<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT a local IP to a WAN IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879026#M158826</link>
    <description>&lt;P&gt;I know this sounds simple for others, its just that I'm not a Cisco&amp;nbsp;ASA user ever since.&amp;nbsp;What do I use? by the way, I'm using the Cisco ASDM in configuring. Do I use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Add Static NAT Rule, Dynamic NAT Rule, NAT Exempt Rule, NAT&amp;nbsp;Policy Rule, &amp;nbsp;Dynamic Policy NAT Rule?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The purpose of my natting is that if I perform NAT of a local IP to a WAN IP, I can do RDP using his WAN IP.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:26:31 GMT</pubDate>
    <dc:creator>TECH-JEFF</dc:creator>
    <dc:date>2019-03-12T07:26:31Z</dc:date>
    <item>
      <title>NAT a local IP to a WAN IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879026#M158826</link>
      <description>&lt;P&gt;I know this sounds simple for others, its just that I'm not a Cisco&amp;nbsp;ASA user ever since.&amp;nbsp;What do I use? by the way, I'm using the Cisco ASDM in configuring. Do I use?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Add Static NAT Rule, Dynamic NAT Rule, NAT Exempt Rule, NAT&amp;nbsp;Policy Rule, &amp;nbsp;Dynamic Policy NAT Rule?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The purpose of my natting is that if I perform NAT of a local IP to a WAN IP, I can do RDP using his WAN IP.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:26:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879026#M158826</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2019-03-12T07:26:31Z</dc:date>
    </item>
    <item>
      <title>What version of code is</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879027#M158827</link>
      <description>&lt;P&gt;What version of code is running on the ASA?&lt;/P&gt;
&lt;P&gt;If 8.3 or later, this will accomplish what you need. &amp;nbsp;Use the command line to edit.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network outside-SERVER&lt;BR /&gt;host 1.2.3.4&lt;BR /&gt;object network inside-SERVER&lt;BR /&gt;host 10.1.1.1&lt;BR /&gt;nat (inside,outside) static outside-SERVER&lt;/PRE&gt;
&lt;P&gt;Replace&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;outside-SERVER&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;/EM&gt; with what you want the object to be named and replace&amp;nbsp;&lt;SPAN style="text-decoration: underline;"&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;inside-SERVER&lt;/EM&gt;&lt;/STRONG&gt;&lt;EM&gt;&lt;/EM&gt; with what you want the object to be named.&lt;/P&gt;
&lt;P&gt;Replace&amp;nbsp;&lt;STRONG&gt;1.2.3.4&amp;nbsp;&lt;/STRONG&gt;with the WAN IP you want to use and&amp;nbsp;&lt;STRONG&gt;10.1.1.1&lt;/STRONG&gt; with the LAN IP you want to use.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 07:58:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879027#M158827</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-03-05T07:58:41Z</dc:date>
    </item>
    <item>
      <title>Yes, actually that is what</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879028#M158828</link>
      <description>&lt;P&gt;Yes, actually that is what differs. We have 2 Cisco ASA, one that I'm trying to configure is 8.2 which is different from the other Cisco ASA which has a version 9.1&lt;/P&gt;
&lt;P&gt;I tried to imitate the setup via asdm but totally different method to setup. The one I'm having issues right now is the version 8.2&lt;/P&gt;
&lt;P&gt;Actually, I just forgot to update ahead. I was already able to NAT'ed it via the local IP. My next problem now is that it doesn't passes thru the access rule I've created specifically for this IP.&lt;/P&gt;
&lt;P&gt;Is there a way to trace which policy I'm currently running or following？&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 08:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879028#M158828</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-05T08:14:13Z</dc:date>
    </item>
    <item>
      <title>So you're saying the NAT to</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879029#M158829</link>
      <description>&lt;P&gt;So you're saying the NAT to the public IP is working on 8.2 code, but access into the system is not working through your access list.&lt;/P&gt;
&lt;P&gt;Send the output of the following.&amp;nbsp;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;Please change any public IP addressing information or mask it out with x.x.x.x&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;show run access-group&lt;BR /&gt;show run access-list&lt;BR /&gt;show run static&lt;BR /&gt;show run nat&lt;/PRE&gt;</description>
      <pubDate>Sat, 05 Mar 2016 08:17:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879029#M158829</guid>
      <dc:creator>jj27</dc:creator>
      <dc:date>2016-03-05T08:17:04Z</dc:date>
    </item>
    <item>
      <title>Sorry for the confusion. I</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879030#M158830</link>
      <description>&lt;P&gt;Sorry for the confusion. I didn't use the code you've provided which made the NAT successful, instead using ASDM, I was able to successfully NAT'ed it.&lt;/P&gt;
&lt;P&gt;I'll try to send the output in a few minutes after this reply.&lt;/P&gt;
&lt;P&gt;Thanks JJohnston&lt;/P&gt;
&lt;P&gt;Have a great weekend.&lt;/P&gt;
&lt;P&gt;Jeff&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2016 09:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879030#M158830</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-05T09:45:37Z</dc:date>
    </item>
    <item>
      <title>Ok, I think I saw the issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879031#M158831</link>
      <description>&lt;P&gt;Ok, I think I saw the issue why access rules are not working. Sorry jjohnston, I might confuse you more because of the complicated setup in this office. To simplify, here's my case:&lt;/P&gt;
&lt;P&gt;We have 2 ISP's, I'll name this as ISP1 and ISP2.&lt;/P&gt;
&lt;P&gt;I saw a default route of 0.0.0.0 0.0.0.0 ISP1 metric 1(so this makes sense in our office browsing, etc)&lt;/P&gt;
&lt;P&gt;I saw another default route of 0.0.0.0 0.0.0.0 ISP2 metric 5(so I assume this could be their previous backup ISP in case ISP1 goes down)&lt;/P&gt;
&lt;P&gt;Here are the results for the following commands:&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;&lt;SPAN class="pln"&gt;show run access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="kwd" style="color: #000000;"&gt;group&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01# show running-config access-group&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-group inside_access_in in interface inside&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-group dmz_access_in in interface dmz&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-group outside_access_in in interface outside-ISP2&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-group outside-etpi_access_in in interface outside-ISP1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;access-group management_access_in in interface management&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;fw-01#&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;show run access&lt;/SPAN&gt;&lt;SPAN class="pun"&gt;-&lt;/SPAN&gt;&lt;SPAN class="pln"&gt;list&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 12pt;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;# show running-config access-list &lt;BR /&gt;access-list inside_access_in extended permit icmp any any inactive &lt;BR /&gt;access-list inside_access_in extended permit ip any any &lt;BR /&gt;access-list outside_access_in extended permit ip host Test_bypass host ISP2&lt;BR /&gt;access-list dmz_access_in extended permit ip any any &lt;BR /&gt;access-list dmz_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_mpc_1 extended permit ip any vlan0090 255.255.255.0 &lt;BR /&gt;access-list global_mpc extended permit ip any any &lt;BR /&gt;access-list management_access_in extended permit ip any any &lt;BR /&gt;access-list management_access_in extended permit icmp any any &lt;BR /&gt;access-list outside-etpi_access_in extended permit ip any host ISP1&lt;BR /&gt;access-list outside-etpi_access_in extended permit ip any any &lt;BR /&gt;access-list inside_nat_outbound extended permit ip any &amp;lt;another ISP not in local datacenter&amp;gt;x.x.x.x&lt;BR /&gt;access-list ra_vpn_access_in extended permit tcp any any eq ssh &lt;BR /&gt;access-list ra_vpn_access_in extended permit tcp any any eq https &lt;BR /&gt;access-list inside_mpc extended permit ip vlan0090 255.255.255.0 any &lt;BR /&gt;access-list inside_nat0_outbound extended permit ip any vlan0120 255.255.255.0 &lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;#&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 18pt;"&gt;&lt;STRONG&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;FONT color="#0000ff"&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 18pt;"&gt;&lt;STRONG&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;show running-config static&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 12pt;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;# show running-config static &lt;BR /&gt;static (inside,dmz) inside-network inside-network netmask 255.255.0.0 &lt;BR /&gt;static (dmz,outside-ISP1)&amp;nbsp;x.x.x.x &amp;lt;dmz ip&amp;gt; netmask 255.255.255.255 &lt;BR /&gt;static (dmz,outside-ISP1) x.x.x.x&amp;nbsp;&amp;lt;dmz ip&amp;gt; &amp;nbsp;netmask 255.255.255.255 &lt;BR /&gt;static (dmz,outside-ISP2) x.x.x.x &amp;lt;dmz ip&amp;gt; netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside-ISP1) x.x.x.x Test-Yee netmask 255.255.255.255 &lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;#&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #0000ff; font-size: 12pt;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;FYI: ignore the dmz for the moment. The Test-Yee is initial problem I had in doing NAT'ed IP and was successful&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 18pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;show run nat&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;# show running-config nat&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 2 access-list inside_nat_outbound&lt;BR /&gt;nat (inside) 2 0.0.0.0 0.0.0.0&lt;BR /&gt;&lt;SPAN style="color: #000000;"&gt;fw-01&lt;/SPAN&gt;# &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;These are all the results of the commands. &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;Thanks&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN class="kwd"&gt;&lt;SPAN class="pln"&gt;Jeff&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="kwd"&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2016 01:27:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879031#M158831</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-07T01:27:32Z</dc:date>
    </item>
    <item>
      <title>Ok, I think I saw the issue</title>
      <link>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879032#M158832</link>
      <description>&lt;P&gt;Ok, I think I saw the issue why access rules are not working. Sorry jjohnston, I might confuse you more because of the complicated setup in this office. To simplify, here's my case: We have 2 ISP's, I'll name this as ISP1 and ISP2. I saw a default route of 0.0.0.0 0.0.0.0 ISP1 metric 1(so this makes sense in our office browsing, etc) I saw another default route of 0.0.0.0 0.0.0.0 ISP2 metric 5(so I assume this could be their previous backup ISP in case ISP1 goes down) Here are the results for the following commands: show run access-group fw-01# show running-config access-group access-group inside_access_in in interface inside access-group dmz_access_in in interface dmz access-group outside_access_in in interface outside-ISP2 access-group outside-etpi_access_in in interface outside-ISP1 access-group management_access_in in interface management fw-01# show run access-list fw-01# show running-config access-list access-list inside_access_in extended permit icmp any any inactive access-list inside_access_in extended permit ip any any access-list outside_access_in extended permit ip host Test_bypass host ISP2 access-list dmz_access_in extended permit ip any any access-list dmz_access_in extended permit icmp any any access-list inside_mpc_1 extended permit ip any vlan0090 255.255.255.0 access-list global_mpc extended permit ip any any access-list management_access_in extended permit ip any any access-list management_access_in extended permit icmp any any access-list outside-etpi_access_in extended permit ip any host ISP1 access-list outside-etpi_access_in extended permit ip any any access-list inside_nat_outbound extended permit ip any &lt;ANOTHER datacenter="" local="" in="" not="" isp=""&gt;x.x.x.x access-list ra_vpn_access_in extended permit tcp any any eq ssh access-list ra_vpn_access_in extended permit tcp any any eq https access-list inside_mpc extended permit ip vlan0090 255.255.255.0 any access-list inside_nat0_outbound extended permit ip any vlan0120 255.255.255.0 fw-01# show running-config static fw-01# show running-config static static (inside,dmz) inside-network inside-network netmask 255.255.0.0 static (dmz,outside-ISP1) x.x.x.x &lt;DMZ ip=""&gt; netmask 255.255.255.255 static (dmz,outside-ISP1) x.x.x.x &lt;DMZ ip=""&gt; netmask 255.255.255.255 static (dmz,outside-ISP2) x.x.x.x &lt;DMZ ip=""&gt; netmask 255.255.255.255 static (inside,outside-ISP1) x.x.x.x Test-Yee netmask 255.255.255.255 fw-01# FYI: ignore the dmz for the moment. The Test-Yee is initial problem I had in doing NAT'ed IP and was successful show run nat fw-01# show running-config nat nat (inside) 0 access-list inside_nat0_outbound nat (inside) 2 access-list inside_nat_outbound nat (inside) 2 0.0.0.0 0.0.0.0 fw-01# These are all the results of the commands. Thanks Jeff &lt;/DMZ&gt;&lt;/DMZ&gt;&lt;/DMZ&gt;&lt;/ANOTHER&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2016 01:28:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-a-local-ip-to-a-wan-ip/m-p/2879032#M158832</guid>
      <dc:creator>TECH-JEFF</dc:creator>
      <dc:date>2016-03-07T01:28:09Z</dc:date>
    </item>
  </channel>
</rss>

