<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT- Diferent Range from Outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989473#M155519</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I have to configure static nats with diferrent range of ISP2, they forward another range over this link. For example, they foward range 5.5.5.0/32 to we use from their address : 4.4.4.0/24. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I configured the follow c&lt;/SPAN&gt;onfigs but donw works:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet1/5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.10.1&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/6&lt;BR /&gt; nameif&amp;nbsp;isp1&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 3.3.3.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet1/7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;isp2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 4.4.4.2&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route isp&amp;nbsp;0.0.0.0 0.0.0.0 3.3.3.1&amp;nbsp;10 &amp;nbsp;track 100&lt;BR /&gt;route i&amp;nbsp;isp2.0.0.0 0.0.0.0&amp;nbsp;4.4.4.1 20&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp;server&lt;BR /&gt; nat (inside,isp2) static 5.5.5.2&lt;/P&gt;
&lt;P&gt;host 192.168.10.10&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show xlate | inc&amp;nbsp;5.5.5.2&lt;BR /&gt;NAT from inside:192.168.10.10 to isp2:5.5.5.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:32:14 GMT</pubDate>
    <dc:creator>crusier2015</dc:creator>
    <dc:date>2019-03-12T08:32:14Z</dc:date>
    <item>
      <title>NAT- Diferent Range from Outside</title>
      <link>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989473#M155519</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I have to configure static nats with diferrent range of ISP2, they forward another range over this link. For example, they foward range 5.5.5.0/32 to we use from their address : 4.4.4.0/24. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I configured the follow c&lt;/SPAN&gt;onfigs but donw works:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet1/5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 192.168.10.1&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/6&lt;BR /&gt; nameif&amp;nbsp;isp1&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 3.3.3.2 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;interface GigabitEthernet1/7&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;nameif&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;isp2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;security-level 100&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ip address 4.4.4.2&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;route isp&amp;nbsp;0.0.0.0 0.0.0.0 3.3.3.1&amp;nbsp;10 &amp;nbsp;track 100&lt;BR /&gt;route i&amp;nbsp;isp2.0.0.0 0.0.0.0&amp;nbsp;4.4.4.1 20&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;object network&amp;nbsp;server&lt;BR /&gt; nat (inside,isp2) static 5.5.5.2&lt;/P&gt;
&lt;P&gt;host 192.168.10.10&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show xlate | inc&amp;nbsp;5.5.5.2&lt;BR /&gt;NAT from inside:192.168.10.10 to isp2:5.5.5.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:32:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989473#M155519</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2019-03-12T08:32:14Z</dc:date>
    </item>
    <item>
      <title>Hello,</title>
      <link>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989474#M155520</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I hope you are doing fine, could you let me know which ASA software version are you running, please also send a show route, you might probaby need to build route maps and configure pbr in order to achieve what you are attending to do. Remember that the ASA installs one default route at a time on its routing table, the second default route meant for isp2 acts as &amp;nbsp;a floating route that stands by waiting for your primary ISP link to fail, as I see you have probably configured ip sla.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2016 03:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989474#M155520</guid>
      <dc:creator>Kornelia Gutierrez</dc:creator>
      <dc:date>2016-11-15T03:34:09Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989475#M155521</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sorry, i forgot some importants infos.&lt;/P&gt;
&lt;P&gt;I migrate two Asas 5510 &amp;nbsp;(running version 8.3(2))in failover mode, to two Asas 5516 &amp;nbsp;(running version &lt;SPAN&gt; 9.6.1 &lt;/SPAN&gt;)in failover too.&lt;/P&gt;
&lt;P&gt;On the old ASAs the Nats was working perfectly .&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Follow the outpus:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;show route&lt;/P&gt;
&lt;P&gt;Codes: L - local, C - connected, S - static, R - RIP, M - mobile, B - BGP&lt;BR /&gt; D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area&lt;BR /&gt; N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2&lt;BR /&gt; E1 - OSPF external type 1, E2 - OSPF external type 2&lt;BR /&gt; i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2&lt;BR /&gt; ia - IS-IS inter area, * - candidate default, U - per-user static route&lt;BR /&gt; o - ODR, P - periodic downloaded static route, + - replicated route&lt;BR /&gt;Gateway of last resort is &lt;SPAN&gt;3.3.3.&lt;/SPAN&gt;&lt;SPAN&gt;1&amp;nbsp;&lt;/SPAN&gt; to network 0.0.0.0&lt;/P&gt;
&lt;P&gt;S* 0.0.0.0 0.0.0.0 [10/0] via &lt;SPAN&gt;3.3.3.&lt;/SPAN&gt;&lt;SPAN&gt;1&lt;/SPAN&gt;,&amp;nbsp;isp&lt;BR /&gt;C 1.1.1.0 255.255.255.0 is directly connected, failover&lt;BR /&gt;L 1.1.1.1 255.255.255.255 is directly connected, failover&lt;BR /&gt;C 4.4.4.0 255.255.255.0 is directly connected, isp2&lt;BR /&gt;L 4.4.4.1 255.255.255.255 is directly connected, isp2&lt;BR /&gt;C 3.3.3.0 255.255.255.0 is directly connected, isp&lt;BR /&gt;L 3.3.3.2 255.255.255.255 is directly connected, isp&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;!&lt;BR /&gt;track 100 rtr 100 reachability&lt;/P&gt;
&lt;P&gt;sla monitor 100&lt;BR /&gt; type echo protocol ipIcmpEcho 3.3.3.100 interface isp&lt;BR /&gt; num-packets 3&lt;BR /&gt; frequency 10&lt;BR /&gt;sla monitor schedule 100 life forever start-time now&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;failover&lt;BR /&gt;failover lan unit primary&lt;BR /&gt;failover lan interface failover GigabitEthernet1/1&lt;BR /&gt;failover link failover GigabitEthernet1/1&lt;BR /&gt;failover interface ip failover 1.1.1.1 255.255.255.0 standby 1.1.1.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;interface GigabitEthernet1/1&lt;BR /&gt; description LAN/STATE Failover Interface&lt;/P&gt;</description>
      <pubDate>Tue, 15 Nov 2016 14:37:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989475#M155521</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2016-11-15T14:37:11Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989476#M155522</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Does anyone have any ideas that can help me?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;tks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2016 10:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-diferent-range-from-outside/m-p/2989476#M155522</guid>
      <dc:creator>crusier2015</dc:creator>
      <dc:date>2016-11-16T10:53:52Z</dc:date>
    </item>
  </channel>
</rss>

