<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Okay so do the other devices in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639887#M196752</link>
    <description>&lt;P&gt;Do these other devices need to be accessed from your internal networks using their public IPs ?&lt;/P&gt;&lt;P&gt;You can leave the ISP router with an interface in both networks but i still don't think your ASA needs one and in fact you don't want it to because of the two default routes.&lt;/P&gt;&lt;P&gt;If the ISP has an interface in both networks it will send an arp request for any IP within those networks. Your ASA should respond for any IPs it has configured with static NAT because it uses proxy arp.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
    <pubDate>Thu, 26 Feb 2015 21:58:24 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2015-02-26T21:58:24Z</dc:date>
    <item>
      <title>Using both Dynamic and Static NAT with two Different Internet facing Subnets</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639882#M196747</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 14.3999996185303px;"&gt;We have two Class C Public Address subnets. &amp;nbsp;We started with Subnet (A) and have many of our Internet accessible devices on it. It is running on a Cisco PIX 515R. We bought a new ASA 5510 8.3(2) and started Migrating the Users and new servers to it so I started with our second Class C&amp;nbsp;Subnet (B). &amp;nbsp; Later on down the road I found out that if the Firewalls Default Gateway is is set to a (B) Interface subnet, then the servers that are statically mapped to a (A) Address will have a (B) address when they communicate out to the internet. &amp;nbsp;So they are receiving packets on their (A) Address, though replying to them with a (B) address.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It was mentioned that I should be able to combine static and dynamic NAT mapping to allow devices behind the firewall to have a fixed external Address when communicating outbound as well as inbound.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So For instance I want the Following: when the Internal Replies I want the reply to come from the mapped IP, not a IP from the Dynamic Pool.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Public IP:&amp;nbsp;192.168.1.100/24&lt;/P&gt;
&lt;P&gt;Internal IP: 10.0.0.100/16&lt;/P&gt;
&lt;P&gt;Public IP:&amp;nbsp;192.168.5.101/24&lt;/P&gt;
&lt;P&gt;Internal IP: 10.0.0.101/16&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE class="p1"&gt;
&lt;SPAN class="s1"&gt;interface Ethernet0/0&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; description 192.168.1.0/24 Network Outside IP&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; nameif outside-1&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; security-level 0&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; ip address 192.168.1.1 255.255.255.0 &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;interface Ethernet0/1&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; description &lt;/SPAN&gt;192.168.5.0/24&lt;SPAN class="s1"&gt; Network Outside IP&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; nameif outside-5&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; security-level 0&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; ip address 192.168.5.1 255.255.255.0 &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;!&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;interface Ethernet0/2&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; description inside 10.0.0.0/16&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; nameif inside&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; security-level 100&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; ip address 10.0.0.1 255.255.0.0 &lt;/SPAN&gt;

&lt;SPAN class="s1"&gt;object network serverA_o &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; host 192.168.1.100&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; object network &lt;/SPAN&gt;serverA_i&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; host 10.0.0.100&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;object network serverB_o &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; host 192.168.5.101&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;object network &lt;/SPAN&gt;serverB_i&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; host 10.0.0.101&lt;/SPAN&gt;

&lt;SPAN class="s1"&gt;object network 192-168-1-NAT-POOL &lt;/SPAN&gt;
&lt;SPAN class="s1"&gt; range 192.168.1.50 192.168.1.239&lt;/SPAN&gt;

&lt;SPAN class="s1"&gt;nat (inside,outside-1) source static &lt;/SPAN&gt;serverA_i&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;serverA_o
&lt;SPAN class="s1"&gt;nat (inside,outside-5) source static &lt;/SPAN&gt;serverB_i&lt;SPAN class="s1"&gt; &lt;/SPAN&gt;serverB_o
&lt;SPAN class="s1"&gt;nat (inside,outside-1) source dynamic any &lt;/SPAN&gt;192-168-1-NAT-POOL&lt;SPAN class="s1"&gt; interface&lt;/SPAN&gt;

&lt;SPAN class="s1"&gt;object network &lt;/SPAN&gt;serverA_i
&lt;SPAN class="s1"&gt; nat (inside,outside-1) static &lt;/SPAN&gt;serverA_o
&lt;SPAN class="s1"&gt;object network &lt;/SPAN&gt;serverB_i
&lt;SPAN class="s1"&gt; nat (inside,outside-5) static &lt;/SPAN&gt;serverB_o

&lt;SPAN class="s1"&gt;route outside-1 0.0.0.0 0.0.0.0 192.168.1.1 1&lt;/SPAN&gt;
&lt;SPAN class="s1"&gt;route outside-5 0.0.0.0 0.0.0.0 192.168.5.1 2&lt;/SPAN&gt;&lt;/PRE&gt;

&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I set this up my serverB shows a Public IP of something in the 192-168-1-NAT-POOL Not 192.168.5.101&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any Suggestions?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:33:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639882#M196747</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2019-03-12T05:33:35Z</dc:date>
    </item>
    <item>
      <title>I'm not sure I follow.Firstly</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639883#M196748</link>
      <description>&lt;P&gt;I'm not sure I follow.&lt;/P&gt;&lt;P&gt;Firstly why have you got multiple entries for the same servers eg. -&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;nat (inside,outside-5) source static &lt;/SPAN&gt;serverB_i&lt;SPAN&gt; &lt;/SPAN&gt;serverB_o&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN&gt;object network &lt;/SPAN&gt;serverB_i&lt;BR /&gt;&lt;SPAN&gt;nat (inside,outside-5) static &lt;/SPAN&gt;serverB_o&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;as to why it&amp;nbsp;is using the NAT pool that is because your default route pushes all traffic via the outside-1 interface and because serverB doesn't have a matching static statement for that interface it&amp;nbsp; matches the NAT pool instead.&lt;/P&gt;&lt;P&gt;All traffic on your firewall will use the outside-1 because that default route has the lower AD and so is the one in the routing table.&lt;/P&gt;&lt;P&gt;It can't use the other route because it won't be in it's routing table.&lt;/P&gt;&lt;P&gt;You are using different next hop IPs for the default routes. Does this mean they are different ISPs or you have a different next hop router ?&lt;/P&gt;&lt;P&gt;If it is the same ISP and same next hop you don't need to assign any 192.168.5.x IPs to interfaces you can just use them in your NAT statements.&lt;/P&gt;&lt;P&gt;Can you clarify about the public IP blocks and the ISP(s) ?&lt;/P&gt;&lt;P&gt;Jon&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 13:42:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639883#M196748</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-26T13:42:06Z</dc:date>
    </item>
    <item>
      <title>Not sure why I have Multiple</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639884#M196749</link>
      <description>&lt;P&gt;Not sure why I have Multiple Entries. )-: I did think it was Odd. I think it might be because I looking at examples of the new and old styles of NAT.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have a Single ISP, though have 2 separate non-Contiguous&amp;nbsp;&amp;nbsp;Class C Addresses from them. We host some Servers on one subnet and some on the other.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm looking for a way to use both Subnets on the same ASA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Connection to the net looks like this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE&gt;
Internet -&amp;gt; Edge Router                           Layer3 VLAN Switch 
            GE0/1.2 - 192.168.1.1    VLAN Tagged --&amp;gt;    GE0 - VLAN Tagged
            GE0/1.2 - 192.168.5.1    VLAN Tagged -^  

Layer3 VLAN Switch                          Firewall
            GE1    192.168.1.0/24 Untagged     -&amp;gt;  ASA Outside-1 
            GE2    192.168.5.0/24 Untagged     -&amp;gt;  ASA Outside-5
Firewall
            ASA inside 10.0.0.0/16 -&amp;gt; Switch -&amp;gt; 10.0.0.100&lt;/PRE&gt;

&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;Hope that helps clarify.&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;I could try to post some sanitized Configs of my PIX and ASA if needed. &amp;nbsp;But the end result I'm trying to do is have the ASA do NAT for multiple Public Subnets.&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 19:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639884#M196749</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2015-02-26T19:19:35Z</dc:date>
    </item>
    <item>
      <title>You don't need to have two</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639885#M196750</link>
      <description>&lt;P&gt;You don't need to have two interfaces if it is the same ISP.&lt;/P&gt;&lt;P&gt;You have created two interfaces with vlan tagging to the ISP router but you only need one interface.&lt;/P&gt;&lt;P&gt;The new 192.168.5.x IPs you just use for NAT.&lt;/P&gt;&lt;P&gt;That way all traffic uses outside-1 as the interface and you don't have this issue with two default routes.&lt;/P&gt;&lt;P&gt;If you are keeping your old IPs as well as the new ones then it is even easier, just get the ISP to add a route to their router for the 192.168.5.x subnet pointing to your outside interface IP.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 19:48:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639885#M196750</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-26T19:48:37Z</dc:date>
    </item>
    <item>
      <title>Thank you for your reply.</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639886#M196751</link>
      <description>&lt;P&gt;Thank you for your reply. &amp;nbsp;Both Subnets have Public Accessible Services on them. So we need to be able to have access to both Subnets.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ASA (Currently&amp;nbsp;hosting the&amp;nbsp;192.168.1.x IPs )and PIX (hosting the 192.168.5.x IPs)&amp;nbsp;are only hosting a portion of the Publicly accessible&amp;nbsp;IPs in the two Subnets. There are other Physical devices on each of the Subnets between the Edge Router and the ASA/PIX. &amp;nbsp; So having the Edge router have a Route to the ASA's Outside Interface for one of the Subnets does not seem like an option.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 21:33:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639886#M196751</guid>
      <dc:creator>stownsend</dc:creator>
      <dc:date>2015-02-26T21:33:17Z</dc:date>
    </item>
    <item>
      <title>Okay so do the other devices</title>
      <link>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639887#M196752</link>
      <description>&lt;P&gt;Do these other devices need to be accessed from your internal networks using their public IPs ?&lt;/P&gt;&lt;P&gt;You can leave the ISP router with an interface in both networks but i still don't think your ASA needs one and in fact you don't want it to because of the two default routes.&lt;/P&gt;&lt;P&gt;If the ISP has an interface in both networks it will send an arp request for any IP within those networks. Your ASA should respond for any IPs it has configured with static NAT because it uses proxy arp.&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Thu, 26 Feb 2015 21:58:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-both-dynamic-and-static-nat-with-two-different-internet/m-p/2639887#M196752</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2015-02-26T21:58:24Z</dc:date>
    </item>
  </channel>
</rss>

