<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I got it to work!  Below is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944653#M149224</link>
    <description>&lt;P&gt;I got it to work!&amp;nbsp; Below is the NAT statement i ended up using. My only question that i don't understand is why does it work using the real port numbers on the original and translated? I didn't use my mapped port in the NAT statement &amp;nbsp; Either way thank you very much for all the help!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,inside) source dynamic NETWORK_INSIDE interface destination static interface-outside Garage_Camera service Real_GARAGE_CAM Real_GARAGE_CAM&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;BR /&gt;nat (inside,inside) source dynamic NETWORK_INSIDE interface destination static interface-outside Backyard_Camera service Real_Backyard_Camera Real_Backyard_Camera&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Mar 2017 01:45:19 GMT</pubDate>
    <dc:creator>Computerwiz24</dc:creator>
    <dc:date>2017-03-13T01:45:19Z</dc:date>
    <item>
      <title>Hairpinning?</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944632#M149203</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;I have a Cisco ASA 5505 Firewall I need some help with.&amp;nbsp; I have 2 cameras set up on my inside network that I need access to from my&amp;nbsp;outside network. I setup the NAT rules from outside to inside along with the access list to allow traffic. Everything works fine as long as I'm not on my internal network. When I'm on my internal work it doesn't work. I need to set it up so I can use my external IP for both internal and external use. Doing some research I think I need to use hairpinning? I have tried setting it up but not having much luck. Can someone help me with the config needed for hairpinning?&amp;nbsp; I can post my config if needed.&amp;nbsp; Thank you for any help on this issue.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:24:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944632#M149203</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2019-03-12T08:24:11Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944633#M149204</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Are you using&amp;nbsp;same-security-traffic permit intra-interface command on the ASA ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also please share the config snippet that you have used for the &lt;G class="gr_ gr_155 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="155" data-gr-id="155"&gt;hairpinning&lt;/G&gt; ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please share the packet tracer output for the inside traffic as well.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Oct 2016 07:48:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944633#M149204</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-10-16T07:48:14Z</dc:date>
    </item>
    <item>
      <title>I do have same-security</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944634#M149205</link>
      <description>&lt;P&gt;I do have same-security-traffic permit intra-interface&amp;nbsp;enabled on the ASA. I deleted my hairpinning config to start over. Do I need a route from inside to inside? Also do I need a NAT statement to pass hairpinning traffic?&amp;nbsp; Attached is my running config.&amp;nbsp; Thank you&lt;/P&gt;</description>
      <pubDate>Tue, 18 Oct 2016 21:10:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944634#M149205</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-10-18T21:10:35Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944635#M149206</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please share the output of packet tracer output for the concerned traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Oct 2016 04:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944635#M149206</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-10-19T04:46:17Z</dc:date>
    </item>
    <item>
      <title>Attached is the packet tracer</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944636#M149207</link>
      <description>&lt;P&gt;Attached is the packet tracer output&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Thank you&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 02:36:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944636#M149207</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-10-22T02:36:25Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944637#M149208</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It gives an ACL drop but you already have enabled same-security command.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So could you check if you have a NAT statement configured for the traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Oct 2016 05:13:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944637#M149208</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-10-22T05:13:35Z</dc:date>
    </item>
    <item>
      <title>I have NAT Rule set up but I</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944638#M149209</link>
      <description>&lt;P&gt;I have NAT Rule set up but I don't know I have it correct.&amp;nbsp; I attached my running config&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Sun, 23 Oct 2016 00:28:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944638#M149209</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-10-23T00:28:24Z</dc:date>
    </item>
    <item>
      <title>Don't have any config to take</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944639#M149210</link>
      <description>&lt;P&gt;Don't have any config to take a look at, but you could try editing your hairpin NAT rule:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;nat (inside,inside) source static &amp;lt;inside_client_ip&amp;gt; &amp;lt;inside_client_ip&amp;gt; destination static &amp;lt;outside_camera_ip&amp;gt; &amp;lt;inside_camera_ip&amp;gt;
&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Oct 2016 19:15:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944639#M149210</guid>
      <dc:creator>niko</dc:creator>
      <dc:date>2016-10-25T19:15:50Z</dc:date>
    </item>
    <item>
      <title>DNS Rewrite / Doctoring might</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944640#M149211</link>
      <description>&lt;P&gt;DNS Rewrite / Doctoring might work for this.&lt;/P&gt;
&lt;P&gt;From&amp;nbsp;http://packetsneverlie.blogspot.com/2010/08/dns-rewrite.html&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;DNS Rewrite is a feature of the ASA and PIX that enable the firewall to rewrite DNS A queries when the destination server is located at the same network that the client or, for example, if the public IP address of that server is statically mapped to some DMZ address&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here is another good article from Cisco&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;http://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/72273-dns-doctoring-3zones.html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Good luck&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Craig&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2016 22:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944640#M149211</guid>
      <dc:creator>craig.cordts</dc:creator>
      <dc:date>2016-11-02T22:17:39Z</dc:date>
    </item>
    <item>
      <title>This is what we need here:</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944641#M149212</link>
      <description>&lt;P&gt;This is what we need here:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;While accessing this from internal, we need 2 things:&lt;/P&gt;
&lt;P&gt;1. destination translation so that when we hit the public ip, firewall should do a proxy-arp and send traffic back to internal camera real ip&lt;/P&gt;
&lt;P&gt;2. source ip mapped to internal interface ip address so that reply packets go back to ASA and hence we dont have asymetric routing.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Remove the (inside,inside) nat statement that you have added and try below (I am taking an example):&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;real ip of camera - x.x.x.x&lt;/P&gt;
&lt;P&gt;mapped ip of camera - y.y.y.y&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj-real&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; host x.x.x.x&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network obj-map&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; host y.y.y.y&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat (inside,inside) source dynamic any interface destination static&amp;nbsp;&lt;SPAN&gt;obj-map&amp;nbsp;obj-real&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Please try this in a downtime and let me know if that works.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HTH&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2016 10:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944641#M149212</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-11-03T10:51:25Z</dc:date>
    </item>
    <item>
      <title>niko,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944642#M149213</link>
      <description>&lt;P&gt;niko,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Can i use &amp;lt;any&amp;gt; for my client IP? I want any inside address to be able to access cameras. i can attach my running config if that helps?&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thank you&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2016 15:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944642#M149213</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-12-10T15:46:22Z</dc:date>
    </item>
    <item>
      <title>So i got part of it figured</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944643#M149214</link>
      <description>&lt;P&gt;So i got part of it figured it I have one camera working but the other still doesn't work. I think the reason is i have to use &amp;lt;any&amp;gt; Service to get it to work. Since i have to use my outside interface for the destination on both Im thinking the service port will determine which NAT rule to use.With &amp;lt;any&amp;gt; service port&amp;nbsp; the first NAT rule accepts and it never makes it to the next rule. therefore the 2nd camera never gets permitted.I change the order of the NAT rules and the other camera starts working.&amp;nbsp; If i change the service to the port I'm using instead of &amp;lt;any&amp;gt; the camera quits working. Any idea what causes this?&lt;/P&gt;</description>
      <pubDate>Sat, 10 Dec 2016 17:33:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944643#M149214</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-12-10T17:33:15Z</dc:date>
    </item>
    <item>
      <title>Can you please share the 2</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944644#M149215</link>
      <description>&lt;P&gt;Can you please share the 2 NAT statements that you add when using 'port' instead of 'any' in (inside,inside) nat statement. Also, please attach the syslogs you see when none of the camera works.&lt;/P&gt;
&lt;P&gt;We have to use port based NAT statement coz if we use 'any', as you correctly figured out, only first nat will be honored and second will never be matched.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, I would recommend using PATing the inside user to inside interface ip address so that reply packet comes to ASA interace and the traffic flow is symmetric.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;something like below:&lt;/P&gt;
&lt;PRE class="prettyprint prettyprinted"&gt;&lt;SPAN class="pln"&gt;nat &lt;/SPAN&gt;&lt;SPAN class="pun"&gt;(&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;,&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;inside&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;)&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; source &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;static&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="str"&gt;&amp;lt;inside_client_ip&amp;gt;&lt;/SPAN&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;SPAN class="str"&gt;&amp;lt;inside interace ip&amp;gt; ...*************&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Dec 2016 10:00:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944644#M149215</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-12T10:00:46Z</dc:date>
    </item>
    <item>
      <title>Linkin.24</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944645#M149216</link>
      <description>&lt;P&gt;Linkin.24&lt;/P&gt;
&lt;P&gt;Is this what you need to see?&lt;/P&gt;
&lt;P&gt;These are&amp;nbsp;the&amp;nbsp;NAT statements&amp;nbsp;I have when neither camera works&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;See Attached&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 18:08:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944645#M149216</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-12-15T18:08:55Z</dc:date>
    </item>
    <item>
      <title>If I change it to what's</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944646#M149217</link>
      <description>&lt;P&gt;If I change it to what's shown in this screen&amp;nbsp;shot attached&amp;nbsp;one camera will work&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 18:12:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944646#M149217</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2016-12-15T18:12:36Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944647#M149218</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The screenshot didn't help much. I am used to CLI anyways.. Could you please have 2 NAT statements as below:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,inside) source dynamic any interface destination static&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;obj-map&amp;nbsp;obj-real&amp;nbsp;service MAPPED_port REAL_port&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,inside) source dynamic any interface destination static&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;obj-map&amp;nbsp;obj-real&amp;nbsp;service MAPPED_port1 REAL_port1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Add this for 2 different destination ports as requirement. you can follow the below doc which has the same example:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa83/configuration/guide/config/nat_rules.html&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Remember, the only way it can work is to make either of the things unique - source address, dest addr or source port or dest port. Unfortunately, the only thing we can utilize is dest port. Please try in a maintenace window and let us know if it works.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;-&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;AJ&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Dec 2016 06:10:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944647#M149218</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2016-12-18T06:10:53Z</dc:date>
    </item>
    <item>
      <title>AJ,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944648#M149219</link>
      <description>&lt;P&gt;AJ,&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;I don't quite understand the twice NAT? Can you explain and post an example?&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Sun, 05 Mar 2017 01:49:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944648#M149219</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2017-03-05T01:49:52Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944649#M149220</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sorry for delay in response. All I suggested is to create 2 twice NAT statements wherein the destination real port is different and mapped port is same. Except the destination real port, NAT statements are exactly same. Let me know if that fits your requirement. The link that I attached talks about same stuff.&lt;/P&gt;
&lt;P&gt;The idea is to map the source ip to interface and destination mapping remains same combo. Just the dest port differs. Try to understand the flow here and you will get it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if there are any questions.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2017 21:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944649#M149220</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-03-10T21:50:08Z</dc:date>
    </item>
    <item>
      <title>No problem on the delay.  So</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944650#M149221</link>
      <description>&lt;P&gt;No problem on the delay.&amp;nbsp; So for example if my outside ip was x.x.x.x and my inside device was 192.168.1.200 on a 192.168.1.0 255.255.255.0 subnet&amp;nbsp; when im&amp;nbsp; on the internal network using my public IP&amp;nbsp; would my NAT statement look like this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Nat (inside,inside) source dynamic 192.168.1.0 interface destination static x.x.x.x&amp;nbsp; 192.168.1.200&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 00:52:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944650#M149221</guid>
      <dc:creator>Computerwiz24</dc:creator>
      <dc:date>2017-03-11T00:52:43Z</dc:date>
    </item>
    <item>
      <title>Yes, and since you need</title>
      <link>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944651#M149222</link>
      <description>&lt;P&gt;Yes, and since you need access on 2 destination ports, you can 2 of these statements with 2 different port numbers - one real and other mapped.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,inside) source dynamic any interface destination static&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;obj-map&amp;nbsp;obj-real&amp;nbsp;service MAPPED_port REAL_port&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;nat (inside,inside) source dynamic any interface destination static&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;obj-map&amp;nbsp;obj-real&amp;nbsp;service MAPPED_port1 REAL_port1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;'any' will be your inside network 192.168.1.0/x&lt;/P&gt;
&lt;P&gt;obj-real = 192.168.1.200&lt;/P&gt;
&lt;P&gt;obj-map = x.x.x.x&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MAPPED_port = first mapped port on which access is needed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MAPPED_port1 = second port on which access is needed&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;REAL_port1 - is the actual port on which server is listening&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you dont have a second destination port, you can just add one statement.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;-&lt;/P&gt;
&lt;P&gt;AJ&lt;/P&gt;</description>
      <pubDate>Sat, 11 Mar 2017 17:03:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/hairpinning/m-p/2944651#M149222</guid>
      <dc:creator>Ajay Saini</dc:creator>
      <dc:date>2017-03-11T17:03:03Z</dc:date>
    </item>
  </channel>
</rss>

