<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How recently have you in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732748#M192607</link>
    <description>&lt;P&gt;How recently have you switched over ?&lt;/P&gt;&lt;P&gt;For any IPs that are not assigned to an interface but are part of the same IP subnet as the interface IP&amp;nbsp;your ISP will use arp to resolve the IP and your firewall will respond with the outside interface mac address.&lt;/P&gt;&lt;P&gt;If you have recently switched over then your ISP may well still have the old entries in their arp cache on their router.&lt;/P&gt;&lt;P&gt;The outside interface IP itself is usually updated because you usually have internal clients connecting to the internet using that IP which refreshes the ISP arp cache.&lt;/P&gt;&lt;P&gt;If that is not the issue ie. it has been a while since you moved across can you post the output of -&lt;/P&gt;&lt;P&gt;"packet-tracer input outside tcp 8.8.8.8 12345 75.x.x.230 www"&lt;/P&gt;&lt;P&gt;Note also that this is a public forum so if those are you real public IPs can you do as I have done above.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Wed, 19 Aug 2015 16:45:34 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2015-08-19T16:45:34Z</dc:date>
    <item>
      <title>Cisco ASA 5505 9.24 Multiple public IPs to multiple internal servers</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732747#M192605</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;I'm really hoping someone might be able to help me here. What I'm trying to do seems like it should be really simple, but I've not had much luck.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I recently switched from a Juniper SRX to a Cisco ASA and am having issues with trying to get things set up. Here's the basic setup:&lt;/P&gt;
&lt;OL&gt;&lt;LI&gt;I have multiple public IPs from my ISP under a /26 netmask (vlan is called astound).&lt;/LI&gt;&lt;LI&gt;I have multiple internal servers running on a 10.x.x.x netblock, each running varying services (vlan is called servers).&lt;/LI&gt;&lt;LI&gt;I also have a "trusted" network internally for my non-server hosts (workstations, etc.) and the vlan is called trusted.&lt;/LI&gt;&lt;LI&gt;Each of the above networks are in their own vlans, "switchport access vlan xxx" on the appropriate interfaces.&lt;/LI&gt;&lt;LI&gt;Both the "external and dmz" are security level 0, and the "trusted" is security level 100.&lt;/LI&gt;&lt;LI&gt;The "same-security-traffic permit inter-interface" setting is enabled.&lt;/LI&gt;&lt;LI&gt;The Cisco ASA 5505 has 512M of ram, 9.2(4) firmware, and a security plus license.&lt;/LI&gt;&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The main issue I am having is trying to make the multiple public IPs work. If I set up objects and nat for one webserver, and use the "interface" address then I can access the web server externally via it's public IP.&lt;/P&gt;
&lt;P&gt;But if I leave that alone, then simply change the webserver NAT to a secondary IP, it no longer works. For example:&lt;/P&gt;
&lt;P&gt;object network webserver&lt;BR /&gt;&amp;nbsp;host 10.1.10.10&lt;BR /&gt;&amp;nbsp;nat (servers,astound) static interface service tcp www www&lt;/P&gt;
&lt;P&gt;Works and allows the "interface" address, the public IP, to route to the webserver properly. The interface address is 75.12.10.229.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But this doesn't work:&lt;/P&gt;
&lt;P&gt;object network webserver&lt;BR /&gt;&amp;nbsp;host 10.1.10.10&lt;BR /&gt;&amp;nbsp;nat (servers,astound) static 75.12.10.230 service tcp www www&lt;/P&gt;
&lt;P&gt;(the IP here is a secondary public IP I have)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I also tried to set up the secondary IP as an object (object network astound-230, host 75.12.10.230) and reference it that way but it doesn't help. I also have the ACLs in place as far as I know. Any ideas what's going on?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's relevant parts of my config for the setup that does work - interface public IP serves http from the webserver:&lt;/P&gt;

&lt;PRE&gt;
&lt;SPAN style="font-family:courier new,courier,monospace;"&gt;&lt;SPAN style="font-size: 12px;"&gt;: Hardware:   ASA5505, 512 MB RAM, CPU Geode 500 MHz
:
ASA Version 9.2(4)
!
interface Ethernet0/0
 switchport access vlan 10
!
interface Ethernet0/1
 switchport access vlan 100
!
interface Ethernet0/2
 switchport access vlan 200
!
interface Vlan1
 nameif mgmt
 security-level 0
 no ip address
!
interface Vlan10
 nameif astound
 security-level 0
 ip address 75.12.10.229 255.255.255.192
!
interface Vlan100
 nameif trusted
 security-level 100
 ip address 192.168.1.2 255.255.255.0
!
interface Vlan200
 nameif servers
 security-level 0
 ip address 10.1.10.1 255.255.255.0
!
same-security-traffic permit inter-interface
!
object network webserver
 host 10.1.10.10
 nat (servers,astound) static interface service tcp www www
!
access-list outside-in extended permit tcp any object webserver eq www
access-list servers-out extended permit tcp any any
access-list servers-access-out extended permit udp any any
access-list astound-ping extended permit icmp any4 any4 echo
access-group servers-out out interface servers
access-group outside-in in interface astound
!
ip verify reverse-path interface astound
dynamic-access-policy-record DfltAccessPolicy
!
route astound 0.0.0.0 0.0.0.0 75.12.10.193 1
!
..snip&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732747#M192605</guid>
      <dc:creator>bayarealocks</dc:creator>
      <dc:date>2019-03-12T06:27:38Z</dc:date>
    </item>
    <item>
      <title>How recently have you</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732748#M192607</link>
      <description>&lt;P&gt;How recently have you switched over ?&lt;/P&gt;&lt;P&gt;For any IPs that are not assigned to an interface but are part of the same IP subnet as the interface IP&amp;nbsp;your ISP will use arp to resolve the IP and your firewall will respond with the outside interface mac address.&lt;/P&gt;&lt;P&gt;If you have recently switched over then your ISP may well still have the old entries in their arp cache on their router.&lt;/P&gt;&lt;P&gt;The outside interface IP itself is usually updated because you usually have internal clients connecting to the internet using that IP which refreshes the ISP arp cache.&lt;/P&gt;&lt;P&gt;If that is not the issue ie. it has been a while since you moved across can you post the output of -&lt;/P&gt;&lt;P&gt;"packet-tracer input outside tcp 8.8.8.8 12345 75.x.x.230 www"&lt;/P&gt;&lt;P&gt;Note also that this is a public forum so if those are you real public IPs can you do as I have done above.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 16:45:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732748#M192607</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-08-19T16:45:34Z</dc:date>
    </item>
    <item>
      <title>Hi Jon,Thanks for your reply.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732749#M192609</link>
      <description>&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;Thanks for your reply.&amp;nbsp;One thing to note is that in order for the interface address to work at all I needed to restart my cable modem. Once I did that the public IP of the external interface worked, and routed http traffic to my web server. This tells me it might be related to the multiple public IPs not working, although I beg the question -- if the Cisco ASA only allows one real IP on the external interface, how to the other IPs respond via arp to the modem if they're only NATted to the servers? I am assuming pings won't reply to IPs that are just static NATted to the internal server subnet.&lt;/P&gt;&lt;P&gt;Also, I have modified the "public" ips in my posting as I understand the nature of this forum. Hope I didn't step on someone else's toes by making up new IPs, I know those are someone's real IPs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I'll try the packet tracer this evening to see what I get.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Dennis&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2015 23:57:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732749#M192609</guid>
      <dc:creator>bayarealocks</dc:creator>
      <dc:date>2015-08-19T23:57:34Z</dc:date>
    </item>
    <item>
      <title>Hey Dennis,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732750#M192610</link>
      <description>&lt;P&gt;Hey Dennis,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Did you ever resolve this issue? I have exactly the same&amp;nbsp;problem and its racking my brain!!&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 12:54:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732750#M192610</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-03-21T12:54:11Z</dc:date>
    </item>
    <item>
      <title>No, unfortunately I did not.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732751#M192611</link>
      <description>&lt;P&gt;No, unfortunately I did not. I spoke with some network guys at work and they agreed that this is an issue with the ASAs which I was really surprised to hear.&lt;/P&gt;
&lt;P&gt;In the process of trying to fix my issue I tried a Watchguard (which I've worked with before) but there's this whole license thing that's expensive.&lt;/P&gt;
&lt;P&gt;Finally, I was able to get my Juniper SRX going and absolutely love it! Once I stepped into the JunOS world I made it over the learning hump and think it's a great product.&lt;/P&gt;
&lt;P&gt;I wish the ASA supported multiple IPs on it's outside interface. I was expecting to be able to add an ip address and multiple "ip address x.x.x.x secondary" like you can on a Cisco switch's interface port. I use a Cisco 4948 and that's a standard setting there.&lt;/P&gt;
&lt;P&gt;Best of luck and I hope you can find yourself a good solution!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2016 15:03:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732751#M192611</guid>
      <dc:creator>bayarealocks</dc:creator>
      <dc:date>2016-03-21T15:03:00Z</dc:date>
    </item>
    <item>
      <title>Damn! Looks like I may have</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732752#M192612</link>
      <description>&lt;P&gt;Damn! Looks like I may have to explore other alternatives.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for responding Dennis, much appreciated &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Mar 2016 09:02:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732752#M192612</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-03-22T09:02:37Z</dc:date>
    </item>
    <item>
      <title>I have several ASAs with</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732753#M192613</link>
      <description>&lt;P&gt;I have several ASAs with similar configuration so such a setup should work. Please check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;show connection detail long&lt;/P&gt;
&lt;P&gt;show xlate det&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;while trying to connect. What logs are generated during the attempt?&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 22:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732753#M192613</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2016-03-24T22:07:02Z</dc:date>
    </item>
    <item>
      <title>Hey Peter,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732754#M192614</link>
      <description>&lt;P&gt;Hey Peter,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for the response.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Below is my sanitised config. What I am trying to do is portforward for a spare IP that I have (represented as 100.XXX.XXX.3), instead of the interface IP, represented as 100.XXX.XXX.2.&amp;nbsp;As I had this problem quite a while back I had to resort to using a second ASA for the port forwards associated with the secondary IP, therefore I do not have any outputs I can provide at the moment, sorry. ASA is relatively new to me so any help you can provide would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;hostname MYASA&lt;BR /&gt;domain-name MYDOMAIN.COM&lt;BR /&gt;xlate per-session deny tcp any4 any4&lt;BR /&gt;xlate per-session deny tcp any4 any6&lt;BR /&gt;xlate per-session deny tcp any6 any4&lt;BR /&gt;xlate per-session deny tcp any6 any6&lt;BR /&gt;xlate per-session deny udp any4 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any4 any6 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any4 eq domain&lt;BR /&gt;xlate per-session deny udp any6 any6 eq domain&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;&amp;nbsp;description **INTERNET FACING LINK**&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 100.XXX.XXX.2 255.255.255.248&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;&amp;nbsp;description **INTERNAL CORP NETWORK**&lt;BR /&gt;&amp;nbsp;nameif Corp&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.10.2.17 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/2&lt;BR /&gt;&amp;nbsp;description **ENGINEERS NETWORK**&lt;BR /&gt;&amp;nbsp;nameif Engineers&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.9.1.1 255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/4&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/5&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;management-only&lt;BR /&gt;&amp;nbsp;shutdown&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;&amp;nbsp;domain-name MYDOMAIN.COM&lt;BR /&gt;object network CORP&lt;BR /&gt;&amp;nbsp;subnet 10.10.2.0 255.255.255.0&lt;BR /&gt;object network MAIL_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.61&lt;BR /&gt;object network PPTP_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.60&lt;BR /&gt;object network SECUREWEB_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.61&lt;BR /&gt;object network WEB_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.61&lt;BR /&gt;object network FTP_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.64&lt;BR /&gt;object network Engineers&lt;BR /&gt;&amp;nbsp;subnet 10.9.0.0 255.255.0.0&lt;BR /&gt;object network Telnet&lt;BR /&gt;&amp;nbsp;host 10.10.2.11&lt;BR /&gt;object network MAIL2_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.63&lt;BR /&gt;object network WEB3_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.62&lt;BR /&gt;object network MAIL_SVR2&lt;BR /&gt;&amp;nbsp;host 10.10.2.63&lt;BR /&gt;object network WEB3SEC_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.62&lt;BR /&gt;object network MAILSEC_SVR&lt;BR /&gt;&amp;nbsp;host 10.10.2.63&lt;BR /&gt;object network RDP&lt;BR /&gt;&amp;nbsp;host 10.10.2.69&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object SECUREWEB_SVR eq https&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object MAIL_SVR eq smtp&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object PPTP_SVR eq pptp&lt;BR /&gt;access-list OUTSIDE_IN extended permit gre any object PPTP_SVR&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object WEB_SVR eq www&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object FTP_SVR eq ftp&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object Telnet eq telnet&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object MAIL2_SVR eq smtp&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object WEB3_SVR eq www&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object MAIL_SVR2 eq imap4&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object WEB3SEC_SVR eq https&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object MAILSEC_SVR eq 993&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object RDP eq 3389&lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu Corp 1500&lt;BR /&gt;mtu Engineers 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;no arp permit-nonconnected&lt;BR /&gt;!&lt;BR /&gt;object network CORP&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) dynamic interface&lt;BR /&gt;object network MAIL_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static interface service tcp smtp smtp&lt;BR /&gt;object network PPTP_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static interface service tcp pptp pptp&lt;BR /&gt;object network SECUREWEB_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static interface service tcp https https&lt;BR /&gt;object network WEB_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static interface service tcp www www&lt;BR /&gt;object network FTP_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static interface service tcp ftp ftp&lt;BR /&gt;object network Engineers&lt;BR /&gt;&amp;nbsp;nat (Engineers,outside) dynamic interface&lt;BR /&gt;object network Telnet&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp telnet telnet&lt;BR /&gt;object network MAIL2_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp smtp smtp&lt;BR /&gt;object network WEB3_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp www www&lt;BR /&gt;object network MAIL_SVR2&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp imap4 imap4&lt;BR /&gt;object network WEB3SEC_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp https https&lt;BR /&gt;object network MAILSEC_SVR&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp 993 993&lt;BR /&gt;object network RDP&lt;BR /&gt;&amp;nbsp;nat (Corp,outside) static 100.XXX.XXX.3 service tcp 3389 3389&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 100.XXX.XXX.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout pat-xlate 0:00:30&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;timeout floating-conn 0:00:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;user-identity default-domain LOCAL&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart warmstart&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.10.2.0 255.255.255.0 Corp&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;ssh key-exchange group dh-group1-sha1&lt;BR /&gt;console timeout 0&lt;BR /&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;&amp;nbsp;match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp;parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;&amp;nbsp;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map&lt;BR /&gt;&amp;nbsp; inspect ftp&lt;BR /&gt;&amp;nbsp; inspect h323 h225&lt;BR /&gt;&amp;nbsp; inspect h323 ras&lt;BR /&gt;&amp;nbsp; inspect ip-options&lt;BR /&gt;&amp;nbsp; inspect netbios&lt;BR /&gt;&amp;nbsp; inspect rsh&lt;BR /&gt;&amp;nbsp; inspect rtsp&lt;BR /&gt;&amp;nbsp; inspect skinny&lt;BR /&gt;&amp;nbsp; inspect sqlnet&lt;BR /&gt;&amp;nbsp; inspect sunrpc&lt;BR /&gt;&amp;nbsp; inspect tftp&lt;BR /&gt;&amp;nbsp; inspect sip&lt;BR /&gt;&amp;nbsp; inspect xdmcp&lt;BR /&gt;&amp;nbsp; inspect pptp&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 10:07:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732754#M192614</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-03-29T10:07:02Z</dc:date>
    </item>
    <item>
      <title>I can't spot any errors in</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732755#M192615</link>
      <description>&lt;P&gt;I can't spot any errors in the config so the show outputs are needed.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Mar 2016 20:38:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732755#M192615</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2016-03-29T20:38:48Z</dc:date>
    </item>
    <item>
      <title>Hello Peter,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732756#M192616</link>
      <description>&lt;P&gt;Hello Peter,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As this is no longer a production configuration I'll try and lab this today for you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks for&amp;nbsp;your time.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 08:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732756#M192616</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-03-30T08:53:42Z</dc:date>
    </item>
    <item>
      <title>Hello Peter,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732757#M192617</link>
      <description>&lt;P&gt;Hello Peter,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I labbed this out and this is what I managed to capture.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I used a laptop running PRTG&amp;nbsp;for my web server (10.10.2.61)&amp;nbsp;and a switch configured for telnet&amp;nbsp;access (10.10.2.11)&amp;nbsp;to simulate someone trying to access the 2 different public IP's from the outside.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is what I got from the "show connection detail long" when trying to access 100.100.100.3 (the spare IP):&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;TCP outside:200.200.200.2/57934 (200.200.200.2/57934) Corp:10.10.2.11/23 (100.100.100.3/23), flags SaAB, idle 5s, uptime 14s, timeout 30s, bytes 0&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;This is what I got when I tried to access the web server (on interface IP 100.100.100.2), which went straight through to the management page:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;TCP outside:200.200.200.2/57995 (200.200.200.2/57995) Corp:10.10.2.61/80 (100.100.100.2/80), flags UB, idle 3s, uptime 3s, timeout 1h0m, bytes 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;TCP outside:200.200.200.2/57994 (200.200.200.2/57994) Corp:10.10.2.61/80 (100.100.100.2/80), flags UB, idle 3s, uptime 3s, timeout 1h0m, bytes 0&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;"Show xlate detail" didn't work for my lab ASA which is on 8.4 so I did a "debug nat 255" instead&amp;nbsp; (not that this is an equivalent command):&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;nat: untranslation - outside:100.100.100.3/23 to Corp:10.10.2.11/23&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat: untranslation - outside:100.100.100.3/23 to Corp:10.10.2.11/23&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat: untranslation - outside:100.100.100.3/23 to Corp:10.10.2.11/23&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat: policy unlock 0xae29f900, old count is 18&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;nat: policy lock 0xae29f900, old count is 1&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;In regards to logs, this is what is displayed in the logging buffer when I try and connect:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;%ASA-7-609001: Built local-host Corp:10.10.2.11&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;%ASA-6-302013: Built inbound TCP connection 170 for outside:200.200.200.2/58473 (200.200.200.2/58473) to Corp:10.10.2.11/23 (100.100.100.3/23)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also here is what the "show access-list" and "show nat" displayed after the connection:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;access-list OUTSIDE_IN line 7 extended permit tcp any object Telnet eq telnet (hitcnt=0) 0xf4e5c00f&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp; access-list OUTSIDE_IN line 7 extended permit tcp any host 10.10.2.11 eq telnet (hitcnt=8) 0xf4e5c00f&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;1 (Corp) to (outside) source static Telnet 100.100.100.3&amp;nbsp;&amp;nbsp; service tcp telnet telnet&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 8&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you need anything else while I have the lab running.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2016 09:59:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732757#M192617</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-03-30T09:59:06Z</dc:date>
    </item>
    <item>
      <title> I'm avoiding these multiple</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732758#M192618</link>
      <description>&lt;P&gt;&amp;nbsp;I'm avoiding these multiple reply threads... (-:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;TCP outside:200.200.200.2/57934 (200.200.200.2/57934) Corp:10.10.2.11/23 (100.100.100.3/23), flags SaAB, idle 5s, uptime 14s, timeout 30s, bytes 0&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Analysis: everything is all right except that the switch's SYN-ACK reply from port 23 does not reach the firewall. Probably its default gateway is incorrect or it has a telnet-blocking ACL.&lt;/P&gt;
&lt;P&gt;In detail:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The line would not even be placed into the connection table if ASA dropped the request. SaA flags inform us about the incomplete TCP handshake. Original and translated IP and port numbers prove&amp;nbsp;that NAT works correctly.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2016 20:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732758#M192618</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2016-03-31T20:56:03Z</dc:date>
    </item>
    <item>
      <title>Morning Peter,</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732759#M192619</link>
      <description>&lt;P&gt;Morning Peter,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Just checked the config on the switch and it looks good. I have given SVI VLAN1 the&amp;nbsp;IP of 10.10.2.11 and configured it correctly for telnet (tested by adding another host behind the firewall and successfully telnetting to the switch). I have also specified 10.10.2.17 as the default gateway (IP of firewall).&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are no ACL's on the switch, the only ones I have are on the ASA, shown previously.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I am also able to ping the "internet host" of 200.200.200.2, specifying the source IP of the SVI from the switch, so there definitely&amp;nbsp;is reachability.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Fri, 01 Apr 2016 09:44:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-5505-9-24-multiple-public-ips-to-multiple-internal/m-p/2732759#M192619</guid>
      <dc:creator>gchana2011</dc:creator>
      <dc:date>2016-04-01T09:44:18Z</dc:date>
    </item>
  </channel>
</rss>

