<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850872#M153437</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Have you enabled this command as both the interfaces are on the same security level ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
    <pubDate>Tue, 31 May 2016 12:47:28 GMT</pubDate>
    <dc:creator>Aditya Ganjoo</dc:creator>
    <dc:date>2016-05-31T12:47:28Z</dc:date>
    <item>
      <title>nat rules help from outside to dmz with both security level 0</title>
      <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850871#M153436</link>
      <description>&lt;P&gt;DMZ&lt;/P&gt;
&lt;P&gt;Security level 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Outside&lt;/P&gt;
&lt;P&gt;security leve 0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network DMZ&lt;BR /&gt;&amp;nbsp;host 192.168.50.10&lt;BR /&gt;object network DMZ&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static 192.168.192.3&lt;BR /&gt;&lt;BR /&gt;object network remote-hostin&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;object network remote-hostin&lt;BR /&gt;nat (outside,dmz) static 192.168.192.4&lt;BR /&gt;&lt;BR /&gt;access-list Remote-hostin extended permit ip object remote-hostin object DMZ&lt;BR /&gt;access-group Remote-hostin in interface DMZ&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;kindly could some one advise as this rules are not working. where i am making the mistake?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:49:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850871#M153436</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-03-12T07:49:10Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850872#M153437</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Have you enabled this command as both the interfaces are on the same security level ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2016 12:47:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850872#M153437</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-31T12:47:28Z</dc:date>
    </item>
    <item>
      <title>hello Aditya,</title>
      <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850873#M153438</link>
      <description>&lt;P&gt;hello Aditya,&lt;/P&gt;
&lt;P&gt;i gave the command you mentined but the packet tracere still showing acl drop&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;packet-tracer input dmZ rawip 192.168.50.10 1 1.1.1.1 $&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outside&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in&amp;nbsp; id=0xbc6725f8, priority=11, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hits=1, user_data=0x5, cs_id=0x0, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src ip/id=0.0.0.0, mask=0.0.0.0, port=0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, dscp=0x0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; input_ifc=DMZ, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: outside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2016 12:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850873#M153438</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-05-31T12:57:22Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850874#M153439</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you tell me why are we using two different NAT statements ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What is your objective ? could you please elaborate on the requirement ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;</description>
      <pubDate>Tue, 31 May 2016 17:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850874#M153439</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-05-31T17:27:16Z</dc:date>
    </item>
    <item>
      <title>192.168.192.0/27 is a private</title>
      <link>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850875#M153440</link>
      <description>&lt;P&gt;192.168.192.0/27 is a private WAN network for the corprate network. we share this network with other supplier that why we are using another nat (RFC) address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;server 1.1.1.1 is a remote and running FTP, SNMP, TFTP services. 192.168.50.0 is assign to DMZ zone.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;objective is when remote server comes in DMZ it get translated into 192.168.192.0 address.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 15:49:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rules-help-from-outside-to-dmz-with-both-security-level-0/m-p/2850875#M153440</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2016-06-01T15:49:18Z</dc:date>
    </item>
  </channel>
</rss>

