<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You configure NAT so that 200 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793667#M160006</link>
    <description>&lt;P&gt;You configure NAT so that&amp;nbsp;&lt;SPAN&gt;200.1.1.4 &amp;amp; 200.1.1.5 are translated to the inside IP addresses of your server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When the router wants to forward a packet to&amp;nbsp;&lt;SPAN&gt;200.1.1.4 or 200.1.1.5 it will send an ARP query and your firewall will respond, since it has a matching NAT entry configured.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Feb 2016 08:04:00 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-02-05T08:04:00Z</dc:date>
    <item>
      <title>Firewall Routing</title>
      <link>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793666#M160005</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;I'm using a Cisco ASA 5550 firewall.&lt;/P&gt;
&lt;P&gt;I have an external subnet on the internet eg 200.1.1.0/24 and have that subnet routed into our network. Please see the attached diagram.&lt;/P&gt;
&lt;P&gt;200.1.1.2 is only used as the external facing management address of firewall A (that is all the subnet is currently used for)&amp;nbsp;and I want to use the rest of the external subnet to access servers that sit behind Firewall B.&lt;/P&gt;
&lt;P&gt;The external subnet eg is on Vlan 2 and firewall B has an outside interface address of 200.1.1.3.&lt;/P&gt;
&lt;P&gt;I want to be able to route traffic with a destination address of 200.1.1.4 &amp;amp; 200.1.1.5 to my internal servers.&lt;/P&gt;
&lt;P&gt;I will have NAT in place to translate the external addresses to the internal addresses of the servers.&lt;/P&gt;
&lt;P&gt;My query is mainly around how will the traffic know to go to my firewall ?&lt;/P&gt;
&lt;P&gt;So will traffic destined for 200.1.1.4 &amp;amp; 200.1.1.5 be directed to the external interface on my firewall by default - will ARP just do the work or will I have to add a specific route to the router - ie saying to get to 200.1.1.4 and 200.1.1.5 go via the external interface on my firewall ?&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793666#M160005</guid>
      <dc:creator>Jim Kerr</dc:creator>
      <dc:date>2019-03-12T07:14:34Z</dc:date>
    </item>
    <item>
      <title>You configure NAT so that 200</title>
      <link>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793667#M160006</link>
      <description>&lt;P&gt;You configure NAT so that&amp;nbsp;&lt;SPAN&gt;200.1.1.4 &amp;amp; 200.1.1.5 are translated to the inside IP addresses of your server.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;When the router wants to forward a packet to&amp;nbsp;&lt;SPAN&gt;200.1.1.4 or 200.1.1.5 it will send an ARP query and your firewall will respond, since it has a matching NAT entry configured.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 08:04:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793667#M160006</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-05T08:04:00Z</dc:date>
    </item>
    <item>
      <title>Hi Jim,</title>
      <link>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793668#M160007</link>
      <description>&lt;P&gt;Hi Jim,&lt;/P&gt;
&lt;P&gt;If the NAT IP and the interface IP are in the same subnet then the firewall will do the proxy arp.&lt;/P&gt;
&lt;P&gt;You can verify whether the interface allows the proxy arp or not by running "show run all sysopt".&lt;/P&gt;
&lt;P&gt;You must have the command "no sysopt noproxyarp &amp;lt;interface name&amp;gt;" then the interface will send the proxy arp.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the NAT IP and the interface IP are in&amp;nbsp;different subnet then you can configure the command &amp;nbsp;"arp permit-nonconnected"&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Shivapramod M&lt;BR /&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 08:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-routing/m-p/2793668#M160007</guid>
      <dc:creator>Shivapramod M</dc:creator>
      <dc:date>2016-02-05T08:09:59Z</dc:date>
    </item>
  </channel>
</rss>

