<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Note the NAT precedence below in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747584#M178369</link>
    <description>&lt;P&gt;Note the NAT precedence below:&lt;/P&gt;&lt;P&gt;To achieve what you have mentioned in addition to the inbound policy NAT,&lt;/P&gt;&lt;P&gt;just a simple dynamic NAT to the 1.1.1.1 public IP (Private range 192.168.1.1 and 1.2) would give you the required result.&lt;/P&gt;&lt;P&gt;As per cisco asa 8.2 commands below (x is the nat id)&lt;/P&gt;&lt;P&gt;nat (inside) x 192.168.1.0 255.255.255.252.&lt;/P&gt;&lt;P&gt;global (outside) x 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please mark answer as correct if it works for you.&lt;/P&gt;&lt;P&gt;If that doesn't work, then let me know I have another workaround that you may want to try.&lt;/P&gt;</description>
    <pubDate>Wed, 30 Sep 2015 23:23:31 GMT</pubDate>
    <dc:creator>Lovleen Arora</dc:creator>
    <dc:date>2015-09-30T23:23:31Z</dc:date>
    <item>
      <title>Incoming Destination policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747583#M178368</link>
      <description>&lt;P&gt;Hi guys, what i am trying to achieve is this: (I need ot be able to control the destination IP&amp;nbsp;based on the source IP)&lt;/P&gt;&lt;P&gt;ASA 8.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: 7.7.7.7 (host out on the internet - outside interface)&lt;/P&gt;&lt;P&gt;Destination: 1.1.1.1 (fake server Ip address on my firewall)&lt;/P&gt;&lt;P&gt;port: 1234&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;translate that to:&lt;/P&gt;&lt;P&gt;Source: original&lt;/P&gt;&lt;P&gt;Destination: 192.168.1.1 (real server IP -inside interface)&lt;/P&gt;&lt;P&gt;port: 1234&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AND&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: 9.9.9.9&amp;nbsp;(host out on the internet - outside interface)&lt;/P&gt;&lt;P&gt;Destination: 1.1.1.1 (same fake destination)&lt;/P&gt;&lt;P&gt;port: 1222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;translate that to:&lt;/P&gt;&lt;P&gt;Source: original&lt;/P&gt;&lt;P&gt;Destination: 192.168.1.2&amp;nbsp;(another real server IP -inside interface)&lt;/P&gt;&lt;P&gt;port: 1222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anything else coming to 1.1.1.1 should not be natted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can achieve that okay, but here is the part I am stuick with, I also need the NAT&amp;nbsp;to work like a static NAT&amp;nbsp;so traffic in other direction will also work:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: 192.168.1.1&lt;/P&gt;&lt;P&gt;Destination: 7.7.7.7&amp;nbsp;&lt;/P&gt;&lt;P&gt;port: 1234&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;translate that to:&lt;/P&gt;&lt;P&gt;Source: 1.1.1.1&lt;/P&gt;&lt;P&gt;Destination: 7.7.7.7&lt;/P&gt;&lt;P&gt;port: 1234&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AND&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: 192.168.1.2&lt;/P&gt;&lt;P&gt;Destination: 9.9.9.9 (same fake destination)&lt;/P&gt;&lt;P&gt;port: 1222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;translate that to:&lt;/P&gt;&lt;P&gt;Source: 1.1.1.1&lt;/P&gt;&lt;P&gt;Destination: 9.9.9.9 (another real server IP -inside interface)&lt;/P&gt;&lt;P&gt;port: 1222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747583#M178368</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2019-03-12T06:40:32Z</dc:date>
    </item>
    <item>
      <title>Note the NAT precedence below</title>
      <link>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747584#M178369</link>
      <description>&lt;P&gt;Note the NAT precedence below:&lt;/P&gt;&lt;P&gt;To achieve what you have mentioned in addition to the inbound policy NAT,&lt;/P&gt;&lt;P&gt;just a simple dynamic NAT to the 1.1.1.1 public IP (Private range 192.168.1.1 and 1.2) would give you the required result.&lt;/P&gt;&lt;P&gt;As per cisco asa 8.2 commands below (x is the nat id)&lt;/P&gt;&lt;P&gt;nat (inside) x 192.168.1.0 255.255.255.252.&lt;/P&gt;&lt;P&gt;global (outside) x 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please mark answer as correct if it works for you.&lt;/P&gt;&lt;P&gt;If that doesn't work, then let me know I have another workaround that you may want to try.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2015 23:23:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747584#M178369</guid>
      <dc:creator>Lovleen Arora</dc:creator>
      <dc:date>2015-09-30T23:23:31Z</dc:date>
    </item>
    <item>
      <title>Excellent thank you that</title>
      <link>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747585#M178371</link>
      <description>&lt;P&gt;Excellent thank you that seems like a simple answer!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Okay unfortunately though I&amp;nbsp;was wrong about the incoming working, i just used packet tracer and I am getting a "no matching global" error for this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list DESTINATION-PAT extended permit tcp host 7.7.7.7 host 1.1.1.1 eq 23&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;nat (outside) 7 access-list DESTINATION-PAT outside&lt;BR /&gt;global (prod) 7 192.168.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to be clear for what I am trying to achieve, I just want incoming traffic that matches this ACL to be destination&amp;nbsp;natted to the real address (no source nattign required)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why am I getting a no matching global pool in packet tracer? and reason i can't do a simple static is because I will also extend this to say from 8.8.8.8 to 1.1.1.1 dnat to 192.168.1.2 etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2015 02:25:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747585#M178371</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2015-10-01T02:25:27Z</dc:date>
    </item>
    <item>
      <title>anyone have any ideas?</title>
      <link>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747586#M178372</link>
      <description>&lt;P&gt;anyone have any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 00:52:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/incoming-destination-policy-nat/m-p/2747586#M178372</guid>
      <dc:creator>ryancisco01</dc:creator>
      <dc:date>2015-10-02T00:52:18Z</dc:date>
    </item>
  </channel>
</rss>

