<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Rizwan,Oh how I wish it was in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630551#M198966</link>
    <description>&lt;P&gt;Rizwan,&lt;/P&gt;&lt;P&gt;Oh how I wish it was that easy. &amp;nbsp;I had tried that ACLs in different forms before posting. I did try what you asked and still I cannot ping or RDP to the server from the outside..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Feb 2015 19:50:38 GMT</pubDate>
    <dc:creator>Jim Richards</dc:creator>
    <dc:date>2015-02-24T19:50:38Z</dc:date>
    <item>
      <title>ASA 9.1 NAT configuration assistance</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630549#M198959</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I have a problem I am having trouble solving with a NAT .&amp;nbsp; The scenario goes that I have two ASAs connected via a site-to-site VPN that has a single subnet on&amp;nbsp;the branch side that contains both data and voice devices &amp;nbsp;that needs to talk to both the inside (data)&amp;nbsp;and DMZ (voice)&amp;nbsp;subnets at the main location.&amp;nbsp; This part I have working.&amp;nbsp; The phones are up and I am able to talk both data and phones.&amp;nbsp; The problem being is I do not manage the&amp;nbsp;voice system, a different contractor does and they now have lost remote access to the&amp;nbsp;voice .&amp;nbsp; I removed the following which I think was a leftover from a 8.2 to 9.2 upgrade.&amp;nbsp; That is what got the data and phones working&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 10pt;"&gt;&lt;FONT color="#000000"&gt;object network Phone_System&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;SPAN style="font-family: &amp;quot;Arial&amp;quot;,sans-serif; font-size: 10pt;"&gt;&lt;FONT color="#000000"&gt;(voice,outside) static 74.x.x.108&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;What I am having issue with is the NAT to replace this and to allow access from the outside interface to the DMZ interface without causing problems with the site-to-site.&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 172.16.100.1 255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 74.x.x.105 255.255.255.224&lt;BR /&gt;!&lt;BR /&gt;interface Vlan200&lt;BR /&gt;&amp;nbsp;no forward interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif&amp;nbsp;voice&lt;BR /&gt;&amp;nbsp;security-level 10&lt;BR /&gt;&amp;nbsp;ip address 172.16.200.1 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;object network Phone_System&lt;BR /&gt;&amp;nbsp;host 172.16.200.10&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;object network Phone_System_External&lt;BR /&gt;&amp;nbsp;host 74.x.x.108&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;object network LAN-G&lt;BR /&gt;&amp;nbsp;subnet 172.16.110.0 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;BR /&gt;object network LAN-S&lt;BR /&gt;&amp;nbsp;subnet 172.16.100.0 255.255.255.0&lt;BR /&gt;object network VOICE_S&lt;BR /&gt;&amp;nbsp;subnet 172.16.200.0 255.255.255.0&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;object-group network Local_S&lt;BR /&gt;&amp;nbsp;network-object object VOICE_S&lt;BR /&gt;&amp;nbsp;network-object object LAN-S&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;BR /&gt;object-group network Remote_G&lt;BR /&gt;&amp;nbsp;network-object object LAN-G&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;BR /&gt;object-group network S&lt;BR /&gt;&amp;nbsp;network-object object LAN-S&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;object-group service Phone_Service tcp&lt;BR /&gt;&amp;nbsp;port-object eq 3389&lt;BR /&gt;&amp;nbsp;port-object eq citrix-ica&lt;BR /&gt;&amp;nbsp;port-object eq 2598&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;BR /&gt;object-group service Phone_Service_udp udp&lt;BR /&gt;&amp;nbsp;port-object eq 1604&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;access-list outside_access_in extended permit tcp any object Phone_System_External object-group Phone_Service&lt;BR /&gt;access-list outside_access_in extended permit udp any object Phone_System_External object-group Phone_Service_udp&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;nat (inside,outside) source static Local_S Local_S destination static Remote_G Remote_G no-proxy-arp route-lookup&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&lt;BR /&gt;nat (voice,outside) source static Phone_System Phone_System destination static Phone_System_External Phone_System_External&lt;/P&gt;&lt;P style="margin: 0in 0in 0pt;"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630549#M198959</guid>
      <dc:creator>Jim Richards</dc:creator>
      <dc:date>2019-03-12T05:33:09Z</dc:date>
    </item>
    <item>
      <title>Hi Jim, Try these line please</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630550#M198965</link>
      <description>&lt;P&gt;Hi Jim,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try these line please.&lt;/P&gt;&lt;P&gt;Remove these two lines.&lt;/P&gt;&lt;P&gt;no access-list outside_access_in extended permit tcp any object Phone_System_External object-group Phone_Service&lt;BR /&gt;no access-list outside_access_in extended permit udp any object Phone_System_External object-group Phone_Service_udp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apply these two lines instead.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list outside_access_in extended permit tcp any object Phone_System object-group Phone_Service&lt;BR /&gt;access-list outside_access_in extended permit udp any object Phone_System object-group Phone_Service_udp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Rizwan Rafeek&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 19:07:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630550#M198965</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2015-02-24T19:07:17Z</dc:date>
    </item>
    <item>
      <title>Rizwan,Oh how I wish it was</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630551#M198966</link>
      <description>&lt;P&gt;Rizwan,&lt;/P&gt;&lt;P&gt;Oh how I wish it was that easy. &amp;nbsp;I had tried that ACLs in different forms before posting. I did try what you asked and still I cannot ping or RDP to the server from the outside..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 19:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630551#M198966</guid>
      <dc:creator>Jim Richards</dc:creator>
      <dc:date>2015-02-24T19:50:38Z</dc:date>
    </item>
    <item>
      <title>I assume your host: 172.16</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630552#M198969</link>
      <description>&lt;P&gt;I assume your host:&amp;nbsp;172.16.200.10 is located in the voice-dmz interface, if not you want to change to inside as "nat (inside,outside) static 74.x.x.108"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You must go under the parent object: "object network Phone_System" and they apply the nat statement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network Phone_System&lt;BR /&gt;&amp;nbsp;host 172.16.200.10&lt;BR /&gt;&amp;nbsp;nat (voice,outside) static 74.x.x.108&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you post your whole config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 20:08:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630552#M198969</guid>
      <dc:creator>rizwanr74</dc:creator>
      <dc:date>2015-02-24T20:08:15Z</dc:date>
    </item>
    <item>
      <title>And that is where the problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630553#M198971</link>
      <description>&lt;P&gt;And that is where the problem is. &amp;nbsp;&lt;/P&gt;&lt;P&gt;When I add that static NAT to the object. &amp;nbsp;&lt;/P&gt;&lt;P&gt;object network Phone_System&lt;BR /&gt;&amp;nbsp;host 172.16.200.10&amp;nbsp;&lt;BR /&gt;&amp;nbsp;nat (voice,outside) static 74.x.x.108&lt;/P&gt;&lt;P&gt;I can ping it from the outside but I cannot ping 172.16.200.10 from the branch router so all phones loose registration because they can no longer reach the 172.16.200.10. &amp;nbsp;The 172.16.200.10 is in the DMZ or should I say 3rd VLAN. &amp;nbsp;The ASA code does not licensed to trunk so it was set up as different VLANs on different interfaces. AKA DMZ.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 20:54:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630553#M198971</guid>
      <dc:creator>Jim Richards</dc:creator>
      <dc:date>2015-02-24T20:54:57Z</dc:date>
    </item>
    <item>
      <title>I figured it out..  the</title>
      <link>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630554#M198975</link>
      <description>&lt;P&gt;I figured it out.. &amp;nbsp;the return traffic was being natted back..&lt;/P&gt;&lt;P&gt;Added&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network VOICE_S&lt;BR /&gt;&amp;nbsp;subnet 172.16.200.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (voice,outside) source static VOICE_Silverkey VOICE_Silverkey destination static Remote_G Remote_G no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can now ping from the tunnel and the outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2015 21:05:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-9-1-nat-configuration-assistance/m-p/2630554#M198975</guid>
      <dc:creator>Jim Richards</dc:creator>
      <dc:date>2015-02-24T21:05:25Z</dc:date>
    </item>
  </channel>
</rss>

