<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Here I am considering that in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887830#M155029</link>
    <description>&lt;P&gt;Here I am considering that you want to translate 192,169.1.100-110 range of IP address into 10.20.1.100-110 raneg if IP addresses so that application existing in subnet 10.20.1.0/24 can access network behind ASA-1 as their local network.&lt;/P&gt;
&lt;P&gt;NAT configuration :-&lt;/P&gt;
&lt;P&gt;ASA-1&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;object network obj-192.168.1.100-110&lt;BR /&gt;&amp;nbsp;range 192.168.1.100 192.168.1.110&lt;BR /&gt;object network obj-10.20.1.100-110&lt;BR /&gt;&amp;nbsp;range 10.20.1.100 10.20.1.110&lt;/P&gt;
&lt;P&gt;nat (outside,inside) source static any any destination static obj-10.20.1.100-110 obj-192.168.1.100-110&lt;/P&gt;
&lt;P&gt;ASA-2&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;object network obj-10.20.1.100-110&lt;BR /&gt;&amp;nbsp;range 10.20.1.100 10.20.1.110&lt;BR /&gt;object network obj-192.168.1.100-110&lt;BR /&gt;&amp;nbsp;range 192.168.1.100 192.168.1.110&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static any any destination static obj-10.20.1.100-110 obj-192.168.1.100-110&lt;/P&gt;
&lt;P&gt;--------END OF CONFIGURATION----------&lt;/P&gt;
&lt;P&gt;As per the above natting configuration, application located in ASA-2 network will be able to access 192.168.1.100-110 network located in ASA-1 network through local subnet of 10.20.1.100-110.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Apr 2016 02:36:51 GMT</pubDate>
    <dc:creator>kkhapeka</dc:creator>
    <dc:date>2016-04-08T02:36:51Z</dc:date>
    <item>
      <title>NAT solution</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887828#M155027</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PFA, I need to add inside network 192.168.1.100-110(10 host) &amp;nbsp;of ASA1 into DMZ(10.20.1.100) of ASA2 for application.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is it possible to achieve it using NAT on ASA1 firewall.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please help me to write NAT configuration on firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:35:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887828#M155027</guid>
      <dc:creator>mynetwork014</dc:creator>
      <dc:date>2019-03-12T07:35:26Z</dc:date>
    </item>
    <item>
      <title>Hello...</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887829#M155028</link>
      <description>&lt;P&gt;Hello...&lt;/P&gt;
&lt;P&gt;ASA1 should first know how to get into DMZ network behind ASA2. If you already have this routing properly, and want your source to keep as original, you can use twice NAT as follows:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA1 config&lt;/P&gt;
&lt;P&gt;object-group network obj_192.168.1.100-110&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object host 192.168.1.100&lt;/P&gt;
&lt;P&gt;... (add all hosts on the range you want)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object host 192.168.1.110&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network obj_10.20.1.100_DMZ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.20.1.100&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static obj_192.168.1.100-110 obj_192.168.1.100-110 destination static obj_10.20.1.100_DMZ obj_10.20.1.100_DMZ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ASA2 config:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object-group network obj_192.168.1.100-110&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object host 192.168.1.100&lt;/P&gt;
&lt;P&gt;... (add all hosts on the range you want)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;network-object host 192.168.1.110&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;object network obj_10.20.1.100_DMZ&lt;/P&gt;
&lt;P&gt;&amp;nbsp;host 10.20.1.100&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;nat (inside,DMZ) source static obj_192.168.1.100-110 obj_192.168.1.100-110 destination static obj_10.20.1.100_DMZ obj_10.20.1.100_DMZ&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if it helps. If needed, attach your configs.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2016 21:10:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887829#M155028</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2016-04-06T21:10:18Z</dc:date>
    </item>
    <item>
      <title>Here I am considering that</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887830#M155029</link>
      <description>&lt;P&gt;Here I am considering that you want to translate 192,169.1.100-110 range of IP address into 10.20.1.100-110 raneg if IP addresses so that application existing in subnet 10.20.1.0/24 can access network behind ASA-1 as their local network.&lt;/P&gt;
&lt;P&gt;NAT configuration :-&lt;/P&gt;
&lt;P&gt;ASA-1&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;object network obj-192.168.1.100-110&lt;BR /&gt;&amp;nbsp;range 192.168.1.100 192.168.1.110&lt;BR /&gt;object network obj-10.20.1.100-110&lt;BR /&gt;&amp;nbsp;range 10.20.1.100 10.20.1.110&lt;/P&gt;
&lt;P&gt;nat (outside,inside) source static any any destination static obj-10.20.1.100-110 obj-192.168.1.100-110&lt;/P&gt;
&lt;P&gt;ASA-2&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;object network obj-10.20.1.100-110&lt;BR /&gt;&amp;nbsp;range 10.20.1.100 10.20.1.110&lt;BR /&gt;object network obj-192.168.1.100-110&lt;BR /&gt;&amp;nbsp;range 192.168.1.100 192.168.1.110&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static any any destination static obj-10.20.1.100-110 obj-192.168.1.100-110&lt;/P&gt;
&lt;P&gt;--------END OF CONFIGURATION----------&lt;/P&gt;
&lt;P&gt;As per the above natting configuration, application located in ASA-2 network will be able to access 192.168.1.100-110 network located in ASA-1 network through local subnet of 10.20.1.100-110.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Apr 2016 02:36:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887830#M155029</guid>
      <dc:creator>kkhapeka</dc:creator>
      <dc:date>2016-04-08T02:36:51Z</dc:date>
    </item>
    <item>
      <title>Thanks for explanation.</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887831#M155030</link>
      <description>&lt;P&gt;Thanks for explanation.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will inform you once i do with this configuration.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Apr 2016 19:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887831#M155030</guid>
      <dc:creator>mynetwork014</dc:creator>
      <dc:date>2016-04-09T19:39:45Z</dc:date>
    </item>
    <item>
      <title>Did you get it working?</title>
      <link>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887832#M155031</link>
      <description>&lt;P&gt;Did you get it working?&lt;/P&gt;</description>
      <pubDate>Wed, 18 May 2016 19:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-solution/m-p/2887832#M155031</guid>
      <dc:creator>Sergio Ceron Ramirez</dc:creator>
      <dc:date>2016-05-18T19:07:34Z</dc:date>
    </item>
  </channel>
</rss>

