<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic That's how it works on the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815865#M172934</link>
    <description>&lt;P&gt;That's how it works on the ASA. Do you have a public IP per server that you translate to your internal host? Then DNS-doctoring is the easiest solution:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.10.10.10&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static&amp;nbsp;192.0.2.10 &lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jan 2016 18:39:13 GMT</pubDate>
    <dc:creator>Karsten Iwen</dc:creator>
    <dc:date>2016-01-29T18:39:13Z</dc:date>
    <item>
      <title>Cannot access external IP from inside network</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815864#M172932</link>
      <description>&lt;P&gt;I cannot access our servers external IP from our internal networks. I can access the servers DMZ address but not the external. Any ideas?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:13:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815864#M172932</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2019-03-12T07:13:03Z</dc:date>
    </item>
    <item>
      <title>That's how it works on the</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815865#M172934</link>
      <description>&lt;P&gt;That's how it works on the ASA. Do you have a public IP per server that you translate to your internal host? Then DNS-doctoring is the easiest solution:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;object network SERVER&lt;BR /&gt;&amp;nbsp;host 10.10.10.10&lt;BR /&gt;&amp;nbsp;nat (DMZ,outside) static&amp;nbsp;192.0.2.10 &lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 18:39:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815865#M172934</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-29T18:39:13Z</dc:date>
    </item>
    <item>
      <title>I enabled that but still can</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815866#M172937</link>
      <description>&lt;P&gt;I enabled that but still can't ping the external IP.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jan 2016 18:57:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815866#M172937</guid>
      <dc:creator>Matt Roberts</dc:creator>
      <dc:date>2016-01-29T18:57:17Z</dc:date>
    </item>
    <item>
      <title>wasn't clear enough on that .</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815867#M172939</link>
      <description>&lt;P&gt;wasn't clear enough on that ...&lt;/P&gt;
&lt;P&gt;The purpose of DNS-doctoring is not to reach the public IP. But now you can reach the internal host with the public FQDN that is assigned to the public IP.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jan 2016 00:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815867#M172939</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2016-01-30T00:40:13Z</dc:date>
    </item>
    <item>
      <title>Actually, just to clarify</title>
      <link>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815868#M172941</link>
      <description>&lt;P&gt;Actually, just to clarify what Karsten has said. &amp;nbsp;the DNS request needs to pass through the ASA for DNS doctoring / re-write to work. &amp;nbsp;If your PC is on the same subnet as the DNS server, DNS doctoring will not work. &amp;nbsp;In this case you will need to do twice NAT to make this work or add a new DNS A record for the internal IP of the server. &amp;nbsp;Assuming that the server is located on the same subnet as the PC you are trying to reach it from you could configure NAT as follows (lets assume that the interface is called "inside"):&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network SERVER_PRIVATE&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 10.1.1.10&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; subnet 10.1.1.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;object network SERVER_PUBLIC&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; host 195.16.16.16&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) source static LAN LAN destination static SERVER_PRIVATE SERVER_PUBLIC&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 31 Jan 2016 01:21:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cannot-access-external-ip-from-inside-network/m-p/2815868#M172941</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-01-31T01:21:32Z</dc:date>
    </item>
  </channel>
</rss>

