, from the local network I can still ping the interface after enabling &lt;SPAN style="text-decoration: underline;"&gt;nat outside&lt;/SPAN&gt; on it but ports 22/23 instantly close&lt;/P&gt;</description>
      <pubDate>Sun, 06 Nov 2016 23:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954789#M148754</guid>
      <dc:creator>gpettydpmg</dc:creator>
      <dc:date>2016-11-06T23:43:10Z</dc:date>
    </item>
    <item>
      <title>Ok I think I figured out what</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954790#M148755</link>
      <description>&lt;P&gt;Ok I think I figured out what I was missing.&amp;nbsp; I expected because i was on the local network I would still have access to those ports but becaues I've enabled nat outside on it, it blocks incoming traffic.&amp;nbsp; I can actually access ssh/telnet on the loopback ip if I'm routed to the F0/0 interface.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All I needed was to open the port with a static map&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ip nat inside source static tcp 11.1.1.1 23 int f0/0 23&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;That opened telnet back up, silly oversight on my part.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 17:39:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954790#M148755</guid>
      <dc:creator>gpettydpmg</dc:creator>
      <dc:date>2016-11-07T17:39:52Z</dc:date>
    </item>
    <item>
      <title>You may have to enable SSH on</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954791#M148756</link>
      <description>&lt;P&gt;You may have to enable SSH on an additional, non-default port.&amp;nbsp; In my experience ASA firmwares don't handle direct access to addresses+ports with NAT mappings in the way you might expect.&amp;nbsp; If you keep the NAT mapping and the local access separate, they will probably both work simultaneously.&amp;nbsp; Otherwise, not.&lt;/P&gt;
&lt;P&gt;-- Jim Leinweber, WI State Lab of Hygiene&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2016 18:02:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-a-stick-disabling-ssh/m-p/2954791#M148756</guid>
      <dc:creator>James Leinweber</dc:creator>
      <dc:date>2016-11-07T18:02:02Z</dc:date>
    </item>
  </channel>
</rss>

