<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Jon, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887806#M155468</link>
    <description>&lt;P&gt;Hi Jon,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for reply.&lt;/P&gt;
&lt;P&gt;So if traffic flow is from low to high security interface then i will need 2 NAT statements?&lt;/P&gt;
&lt;P&gt;One from source to destination and other from destination to source?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2016 20:44:25 GMT</pubDate>
    <dc:creator>mahesh18</dc:creator>
    <dc:date>2016-03-21T20:44:25Z</dc:date>
    <item>
      <title>static NAT config from Destination to source</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887804#M155466</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;If traffic flow is from&lt;/P&gt;
&lt;P&gt;Source Interface &amp;nbsp;is DMZ to Destination interface is inside we create ACL to allow the traffic.&lt;/P&gt;
&lt;P&gt;Source IP 192.168.50.x&lt;/P&gt;
&lt;P&gt;Destination IP is 10.50.50.x&lt;/P&gt;
&lt;P&gt;But i saw at our clients ASA that i need below NAT to make it work&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;static (inside,DMZ) 10.50.50.1 10.50.50.1&amp;nbsp;&amp;nbsp;netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Need to know is this &amp;nbsp;normally done in networks?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:31:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887804#M155466</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T07:31:31Z</dc:date>
    </item>
    <item>
      <title>Mahesh</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887805#M155467</link>
      <description>&lt;P&gt;Mahesh&lt;/P&gt;
&lt;P&gt;Yes it is with NAT in use because for traffic to flow from a lower to higher security level you need -&lt;/P&gt;
&lt;P&gt;1) an acl entry as you say&lt;/P&gt;
&lt;P&gt;2) a static NAT statement to translate the traffic.&lt;/P&gt;
&lt;P&gt;Your statement simply doesn't translate the IP but it is still needed.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 20:31:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887805#M155467</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-21T20:31:11Z</dc:date>
    </item>
    <item>
      <title>Hi Jon,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887806#M155468</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for reply.&lt;/P&gt;
&lt;P&gt;So if traffic flow is from low to high security interface then i will need 2 NAT statements?&lt;/P&gt;
&lt;P&gt;One from source to destination and other from destination to source?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 20:44:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887806#M155468</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-21T20:44:25Z</dc:date>
    </item>
    <item>
      <title>No, you only need that NAT</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887807#M155469</link>
      <description>&lt;P&gt;No, you only need that NAT statement because a static NAT statement works both ways&lt;/P&gt;
&lt;P&gt;So if the traffic is sent from the inside to the DMZ the source IP is changed and if traffic is sent from the DMZ to the inside the destination IP is changed.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 20:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887807#M155469</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-21T20:47:41Z</dc:date>
    </item>
    <item>
      <title>So to make it work i can also</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887808#M155470</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So to make it work i can also use NAT statement from DMZ to inside right?&lt;/P&gt;
&lt;P&gt;Instead of using NAT statement from Inside to DMZ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 20:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887808#M155470</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-21T20:59:59Z</dc:date>
    </item>
    <item>
      <title>No the NAT has to be that way</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887809#M155471</link>
      <description>&lt;P&gt;No the NAT has to be that way round.&lt;/P&gt;
&lt;P&gt;Think of it like a static NAT statement you would use when you have a server in a DMZ and you want to give internet access to it.&lt;/P&gt;
&lt;P&gt;You don't NAT the internet IPs coming in, you simply NAT the DMZ server IP to a public IP.&lt;/P&gt;
&lt;P&gt;This is the same principle here it's just that you are allowing access from the DMZ to the inside.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:10:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887809#M155471</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-21T21:10:30Z</dc:date>
    </item>
    <item>
      <title>But when i run the packet</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887810#M155472</link>
      <description>&lt;P&gt;But when i run the packet tracer from source as DMZ to inside it &amp;nbsp;hit 2 NAT rules?&lt;/P&gt;
&lt;P&gt;one is static NAT which i configured what is other NAT rule then?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:19:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887810#M155472</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-21T21:19:09Z</dc:date>
    </item>
    <item>
      <title>Don't know.</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887811#M155474</link>
      <description>&lt;P&gt;Don't know.&lt;/P&gt;
&lt;P&gt;Can you post the packet tracer output ?&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:23:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887811#M155474</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-21T21:23:30Z</dc:date>
    </item>
    <item>
      <title>Here is output</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887812#M155476</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is output&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/P&gt;
&lt;P&gt;Phase: 2&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) 10.50.50.1 10.50.50.1 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.50.50.1 DMZ any&lt;BR /&gt; static translation to 10.50.50.1&lt;BR /&gt; translate_hits = 0, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface inside&lt;BR /&gt;Untranslate 10.50.50.1/0 to 10.50.50.1/0 using netmask 255.255.255.255&lt;/P&gt;
&lt;P&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group DMZ_acl in interface DMZ&lt;BR /&gt;access-list DMZ_acl extended permit tcp host 192.168.50.1 any eq https log&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 4&lt;BR /&gt;Type: CONN-SETTINGS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map class-default&lt;BR /&gt; match any&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class class-default&lt;BR /&gt; set connection decrement-ttl&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 5&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 6&lt;BR /&gt;Type: FOVER&lt;BR /&gt;Subtype: standby-update&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (DMZ,Corp) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;BR /&gt;nat-control&lt;BR /&gt; match ip DMZ 192.168.50.0 255.255.255.0 Corp any&lt;BR /&gt; static translation to 192.168.50.0&lt;BR /&gt; translate_hits = 7933173, untranslate_hits = 23054&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 8&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: rpf-check&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) 10.50.50.1 10.50.50.1 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.50.50.1 DMZ any&lt;BR /&gt; static translation to 10.50.50.1&lt;BR /&gt; translate_hits = 0, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: host-limits&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;static (inside,DMZ) 10.50.50.1 10.50.50.1 netmask 255.255.255.255&lt;BR /&gt;nat-control&lt;BR /&gt; match ip inside host 10.50.50.1 DMZ any&lt;BR /&gt; static translation to 10.50.50.1&lt;BR /&gt; translate_hits = 0, untranslate_hits = 9&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;/P&gt;
&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 3804212927, packet dispatched to next module&lt;/P&gt;
&lt;P&gt;Result:&lt;BR /&gt;input-interface: DMZ&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:39:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887812#M155476</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-21T21:39:24Z</dc:date>
    </item>
    <item>
      <title>Mahesh</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887813#M155477</link>
      <description>&lt;P&gt;Mahesh&lt;/P&gt;
&lt;P&gt;You wouldn't happen to have the firewall configuration would you ?&lt;/P&gt;
&lt;P&gt;Not sure what the (DMZ,corp) NAT is doing.&lt;/P&gt;
&lt;P&gt;I did think maybe the DMZ source IPs were being translated to something else but that doesn't seem to be the case.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:48:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887813#M155477</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-21T21:48:26Z</dc:date>
    </item>
    <item>
      <title>let me know what you wanna</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887814#M155478</link>
      <description>&lt;P&gt;let me know what you wanna see?&lt;/P&gt;
&lt;P&gt;i can post it&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 21:55:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887814#M155478</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-21T21:55:59Z</dc:date>
    </item>
    <item>
      <title>Hi Mahesh ,</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887815#M155479</link>
      <description>&lt;P&gt;Hi Mahesh ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; By default static NAT is bidirectional ( Traffic can initiate from inside either &lt;SPAN&gt;initiate from &amp;nbsp;outside until you disable the bidirectional ) .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;BR ,&lt;/P&gt;
&lt;P&gt;Mani&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 04:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887815#M155479</guid>
      <dc:creator>MANI .P</dc:creator>
      <dc:date>2016-03-22T04:43:51Z</dc:date>
    </item>
    <item>
      <title>Mahesh</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887816#M155480</link>
      <description>&lt;P&gt;Mahesh&lt;/P&gt;
&lt;P&gt;Sorry, I missed your reply.&lt;/P&gt;
&lt;P&gt;If&amp;nbsp;possible can you post the NAT configuration from the firewall.&lt;/P&gt;
&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 15:56:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887816#M155480</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2016-03-22T15:56:01Z</dc:date>
    </item>
    <item>
      <title>will try to do as this</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887817#M155481</link>
      <description>&lt;P&gt;will try to do as this firewall has lot of NAT config.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Wed, 23 Mar 2016 03:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-config-from-destination-to-source/m-p/2887817#M155481</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-03-23T03:42:36Z</dc:date>
    </item>
  </channel>
</rss>

