<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964782#M155824</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The NAT on router isn't working the same way as ASA.&lt;/P&gt;
&lt;P&gt;On your design, you need to do port forwarding on UDP range ports. You don't have a lot of solutions. There is only 1 I know, it's using ACL and route-map like:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;access-list 101 permit udp object-group SITENAMEPBX1RTP range 10020 10531 any range 10020 10531&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route-map FORWARD-2 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;ip nat inside source static 1.1.1.236 2.2.2.187 route-map FORWARD-2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The issue is that you need also to forward other ports with same public address but different private address. At this point, the router won't allow you to do the configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To accomplish what you're trying to do with IOS, you have 2 solutions:&lt;/P&gt;
&lt;P&gt;- do NAT port per port (even for range). It will take too long as you have a lot of ports&lt;/P&gt;
&lt;P&gt;- Use 2 public IP: 1 for 1.1.1.235 and 1 for 1.1.1.236&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just in case you will use 2 public IP address, the config would look like: (Control it before pasting on your environment, I've done it quickly through my iPhone):&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;object-group SITENAMEPBX1SIPUDP&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBX1SIPTCP&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBX1RTP&lt;BR /&gt;&amp;nbsp;host 1.1.1.236&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMask1&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMask2&lt;BR /&gt;&amp;nbsp;host 1.1.1.236&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMasking&lt;BR /&gt;&amp;nbsp;group-object SITENAMEPBXMask1&lt;BR /&gt;&amp;nbsp;group-object SITENAMEPBXMask2&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT&lt;BR /&gt;&amp;nbsp;permit ip object-group SITENAMEPBXMask1 any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT2&lt;BR /&gt;&amp;nbsp;permit ip object-group SITENAMEPBXMask2 any&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit udp object-group SITENAMEPBX1SIPUDP eq 5090 any eq 5090&lt;BR /&gt;access-list 100 permit tcp object-group SITENAMEPBX1SIPTCP eq 5090 any eq 5090&lt;BR /&gt;access-list 101 permit udp object-group SITENAMEPBX1RTP range 10020 10531 any range 10020 10531&lt;BR /&gt;!&lt;BR /&gt;route-map FORWARD-1 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;!&lt;BR /&gt;route-map FORWARD-2 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;!&lt;BR /&gt;ip nat pool NATPOOL 2.2.2.187 2.2.2.187 netmask 255.255.255.0&lt;BR /&gt;ip nat pool NATPOOL2 2.2.2.188 2.2.2.188 netmask 255.255.255.0&lt;BR /&gt;ip nat inside source list NAT pool NATPOOL2 overload&lt;BR /&gt;ip nat inside source list NAT2 pool NATPOOL overload&lt;BR /&gt;ip nat inside source static 1.1.1.235 2.2.2.188 route-map FORWARD-1&lt;BR /&gt;ip nat inside source static 1.1.1.236 2.2.2.187 route-map FORWARD-2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Aug 2016 15:51:35 GMT</pubDate>
    <dc:creator>Francesco Molino</dc:creator>
    <dc:date>2016-08-10T15:51:35Z</dc:date>
    <item>
      <title>Convert ASA NAT to IOS/IOS-XE NAT Config</title>
      <link>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964781#M155822</link>
      <description>&lt;P&gt;I had to create a rather complex series of NATs on an ASA for a PBX that has 2 IPs (one for RTP and one for Control) but must appear to the ITSP on the internet as one public IP. The client now wants to route some of this traffic via some ISRs where we have ZBF firewalls setup.&lt;/P&gt;
&lt;P&gt;I have pasted the sections of relevant ASA code (8.3+ NAT version). Will this actually translate to IOS/IOS-XE (have a mix of G2s and 4Ks)? If so how? I've done plenty of 1-1 NATs and some port NAT'ing, but am unsure of the final masking NAT and making it all work together. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for any assistance! The 1.1.1 ips would be internal and the 2.2.2 would be external.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object service SIPRangeUDP&lt;BR /&gt; service udp source range sip 5090 &lt;BR /&gt;object service SIPRangeTCP&lt;BR /&gt; service tcp source range sip 5090&lt;BR /&gt;object service RTPRange&lt;BR /&gt; service udp source range 10020 10531&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object network SITENAMEPBX1SIPUDP&lt;BR /&gt; host 1.1.1.235&lt;BR /&gt;object network SITENAMEPBX1SIPUDPOut&lt;BR /&gt; host 2.2.2.187&lt;BR /&gt;object network SITENAMEPBX1SIPTCP&lt;BR /&gt; host 1.1.1.235&lt;BR /&gt;object network SITENAMEPBX1SIPTCPOut&lt;BR /&gt; host 2.2.2.187&lt;BR /&gt;object network SITENAMEPBX1RTP&lt;BR /&gt; host 1.1.1.236&lt;BR /&gt;object network SITENAMEPBX1RTPOut&lt;BR /&gt; host 2.2.2.187&lt;BR /&gt;object network SITENAMEPBXMask&lt;BR /&gt; host 2.2.2.187&lt;BR /&gt;object network SITENAMEPBXMask1&lt;BR /&gt; host 1.1.1.235&lt;BR /&gt;object network SITENAMEPBXMask2&lt;BR /&gt; host 1.1.1.236&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;object-group network SITENAMEPBXMasking&lt;BR /&gt; network-object object SITENAMEPBXMask1&lt;BR /&gt; network-object object SITENAMEPBXMask2&lt;/PRE&gt;
&lt;PRE class="prettyprint"&gt;nat (inside,outside) source static SITENAMEPBX1SIPUDP SITENAMEPBX1SIPUDPOut service SIPRangeUDP SIPRangeUDP&lt;BR /&gt;nat (inside,outside) source static SITENAMEPBX1SIPTCP SITENAMEPBX1SIPTCPOut service SIPRangeTCP SIPRangeTCP&lt;BR /&gt;nat (inside,outside) source static SITENAMEPBX1RTP SITENAMEPBX1RTPOut service RTPRange RTPRange&lt;BR /&gt;nat (inside,outside) source dynamic SITENAMEPBXMasking SITENAMEPBXMask&lt;/PRE&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964781#M155822</guid>
      <dc:creator>mloraditch</dc:creator>
      <dc:date>2019-03-12T08:06:54Z</dc:date>
    </item>
    <item>
      <title>Hi</title>
      <link>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964782#M155824</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The NAT on router isn't working the same way as ASA.&lt;/P&gt;
&lt;P&gt;On your design, you need to do port forwarding on UDP range ports. You don't have a lot of solutions. There is only 1 I know, it's using ACL and route-map like:&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;access-list 101 permit udp object-group SITENAMEPBX1RTP range 10020 10531 any range 10020 10531&lt;/P&gt;
&lt;P&gt;!&lt;/P&gt;
&lt;P&gt;route-map FORWARD-2 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;!&lt;/P&gt;
&lt;P&gt;ip nat inside source static 1.1.1.236 2.2.2.187 route-map FORWARD-2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;The issue is that you need also to forward other ports with same public address but different private address. At this point, the router won't allow you to do the configuration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To accomplish what you're trying to do with IOS, you have 2 solutions:&lt;/P&gt;
&lt;P&gt;- do NAT port per port (even for range). It will take too long as you have a lot of ports&lt;/P&gt;
&lt;P&gt;- Use 2 public IP: 1 for 1.1.1.235 and 1 for 1.1.1.236&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just in case you will use 2 public IP address, the config would look like: (Control it before pasting on your environment, I've done it quickly through my iPhone):&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;&lt;BR /&gt;object-group SITENAMEPBX1SIPUDP&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBX1SIPTCP&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBX1RTP&lt;BR /&gt;&amp;nbsp;host 1.1.1.236&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMask1&lt;BR /&gt;&amp;nbsp;host 1.1.1.235&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMask2&lt;BR /&gt;&amp;nbsp;host 1.1.1.236&lt;BR /&gt;!&lt;BR /&gt;object-group SITENAMEPBXMasking&lt;BR /&gt;&amp;nbsp;group-object SITENAMEPBXMask1&lt;BR /&gt;&amp;nbsp;group-object SITENAMEPBXMask2&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT&lt;BR /&gt;&amp;nbsp;permit ip object-group SITENAMEPBXMask1 any&lt;BR /&gt;!&lt;BR /&gt;ip access-list extended NAT2&lt;BR /&gt;&amp;nbsp;permit ip object-group SITENAMEPBXMask2 any&lt;BR /&gt;!&lt;BR /&gt;access-list 100 permit udp object-group SITENAMEPBX1SIPUDP eq 5090 any eq 5090&lt;BR /&gt;access-list 100 permit tcp object-group SITENAMEPBX1SIPTCP eq 5090 any eq 5090&lt;BR /&gt;access-list 101 permit udp object-group SITENAMEPBX1RTP range 10020 10531 any range 10020 10531&lt;BR /&gt;!&lt;BR /&gt;route-map FORWARD-1 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 100&lt;BR /&gt;!&lt;BR /&gt;route-map FORWARD-2 permit 10&lt;BR /&gt;&amp;nbsp;match ip address 101&lt;BR /&gt;!&lt;BR /&gt;ip nat pool NATPOOL 2.2.2.187 2.2.2.187 netmask 255.255.255.0&lt;BR /&gt;ip nat pool NATPOOL2 2.2.2.188 2.2.2.188 netmask 255.255.255.0&lt;BR /&gt;ip nat inside source list NAT pool NATPOOL2 overload&lt;BR /&gt;ip nat inside source list NAT2 pool NATPOOL overload&lt;BR /&gt;ip nat inside source static 1.1.1.235 2.2.2.188 route-map FORWARD-1&lt;BR /&gt;ip nat inside source static 1.1.1.236 2.2.2.187 route-map FORWARD-2&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PS: Please don't forget to rate and mark as correct answer if this answered your question&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 15:51:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964782#M155824</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-08-10T15:51:35Z</dc:date>
    </item>
    <item>
      <title>I was afraid of what you are</title>
      <link>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964783#M155825</link>
      <description>&lt;P&gt;I was afraid of what you are saying. We are not port by port natting, 500+ lines of NAT would be impossible to manage.&lt;/P&gt;
&lt;P&gt;Well, we recommended against the PBX design they have, now I have even more justification for that.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 20:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964783#M155825</guid>
      <dc:creator>mloraditch</dc:creator>
      <dc:date>2016-08-10T20:25:58Z</dc:date>
    </item>
    <item>
      <title>Yes you're right. As I said</title>
      <link>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964784#M155826</link>
      <description>&lt;P&gt;Yes you're right. As I said manual port by port will be a nightmare. The solution with router would be 2 public address.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 10 Aug 2016 20:33:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/convert-asa-nat-to-ios-ios-xe-nat-config/m-p/2964784#M155826</guid>
      <dc:creator>Francesco Molino</dc:creator>
      <dc:date>2016-08-10T20:33:44Z</dc:date>
    </item>
  </channel>
</rss>

