<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic hisorry i didn't understand in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564677#M205238</link>
    <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;sorry i didn't understand your requirement , are you trying to add routes on the ASA for the inside 172.16.20.x , 172.16.30.x ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Nov 2014 18:50:57 GMT</pubDate>
    <dc:creator>Murali</dc:creator>
    <dc:date>2014-11-20T18:50:57Z</dc:date>
    <item>
      <title>NAT 8.4(2) NAT and Routing Overload</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564674#M205235</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I attached a diagram and below are the requirement&lt;/P&gt;&lt;P&gt;1. Hosts(Having IP,s 172.16.20.42 and 172.16.30.42) use internet through proxy server having proxy server ip 10.1.1.103 that are in the DMZ. And internet allow the proxy server. Means hosts inside to dmz reach and the use the proxy server they use internet.Only its for browsing traffice.&lt;/P&gt;&lt;P&gt;2. Host use outlook from inside to outside using ports 25,110,465,995 from inside to outside and only allow these outlook ports.And host use the gateway 172.16.20.254/24 and 172.16.30.254/24 respectively.&lt;/P&gt;&lt;P&gt;3. The web server having IP 10.1.1.254 allow only http ot https ports from outside when i access this server over the internet. and i want to access web server over the internet through this public ip 17.102.8.65:8888 that is configure in the router.Means the local webserver having ip 10.1.1.254:8888 translate or port forward to 117.102.8.65:8888.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:05:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564674#M205235</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2019-03-12T05:05:50Z</dc:date>
    </item>
    <item>
      <title>1. If your security levels</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564675#M205236</link>
      <description>&lt;P&gt;1. If your security levels are like inside&amp;gt;DMZ&amp;gt;Outside , no need to configure any ACL's for inside,dmz but you need to configure NAT for your proxy server.&lt;/P&gt;&lt;P&gt;2.If you already have deny statements in your ACL for inside traffic going to outside you need to permit the mentioned destination ports (please check the documentation for syntax)&lt;/P&gt;&lt;P&gt;3.Create ACL to allow outside traffic to permit to server real address (10.1.1.254) , and create static nat as below.&lt;/P&gt;&lt;P&gt;i) create object for your server&lt;/P&gt;&lt;P&gt;object network DMZ_WEB_SERVER&lt;/P&gt;&lt;P&gt;host 10.1.1.254&lt;BR /&gt;nat(dmz,outside) static 17.102.8.65 service tcp 8888 8888&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Murali.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2014 18:34:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564675#M205236</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-18T18:34:19Z</dc:date>
    </item>
    <item>
      <title>Thanks muraliBut can u send</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564676#M205237</link>
      <description>&lt;P&gt;Thanks murali&lt;/P&gt;&lt;P&gt;But can u send me the step that i have to follow these objectives.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. I add these routes at core switch that are connecting inside ASA&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ip route 172.16.20.0 255.255.255.0 192.168.11.249&lt;/P&gt;&lt;P&gt;ip route 172.16.20.0 255.255.255.0 192.168.11.249&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. These are my ASA Interfaces detail&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;description Inside to the Core Switches&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;duplex full&lt;BR /&gt;&amp;nbsp;no nameif&lt;BR /&gt;&amp;nbsp;no security-level&lt;BR /&gt;&amp;nbsp;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;&amp;nbsp;description public Server - DMZ&lt;BR /&gt;&amp;nbsp;duplex full &amp;nbsp;&lt;BR /&gt;&amp;nbsp;nameif DMZ &amp;nbsp;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 10.1.1.1 255.255.255.0 standby 10.1.1.2&amp;nbsp;&lt;BR /&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;&amp;nbsp;description outside to the internet via router&lt;BR /&gt;&amp;nbsp;duplex full &amp;nbsp;&lt;BR /&gt;&amp;nbsp;nameif Outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address 11.11.11.2 standby 11.11.11.3&amp;nbsp;&lt;BR /&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;interface Management0/0&lt;BR /&gt;&amp;nbsp;description LAN/STATE Failover Interface&lt;/P&gt;&lt;P&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;interface Redundant1&lt;BR /&gt;&amp;nbsp;member-interface Ethernet0/0&lt;BR /&gt;&amp;nbsp;member-interface Ethernet0/1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 192.168.11.249 255.255.255.0 standby 192.168.11.250&amp;nbsp;&lt;BR /&gt;! &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object-group network DMZ-BLOCKED-LAN-NETWORKS&lt;BR /&gt;&amp;nbsp;network-object 172.16.20.0 255.255.255.0&lt;BR /&gt;&amp;nbsp;network-object 172.16.30.0 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;access-list 102 extended permit tcp any host 11.11.11.2 eq www&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;access-list 102 extended permit tcp any host 11.11.11.2 eq 8888&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 11.11.11.2 eq https&amp;nbsp;&lt;BR /&gt;access-list 102 extended permit tcp any host 11.11.11.2 eq telnet&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.20.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.30.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list no-nat extended permit ip 10.1.1.0 255.255.255.0 11.11.11.2 &amp;nbsp;255.255.255.0&lt;BR /&gt;access-list no-nat extended permit ip 192.168.11.0 255.255.255.0 5.5.5.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;access-list no-nat extended permit ip 172.16.50.0 255.255.255.0 10.1.1.0 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow ICMP from DMZ server to INSIDE server&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.18 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN extended permit icmp host 10.1.1.254 host 192.168.11.10 echo&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Block connections from DMZ to INSIDE networks&lt;BR /&gt;access-list DMZ-IN extended deny ip any object-group DMZ-BLOCKED-LAN-NETWORKS&amp;nbsp;&lt;BR /&gt;access-list DMZ-IN remark Allow all other traffic&lt;BR /&gt;access-list DMZ-IN extended permit ip 10.1.1.0 255.255.255.0 any&amp;nbsp;&lt;BR /&gt;access-list ICMP extended permit icmp any any&amp;nbsp;&lt;BR /&gt;access-list SPLIT standard permit 192.168.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;failover &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;failover lan unit secondary&lt;BR /&gt;failover lan interface failover Management0/0&lt;BR /&gt;failover polltime unit 1 holdtime 3&lt;BR /&gt;failover polltime interface 3 holdtime 15&lt;BR /&gt;failover key *****&lt;BR /&gt;failover link failover Management0/0&lt;BR /&gt;failover interface ip failover 1.1.1.1 255.0.0.0 standby 1.1.1.2&lt;/P&gt;&lt;P&gt;nat-control &amp;nbsp;&amp;nbsp;&lt;BR /&gt;global (Outside) 1 interface&lt;BR /&gt;nat (DMZ) 1 10.1.1.0 255.255.255.0&lt;BR /&gt;nat (inside) 0 access-list no-nat&lt;BR /&gt;static (DMZ,Outside) tcp interface www 10.1.1.254 www netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,Outside) tcp interface https 10.1.1.254 https netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;static (DMZ,Outside) tcp interface 8888 10.1.1.245 8888 netmask 255.255.255.255&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;static (inside,DMZ) 10.1.1.0 192.168.11.0 netmask 255.255.255.0&amp;nbsp;&lt;BR /&gt;access-group 102 in interface Outside&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 125.209.70.89 1&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 192.168.11.254 2&lt;BR /&gt;route inside 0.0.0.0 0.0.0.0 192.168.10.254 2&lt;BR /&gt;&lt;BR /&gt;route inside 172.16.20.0 255.255.255.0 192.168.11.254 1&lt;BR /&gt;route inside 172.16.30.0 255.255.255.0 192.168.11.254 1&lt;BR /&gt;route inside 192.168.10.0 255.255.255.0 192.168.11.254 1&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;3. AT&amp;nbsp;Router&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inside Interface detail&lt;/P&gt;&lt;P&gt;int f0/0&lt;/P&gt;&lt;P&gt;ip add 11.11.11.1 255.255.255.0&lt;/P&gt;&lt;P&gt;These are the configuration as i configured.&lt;/P&gt;&lt;P&gt;Thanks murali&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2014 11:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564676#M205237</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-19T11:37:44Z</dc:date>
    </item>
    <item>
      <title>hisorry i didn't understand</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564677#M205238</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;sorry i didn't understand your requirement , are you trying to add routes on the ASA for the inside 172.16.20.x , 172.16.30.x ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2014 18:50:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564677#M205238</guid>
      <dc:creator>Murali</dc:creator>
      <dc:date>2014-11-20T18:50:57Z</dc:date>
    </item>
    <item>
      <title>Requirment are the same that</title>
      <link>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564678#M205239</link>
      <description>&lt;P&gt;Requirment are the same that i start discussion.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Nov 2014 03:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-8-4-2-nat-and-routing-overload/m-p/2564678#M205239</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2014-11-21T03:40:28Z</dc:date>
    </item>
  </channel>
</rss>

