<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT DMZ to an internal address in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836514#M159554</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I've spent hours going round in circles trying to work out what I'm doing wrong here.&amp;nbsp; I have a server in the DMZ on one ASA 5512 interface, and an internal network on a different one.&amp;nbsp; What I want to do is to make the DMZ host accessible on the internal network using an internal IP address.&lt;/P&gt;
&lt;P&gt;---------------------------&lt;/P&gt;
&lt;P&gt;eg:&lt;/P&gt;
&lt;P&gt;DMZ ASA interface:&amp;nbsp; 192.168.10.1&lt;/P&gt;
&lt;P&gt;DMZ server: 192.168.10.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internal ASA interface: 172.16.10.11&lt;/P&gt;
&lt;P&gt;DMZ host on internal:&amp;nbsp; 172.16.10.12 (not a real machines IP)&lt;/P&gt;
&lt;P&gt;----------&lt;/P&gt;
&lt;P&gt;I am able to configure the NAT so that the DMZ server (192.168.10.2) can ping an internal host by adding a NAT rule that changes the source address from 192.168.10.2 to 172.16.10.12.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I am unable to achieve is the opposite, where an internal machine (172.16.10.x) is able to ping 172.16.10.12, and have NAT change the destination address to 192.168.10.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have enabled the intra-interface thing &amp;amp; the log now shows it setting up an ICMP transaction between 172.16.10.xxx and 172.16.10.12, but Wireshark doesn't show any traffic turning up on the DMZ host.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've tried using the packet tracer, which looks as though it's using the same interface (internal) for ingress &amp;amp; egress, but I'm not sure if I've read that right.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm thoroughly confused.&amp;nbsp; Any assistance would be appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:17:55 GMT</pubDate>
    <dc:creator>Turkey Twizzler</dc:creator>
    <dc:date>2019-03-12T07:17:55Z</dc:date>
    <item>
      <title>NAT DMZ to an internal address</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836514#M159554</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I've spent hours going round in circles trying to work out what I'm doing wrong here.&amp;nbsp; I have a server in the DMZ on one ASA 5512 interface, and an internal network on a different one.&amp;nbsp; What I want to do is to make the DMZ host accessible on the internal network using an internal IP address.&lt;/P&gt;
&lt;P&gt;---------------------------&lt;/P&gt;
&lt;P&gt;eg:&lt;/P&gt;
&lt;P&gt;DMZ ASA interface:&amp;nbsp; 192.168.10.1&lt;/P&gt;
&lt;P&gt;DMZ server: 192.168.10.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Internal ASA interface: 172.16.10.11&lt;/P&gt;
&lt;P&gt;DMZ host on internal:&amp;nbsp; 172.16.10.12 (not a real machines IP)&lt;/P&gt;
&lt;P&gt;----------&lt;/P&gt;
&lt;P&gt;I am able to configure the NAT so that the DMZ server (192.168.10.2) can ping an internal host by adding a NAT rule that changes the source address from 192.168.10.2 to 172.16.10.12.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What I am unable to achieve is the opposite, where an internal machine (172.16.10.x) is able to ping 172.16.10.12, and have NAT change the destination address to 192.168.10.2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have enabled the intra-interface thing &amp;amp; the log now shows it setting up an ICMP transaction between 172.16.10.xxx and 172.16.10.12, but Wireshark doesn't show any traffic turning up on the DMZ host.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I've tried using the packet tracer, which looks as though it's using the same interface (internal) for ingress &amp;amp; egress, but I'm not sure if I've read that right.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm thoroughly confused.&amp;nbsp; Any assistance would be appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836514#M159554</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2019-03-12T07:17:55Z</dc:date>
    </item>
    <item>
      <title>Do you have to use NAT in</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836515#M159556</link>
      <description>&lt;P&gt;Do you have to use NAT in this case? &amp;nbsp;Could you not just let users access the 192.168.10.x address directly? &amp;nbsp;That would make life much easier.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 19:06:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836515#M159556</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-14T19:06:16Z</dc:date>
    </item>
    <item>
      <title>Unfortunately I can't do it</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836516#M159557</link>
      <description>&lt;P&gt;Unfortunately I can't do it the easy way!&lt;/P&gt;
&lt;P&gt;I'm adding the firewall to an existing network VLAN, which previously had a&amp;nbsp;host that required internet connectivity (172.16.10.12) which in turn exposed the entire VLAN.&lt;/P&gt;
&lt;P&gt;The host ip (and the other hosts on the network) cannot change because of other complications (legacy system).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;To solve the problem I want to put the host in the DMZ, and NAT to it to make it look like its still on the same network.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I guess from your reply it is at least possible!?&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 20:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836516#M159557</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-14T20:19:46Z</dc:date>
    </item>
    <item>
      <title>Make sure you have access</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836517#M159559</link>
      <description>&lt;P&gt;Make sure you have access rules allowing the ICMP traffic. &amp;nbsp;A basic example using object nat is:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network server&lt;BR /&gt;&amp;nbsp; host 192.168.10.2&lt;BR /&gt;object network server&lt;BR /&gt;&amp;nbsp; nat (dmz,inside) static&amp;nbsp;&lt;SPAN&gt;172.16.10.12&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 14 Feb 2016 20:28:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836517#M159559</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-14T20:28:28Z</dc:date>
    </item>
    <item>
      <title>Access rules allow everything</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836518#M159561</link>
      <description>&lt;P&gt;Access rules allow everything (from 'all' to 'all' for ip &amp;amp; icmp) on both interfaces.&amp;nbsp; I set this just by adding a rule in ASDM, which defaults to quite open.&amp;nbsp; In my case, TCP didn't work either (the host has a webserver on it, for instance).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I thought I'd tried a NAT entry like that (I 'think' because I've tried so many variations, mainly using ASDM and the public server feature).&amp;nbsp; I'll give it another go though.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If I (do I?) understand your rule correctly; from DMZ to Inside, the source gets changed from 192- to 172-.&amp;nbsp; From inside, the 172... gets the destination set to 192... and chucked on the DMZ interface.&amp;nbsp; This I've definitely tried.&amp;nbsp; The result was that DMZ to Internal was all ok.&amp;nbsp; ICMP &amp;amp; TCP were fine.&amp;nbsp; ICMP/TCP the other way round though didn't work.&amp;nbsp; The syslog showed that the transactions were setup on the firewall for both ICMP &amp;amp; TCP, but wireshark shows no packets get through (and no deny logs either).&lt;/P&gt;
&lt;P&gt;The only thing I've spotted with the transaction log is that the IPs were 172.16.10.(any) to 172.16.10.12(host) - I don't know whether the this is what's expected (ie the host address is logged with the un-nat'd address), or whether it indicates it's erroneously hairpinning &amp;amp; the NAT has failed.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help so far.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 23:47:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836518#M159561</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-14T23:47:41Z</dc:date>
    </item>
    <item>
      <title>What appears in the ASDM log</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836519#M159563</link>
      <description>&lt;P&gt;What appears in the ASDM log when you do the ping? &amp;nbsp;It will say if packets are being dropped and why.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 23:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836519#M159563</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-14T23:51:16Z</dc:date>
    </item>
    <item>
      <title>%ASA-7-609001: Built local</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836520#M159565</link>
      <description>&lt;P&gt;%ASA-7-609001: Built local-host INSIDE-VLAN:172.16.10.14&lt;BR /&gt;%ASA-7-609001: Built local-host INSIDE-VLAN:172.16.10.12&lt;BR /&gt;%ASA-6-302013: Built inbound TCP connection 210706 for INSIDE-VLAN:172.16.10.14/49203 (172.16.10.14/49203) to INSIDE-VLAN:172.16.10.12/)&lt;/P&gt;
&lt;P&gt;{wait}&lt;/P&gt;
&lt;P&gt;%ASA-7-710005: UDP request discarded from 0.0.0.0/68 to INSIDE-VLAN:255.255.255.255/67&lt;BR /&gt;%ASA-6-302014: Teardown TCP connection 210706 for INSIDE-VLAN:172.16.10.14/49203 to INSIDE-VLAN:172.16.10.12/80 duration 0:00:30 bytest&lt;BR /&gt;%ASA-7-609002: Teardown local-host INSIDE-VLAN:172.16.10.14 duration 0:00:30&lt;BR /&gt;%ASA-7-609002: Teardown local-host INSIDE-VLAN:172.16.10.12 duration 0:00:30&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I dont think the discarded UDP request is relevant in this instance (DHCP from somewhere?)&lt;BR /&gt;It only denies ICMP &amp;amp; TCP if intra-interface is not set.&lt;BR /&gt;ICMP echo-request packets are sent by any 172 clients, the ASA responds to the necessary ARP request for the 172.16.10.12 virtual host, but doesn't forward the traffic.&lt;/P&gt;
&lt;P&gt;The "built inbound connection" line says it's created INSIDE-INSIDE. Shouldn't this say INSIDE-&amp;gt;DMZ ?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 11:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836520#M159565</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-15T11:56:58Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836521#M159567</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Could you please run packet tracer for the traffic and verify which NAT rule is evaluated and share the same.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 12:04:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836521#M159567</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-02-15T12:04:08Z</dc:date>
    </item>
    <item>
      <title>Here's the output.  I think</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836522#M159569</link>
      <description>&lt;P&gt;Here's the output.&amp;nbsp; I think you're on to something.&amp;nbsp; It doesn't look like nat is doing anything...?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;# packet-tracer input INTERNAL-VLAN icmp 172.16.10.15 $&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; 172.16.10.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 255.255.255.0&amp;nbsp;&amp;nbsp; INTERNAL-VLAN&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype: log&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;access-group Internal-VLAN_access_in in interface INTERNAL-VLAN&lt;BR /&gt;access-list Internal-VLAN_access_in extended permit object-group DM_INLINE_PROTOCOL_3 any any &lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_3&lt;BR /&gt;&amp;nbsp;protocol-object ip&lt;BR /&gt;&amp;nbsp;protocol-object icmp&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 5&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 7&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Phase: 9&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype: &lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 212218, packet dispatched to next module&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: INTERNAL-VLAN&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: INTERNAL-VLAN&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I run the trace in the other direction, the NAT rule given above is run OK.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for your help!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 13:18:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836522#M159569</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-15T13:18:49Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836523#M159571</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;From the provided packet tracer it looks like there is no NAT happening.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is what I would like to know:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Is the source and destination belong to same subnet?&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Are you trying to translate the traffic coming from Internal-vlan and this traffic should be sent to a device on DMZ?&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; If this is the nat rule that you have created, then change it to manual NAT statement for testing purpose and place it on top so as to confirm there is no other conflicting NAT rules present.&lt;/P&gt;
&lt;P&gt;object network server&lt;BR /&gt; host 192.168.10.2&lt;BR /&gt;object network server&lt;BR /&gt; nat (dmz,inside) static 172.16.10.12&lt;/P&gt;
&lt;P&gt;Change it to :&lt;/P&gt;
&lt;P&gt;example:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;nat(dmz, Internal-vlan) 1 source static real-IP mapped-IP&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;RS&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 13:38:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836523#M159571</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2016-02-15T13:38:53Z</dc:date>
    </item>
    <item>
      <title>That NAT rule you gave me has</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836524#M159573</link>
      <description>&lt;P&gt;That NAT rule you gave me has worked!!!... but I don't understand why!!&amp;nbsp; Can you please explain the difference between the rule within the object and your manual statement?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The new packet trace has a different first step;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;packet-tracer input INTERNAL-VLAN icmp 172.16.10.15 8 0 172.$&lt;BR /&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: UN-NAT&lt;BR /&gt;Subtype: static&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;nat (DMZ,INTERNAL-VLAN) source static server int-server&lt;BR /&gt;Additional Information:&lt;BR /&gt;NAT divert to egress interface DMZ&lt;BR /&gt;Untranslate 172.16.10.12/0 to 192.168.10.2/0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Is the source and destination belong to same subnet?&lt;/P&gt;
&lt;P&gt;Different subnets;&lt;/P&gt;
&lt;P&gt;DMZ Host: 192.168.10.2&amp;nbsp; mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;Internal-VLAN: 172.16.10.0 mask 255.255.255.0&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;&amp;gt; Are you trying to translate the traffic coming from Internal-vlan and this traffic should be sent to a device on DMZ?&lt;/P&gt;
&lt;P&gt;Yes, and also the other way round.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 14:03:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836524#M159573</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-15T14:03:10Z</dc:date>
    </item>
    <item>
      <title>just the transaction setup</title>
      <link>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836525#M159575</link>
      <description>&lt;P&gt;[ Deleted ]&lt;/P&gt;
&lt;P&gt;Reason: Replied to the wrong comment &amp;amp; it's making the thread confusing to follow.&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 14:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-dmz-to-an-internal-address/m-p/2836525#M159575</guid>
      <dc:creator>Turkey Twizzler</dc:creator>
      <dc:date>2016-02-15T14:05:03Z</dc:date>
    </item>
  </channel>
</rss>

