<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Static PAT to multiple private IPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692659#M190975</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am in the process of replacing some Watchguard firewalls with ASA firewalls. I have noticed a few static NAT rules on the Watchguard using the same public IP address but each NAT uses a different private IP Address.&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.1&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.5&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.20&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would I add this into an ASA. This is for external hosts trying to access internal servers on the one external IP but mapped to different internal IPs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would a standard PAT work using the different internal&amp;nbsp;IPs&amp;nbsp;to PAT to the single external IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:02:47 GMT</pubDate>
    <dc:creator>Mokhalil82</dc:creator>
    <dc:date>2019-03-12T06:02:47Z</dc:date>
    <item>
      <title>ASA Static PAT to multiple private IPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692659#M190975</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am in the process of replacing some Watchguard firewalls with ASA firewalls. I have noticed a few static NAT rules on the Watchguard using the same public IP address but each NAT uses a different private IP Address.&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.1&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.5&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.20&lt;/P&gt;&lt;P&gt;98.98.98.1 &amp;gt; 192.168.10.44&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would I add this into an ASA. This is for external hosts trying to access internal servers on the one external IP but mapped to different internal IPs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would a standard PAT work using the different internal&amp;nbsp;IPs&amp;nbsp;to PAT to the single external IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:02:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692659#M190975</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2019-03-12T06:02:47Z</dc:date>
    </item>
    <item>
      <title>if you did a PAT then the</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692660#M190982</link>
      <description>&lt;P&gt;You could PAT say port 8080,8081,etc and translate that to 80 on the inside but you'd need to make sure you set it up the same way as watchguard.&amp;nbsp; I assume watchguard does NAT the same way as ASA and just reads down the list.&amp;nbsp; with the way you describe it, unless there was something to differentiate the NATs it would hit the first one only&lt;/P&gt;&lt;P&gt;I would first check to see if all the 192.168.10.x hosts are even live.&amp;nbsp; most likely some are not if you are replacing an old firewall.&lt;/P&gt;&lt;P&gt;secondly, would these IPs happen to be in a cluster?&amp;nbsp; If so, I have had to do a static nat to the VIP of the cluster so the outside world could talk to it but then also do dynamic nat for the individual cluster members.&amp;nbsp; This is because the cluster members would use their own IP to initiate outbound traffic.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2015 01:09:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692660#M190982</guid>
      <dc:creator>jmattbullen</dc:creator>
      <dc:date>2015-06-04T01:09:03Z</dc:date>
    </item>
    <item>
      <title>ThanksI will go through and</title>
      <link>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692661#M190986</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;I will go through and see what hosts are actually live, looks like many old rules so il tidy them up before moving further. I am order a new larger external ip address range so I may just NAT them out to individual IPs instead of doing the port address translations&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jun 2015 07:26:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static-pat-to-multiple-private-ips/m-p/2692661#M190986</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2015-06-05T07:26:04Z</dc:date>
    </item>
  </channel>
</rss>

