<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Thanks again Jon :-) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666420#M195952</link>
    <description>&lt;P&gt;Thanks again Jon &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In between your posts (so before seeing this one) I've done this and it appears to work. I've basically stuck it all in section one at the end of it... Am I missing something that will have broken here? I've done various checks and can't find something.&lt;/P&gt;
&lt;P&gt;&amp;lt;section 1, everything else before it&amp;gt;&lt;/P&gt;

&lt;PRE&gt;
nat (inside,outside) source static server-2 NAT-IP-1 service HTTPS HTTPS
nat (inside,outside) source static server-3 NAT-IP-1 service HTTP HTTP
nat (inside,outside) source static server-2 NAT-IP-1
nat (inside,outside) source static server-3 NAT-IP-1&lt;/PRE&gt;

&lt;P&gt;So if it's for those ports it matches it, if it isn't for any port specifically it still catches it at the next rules and does it's thing for out bound NAT too. If it isn't for server-2/server-3 it doesn't match any way and moves on to section 2 with the host specific public IP NAT rules, then finally at the end of section, the 'catch all'.&lt;/P&gt;</description>
    <pubDate>Fri, 20 Mar 2015 12:58:40 GMT</pubDate>
    <dc:creator>shell_uk_</dc:creator>
    <dc:date>2015-03-20T12:58:40Z</dc:date>
    <item>
      <title>NAT with multiple external IPs and multiple internal IPs sharing public specific IPs</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666378#M195910</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;I can't quit hit the nail on the head with this one. Any help would be very much appreciated please &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Cisco&amp;nbsp;ASA 5505&lt;BR /&gt;Running 8.4(1)&lt;/P&gt;
&lt;P&gt;Example of what I am trying to do (I've basically ran out of public IPs and need to direct access to certain hosts and services inside&amp;nbsp;but for complicated reasons I won't go in to as it won't help here/just complicate it more for no reason, they can't be on the 'general usage' IP so I need to share some of these other public IPs).&lt;/P&gt;
&lt;P&gt;Public IP range: 12.34.56.1 - 12.34.56.5&lt;/P&gt;
&lt;P&gt;Internal IP range: 192.168.1.1 - 192.168.1.254&lt;/P&gt;
&lt;P&gt;12.34.56.5:&lt;BR /&gt;'General usage' IP. So by default everything goes in and out on this IP.&lt;/P&gt;
&lt;P&gt;12.34.56.1:&lt;BR /&gt;Port 443 goes to 192.168.1.2&lt;BR /&gt;Port 80 goes to 192.168.1.3&lt;BR /&gt;Traffic from 192.168.1.2 and 192.168.1.3 to the internet comes from 12.34.56.1&lt;/P&gt;
&lt;P&gt;12.34.56.2/.3/.4:&lt;BR /&gt;These are all dedicated to certain servers and work fine.&lt;/P&gt;
&lt;P&gt;Bits of the config I think are relevant (please say if I've missed something):&lt;/P&gt;

&lt;PRE&gt;
interface Vlan2
 nameif outside
 security-level 0
 ip address 12.34.56.5 255.255.255.248

object network LAN
&amp;nbsp;subnet 192.168.1.0 255.255.255.0
object network NAT-IP-1
 host 12.34.56.1
object network server-2
 host 192.168.1.2
object network server-3
 host 192.168.1.3
object-group network SOURCE-ADDRESSES-2
 network-object host 192.168.1.2
 network-object host 192.168.1.3

access-list outside_access extended permit tcp any object server-2 eq https
access-list outside_access extended permit tcp any object server-3 eq www

nat (inside,outside) source dynamic SOURCE-ADDRESSES-2 NAT-IP-1

object network LAN
&amp;nbsp;nat (inside,outside) dynamic interface
object network server-2
 nat (inside,outside) static NAT-IP-1 service tcp https https&lt;/PRE&gt;

&lt;P&gt;Traffic for server-2 and server-3 goes out on 12.34.56.1&amp;nbsp;instead of 12.34.56.5, that's fine. The port forwarding isn't happening though.&lt;/P&gt;
&lt;P&gt;This results in this in the log:&lt;/P&gt;

&lt;PRE&gt;
4&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Mar 19 2015&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;15:00:45&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;106023&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;5.6.7.8&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;53966&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; 12.34.56.1&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;443&lt;SPAN style="white-space:pre"&gt;&lt;SPAN style="white-space: normal;"&gt; &lt;/SPAN&gt;&lt;/SPAN&gt;Deny tcp src outside:5.6.7.8/53966 dst outside:5.6.7.8/443 by access-group "outside_access" [0x0, 0x0]&lt;/PRE&gt;

&lt;P&gt;If I do a packet trace it's just not showing the NAT entries expected (and the log above doesn't show the destination as the LAN IP either as expected):&lt;/P&gt;

&lt;PRE&gt;
Phase: 1
Type: ACCESS-LIST
Subtype:
Result: ALLOW
Config:
Implicit Rule
Additional Information:
MAC Access list

Phase: 2
Type: ROUTE-LOOKUP
Subtype: input
Result: ALLOW
Config:
Additional Information:
in   12.34.56.1    255.255.255.248 outside

Phase: 3
Type: ACCESS-LIST
Subtype:
Result: DROP
Config:
Implicit Rule
Additional Information:

Result:
input-interface: outside
input-status: up
input-line-status: up
output-interface: outside
output-status: up
output-line-status: up
Action: drop
Drop-reason: (acl-drop) Flow is denied by configured rule
&lt;/PRE&gt;

&lt;P&gt;What am I messing up with the NATing/port forwarding please?&lt;/P&gt;
&lt;P&gt;Thank you!&lt;/P&gt;
&lt;P&gt;Edit: Sorry John. Typo - corrected!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:39:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666378#M195910</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2019-03-12T05:39:54Z</dc:date>
    </item>
    <item>
      <title>In the config you provided I</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666379#M195911</link>
      <description>&lt;P&gt;In the config you provided I do not see what NAT-IP-2 is referencing in the following line:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"object network server-2 nat (inside,outside) static NAT-IP-2 service tcp https https"&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 16:44:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666379#M195911</guid>
      <dc:creator>mlovellette</dc:creator>
      <dc:date>2015-03-19T16:44:59Z</dc:date>
    </item>
    <item>
      <title>Traffic from 192.168.1.2 and</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666380#M195912</link>
      <description>&lt;P&gt;Can you post a "sh nat" ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 16:55:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666380#M195912</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T16:55:35Z</dc:date>
    </item>
    <item>
      <title>Jon:Saw your original reply</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666381#M195913</link>
      <description>&lt;P&gt;Jon:&lt;BR /&gt;&lt;BR /&gt;Saw your original reply on the notification email. Was my typo sorry. Corrected it in the original post now. I believe that nat line is correct.&lt;/P&gt;

&lt;PRE&gt;
# sh nat
Manual NAT Policies (Section 1)
1 &amp;lt;vpn stuff&amp;gt;
2 &amp;lt;vpn stuff&amp;gt;
3 &amp;lt;port translation for general IP&amp;gt;
4 &amp;lt;another port translation for general IP&amp;gt;
5 &amp;lt;another&amp;gt;
6 (inside) to (outside) source dynamic SOURCE-ADDRESSES-2 NAT-IP-1
    translate_hits = 10828, untranslate_hits = 9773
&lt;EM&gt;(I'm not if this count is for when I got it working for just one server at one point.. not worked out again how I did that)&lt;/EM&gt;

Auto NAT Policies (Section 2)
1 (inside) to (outside) source static server-4 12.34.56.2
&amp;nbsp; &amp;nbsp; translate_hits = 11406622, untranslate_hits = 576964
2 (inside) to (outside) source static server-2 NAT-IP-1 service tcp https https
    translate_hits = 0, untranslate_hits = 0
3 (inside) to (outside) source static server-5 12.34.56.3
    translate_hits = 97036, untranslate_hits = 1149482
4 (inside) to (outside) source static server-6 12.34.56.4
    translate_hits = 65, untranslate_hits = 174
5 &amp;lt;vpn stuff&amp;gt;
6 (inside) to (outside) source dynamic LAN interface
    translate_hits = 63479715, untranslate_hits = 53493227&lt;/PRE&gt;</description>
      <pubDate>Thu, 19 Mar 2015 16:55:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666381#M195913</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2015-03-19T16:55:36Z</dc:date>
    </item>
    <item>
      <title>Corrected it, sorry.I daftly</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666382#M195914</link>
      <description>&lt;P&gt;Corrected it, sorry.&lt;/P&gt;&lt;P&gt;I daftly changed the example IPs around after writing the post&amp;nbsp;so they related better (well that was the aim) to what I'm actually dealing with but messed up &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 16:58:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666382#M195914</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2015-03-19T16:58:19Z</dc:date>
    </item>
    <item>
      <title>This is your problem ie, you</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666383#M195915</link>
      <description>&lt;P&gt;This is your problem ie, you have in section 1 -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(inside) to (outside) source dynamic SOURCE-ADDRESSES-2 NAT-IP-1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;and then in section 2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(inside) to (outside) source static server-2 NAT-IP-1 service tcp https https&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;the first rule is matching the inbound traffic so it never gets to your section 2 port mappings.&lt;/P&gt;&lt;P&gt;What do you actually want to do in terms of the outbound traffic from those servers ?&lt;/P&gt;&lt;P&gt;Jon&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 16:59:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666383#M195915</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T16:59:56Z</dc:date>
    </item>
    <item>
      <title>If traffic from both those</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666384#M195916</link>
      <description>&lt;P&gt;Edit - ignore, just noticed interface IP is 12.34.56.5 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 17:12:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666384#M195916</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T17:12:54Z</dc:date>
    </item>
    <item>
      <title>Everything except the</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666385#M195917</link>
      <description>&lt;P&gt;Everything except the specified stuff goes out and in on&amp;nbsp;12.34.56.5.&lt;/P&gt;&lt;P&gt;I need these 2 internal servers to share the public IP '12.34.56.1' both in and out basically.&lt;/P&gt;&lt;P&gt;Edit: And 12.34.56.2/.3/.4 are all dedicated to specific internal IPs. This works fine.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 17:27:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666385#M195917</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2015-03-19T17:27:59Z</dc:date>
    </item>
    <item>
      <title>Can you post a full "sh nat"</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666386#M195918</link>
      <description>&lt;P&gt;Can you post a full "sh nat" without editing anything out ?&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 17:43:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666386#M195918</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T17:43:27Z</dc:date>
    </item>
    <item>
      <title>Hello,Please find below</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666387#M195919</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Please find below mentioned your requirement and confirmed.&lt;/P&gt;&lt;P&gt;1. Server 192.168.1.2 and 192.168.1.3 will use ip 12.34.65.1 for traffic 443 and 80&lt;/P&gt;&lt;P&gt;2. Rest of the network will use 12.35.56.5 for coummunication&lt;/P&gt;&lt;P&gt;Jeevak,&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 17:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666387#M195919</guid>
      <dc:creator>jeevak mukadam</dc:creator>
      <dc:date>2015-03-19T17:55:22Z</dc:date>
    </item>
    <item>
      <title>Public IP..      LAN IP..12</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666388#M195920</link>
      <description>&lt;P&gt;Public IP.. &amp;nbsp; &amp;nbsp; &amp;nbsp;LAN IP..&lt;/P&gt;&lt;P&gt;12.34.56.1 &amp;nbsp; &amp;nbsp; 192.168.1.2 (port 443)&amp;nbsp;and 192.168.1.3 (port 80)&lt;/P&gt;&lt;P&gt;12.34.56.2 &amp;nbsp; &amp;nbsp; 192.168.1.4 (various ports)&lt;/P&gt;&lt;P&gt;12.34.56.3 &amp;nbsp; &amp;nbsp; 192.168.1.10 (various ports)&lt;/P&gt;&lt;P&gt;12.34.56.4 &amp;nbsp; &amp;nbsp; 192.168.1.50 (various ports)&lt;/P&gt;&lt;P&gt;12.34.56.5 &amp;nbsp; &amp;nbsp; Any 192.168.1.* IP not mentioned above&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 18:02:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666388#M195920</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2015-03-19T18:02:03Z</dc:date>
    </item>
    <item>
      <title># sh nat</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666389#M195921</link>
      <description>&lt;PRE&gt;
# sh nat
Manual NAT Policies (Section 1)
1 (inside) to (outside) source static any any destination static NETWORK_OBJ_10.10.10.0_24_DIALINVPN NETWORK_OBJ_10.10.10.0_24_DIALINVPN
    translate_hits = 16375, untranslate_hits = 1081417
2 (inside) to (outside) source static LAN LAN destination static RemoteLANVPN RemoteLANVPN
    translate_hits = 90500794, untranslate_hits = 123604551
3 (inside) to (outside) source static internalhost1 interface service INTERNAL_PORT1 EXTERNAL_PORT1    &lt;SPAN style="color:#A9A9A9;"&gt;&lt;EM&gt;this happens on the general use ip&lt;/EM&gt;&lt;/SPAN&gt;
    translate_hits = 4145, untranslate_hits = 27308
4 (inside) to (outside) source static internalhost2 interface service INTERNAL_PORT1 EXTERNAL_PORT2    &lt;SPAN style="color:#A9A9A9;"&gt;&lt;EM&gt;this happens on the general use ip&lt;/EM&gt;&lt;/SPAN&gt;
    translate_hits = 0, untranslate_hits = 657
5 (outside) to (inside) source static any any destination static interface internalhost7 service 8080 8080    &lt;SPAN style="color: rgb(169, 169, 169);"&gt;&lt;EM&gt;this happens on the general use ip&lt;/EM&gt;&lt;/SPAN&gt;
    translate_hits = 7724, untranslate_hits = 14632
6 (inside) to (outside) source dynamic SOURCE-ADDRESSES-2 NAT-IP-1
    translate_hits = 16449, untranslate_hits = 14853

Auto NAT Policies (Section 2)
1 (inside) to (outside) source static server-4 12.34.56.2
&amp;nbsp; &amp;nbsp; translate_hits = 11406622, untranslate_hits = 576964
2 (inside) to (outside) source static server-2 NAT-IP-1 service tcp https https
    translate_hits = 0, untranslate_hits = 0
3 (inside) to (outside) source static server-3 NAT-IP-1 service tcp http http
    translate_hits = 0, untranslate_hits = 0
4 (inside) to (outside) source static server-5 12.34.56.3
    translate_hits = 97036, untranslate_hits = 1149482
5 (inside) to (outside) source static server-6 12.34.56.4
    translate_hits = 65, untranslate_hits = 174
6 (inside) to (outside) source dynamic NETWORK_OBJ_10.10.10.0_24_DIALINVPN interface
&amp;nbsp; &amp;nbsp; translate_hits = 0, untranslate_hits = 0
7 (inside) to (outside) source dynamic LAN interface
    translate_hits = 63479715, untranslate_hits = 53493227&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Number 5 on the "manual NAT" section is odd. It works&amp;nbsp;but it's basically doing the same as 3 and 4 so I'm not sure why it is that way round (outside inside vs inside outside).&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 18:46:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666389#M195921</guid>
      <dc:creator>shell_uk_</dc:creator>
      <dc:date>2015-03-19T18:46:42Z</dc:date>
    </item>
    <item>
      <title>You can try doing the</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666390#M195922</link>
      <description>&lt;P&gt;You can try doing the following&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source dynamic SOURCE-ADDRESSES-2 NAT-IP-1&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic SOURCE-ADDRESSES-2 NAT-IP-1&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666390#M195922</guid>
      <dc:creator>mlovellette</dc:creator>
      <dc:date>2015-03-19T19:01:36Z</dc:date>
    </item>
    <item>
      <title>Okay, it's the problem I</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666391#M195923</link>
      <description>&lt;P&gt;Okay, it's the problem I described before ie. you are not getting to your static statements because the earlier NAT rule is matching.&lt;/P&gt;&lt;P&gt;So you have two choices -&lt;/P&gt;&lt;P&gt;1) you could move your section 2 static statement for those servers &amp;nbsp;to section 1 and make sure they appear before the dynamic statements. You can choose the order in sections 1 and 3&lt;/P&gt;&lt;P&gt;2) or you can move the section 1 dynamic statement&amp;nbsp;for those servers to section 2 where static takes precedence over static.&lt;/P&gt;&lt;P&gt;The only problem here is you cannot order the rules and from what I understand if you have multiple dynamic rules the larger number of IPs takes precedence and you have -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(inside) to (outside) source dynamic LAN interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;which would override your dynamic translation for just the two servers.&lt;/P&gt;&lt;P&gt;So you would need to move the above rule to section 3 eg.&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto dynamic LAN interface&lt;/P&gt;&lt;P&gt;Whichever you choose you are going to have to move some NAT rules around I'm afraid.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:03:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666391#M195923</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T19:03:55Z</dc:date>
    </item>
    <item>
      <title>I don't think it would ever</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666392#M195924</link>
      <description>&lt;P&gt;I don't think it would ever get there because there is a general dynamic rule in section 2 for all LAN IPs.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:08:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666392#M195924</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T19:08:22Z</dc:date>
    </item>
    <item>
      <title>Hello, Remove all current nat</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666393#M195925</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remove all current nat statement and try as following.&lt;/P&gt;&lt;P&gt;object network server-2&lt;BR /&gt;&amp;nbsp;host 192.168.1.2&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 12.34.56.1 service tcp 443 443&lt;/P&gt;&lt;P&gt;object network server-3&lt;BR /&gt;&amp;nbsp;host 192.168.1.3&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 12.34.56.1 service tcp 80 80&lt;/P&gt;&lt;P&gt;object network server-4&lt;BR /&gt;&amp;nbsp;host 192.168.1.4&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 12.34.56.2&lt;/P&gt;&lt;P&gt;object network server-10&lt;BR /&gt;&amp;nbsp;host 192.168.1.10&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 12.34.56.3&lt;/P&gt;&lt;P&gt;object network server-50&lt;BR /&gt;&amp;nbsp;host 192.168.1.5&lt;BR /&gt;&amp;nbsp;nat (inside,outside) static 12.34.56.4&lt;/P&gt;&lt;P&gt;object network LAN&lt;BR /&gt;&amp;nbsp;subnet 192.168.1.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;nat (inside,outside) 5 source dynamic any interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list outside_access extended permit tcp any object server-2 eq https&lt;BR /&gt;access-list outside_access extended permit tcp any object server-3 eq www&lt;BR /&gt;access-list outside_access extended permit ip any object server-4&lt;BR /&gt;access-list outside_access extended permit ip any object server-10&lt;BR /&gt;access-list outside_access extended permit ip any object server-50&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-group outside_access in inerface outside&lt;/P&gt;&lt;P&gt;Jeevak,&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:14:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666393#M195925</guid>
      <dc:creator>jeevak mukadam</dc:creator>
      <dc:date>2015-03-19T19:14:08Z</dc:date>
    </item>
    <item>
      <title>Just for your reference there</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666394#M195926</link>
      <description>&lt;P&gt;Just for your reference there is a great document if you haven't already seen it that covers NAT and the ordering and helps explain your issue.&lt;/P&gt;&lt;P&gt;It also has recommendations as to which sections&amp;nbsp;certain NAT rules should go -&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli"&gt;https://supportforums.cisco.com/document/132066/asa-nat-83-nat-operation-and-configuration-format-cli&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:14:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666394#M195926</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T19:14:33Z</dc:date>
    </item>
    <item>
      <title>John is right, your all</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666395#M195927</link>
      <description>&lt;P&gt;John is right, your all traffic match at section-2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jeevak,&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:17:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666395#M195927</guid>
      <dc:creator>jeevak mukadam</dc:creator>
      <dc:date>2015-03-19T19:17:07Z</dc:date>
    </item>
    <item>
      <title>JeevakThat's not what he</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666396#M195928</link>
      <description>&lt;P&gt;Jeevak&lt;/P&gt;&lt;P&gt;That's not what he wants though.&lt;/P&gt;&lt;P&gt;He doesn't want server-2 and server-3 to use the outside interface IP when they access the internet.&lt;/P&gt;&lt;P&gt;So you need dynamic NAT for those two servers and this is where the problem is.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666396#M195928</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-03-19T19:20:15Z</dc:date>
    </item>
    <item>
      <title>Sorry Jon, I did not see your</title>
      <link>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666397#M195929</link>
      <description>&lt;P&gt;Sorry Jon, I did not see your comment from earlier and yes you are correct.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2015 19:22:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-with-multiple-external-ips-and-multiple-internal-ips-sharing/m-p/2666397#M195929</guid>
      <dc:creator>mlovellette</dc:creator>
      <dc:date>2015-03-19T19:22:24Z</dc:date>
    </item>
  </channel>
</rss>

