<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic with the given configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565999#M205411</link>
    <description>&lt;P&gt;with the given configuration if 10.51.14.0/24 network needs to go for&amp;nbsp; 192.168.223.0/24 destination, ASA will NAT the source with RF interface IP , which means 192.168.223.0/24 will always see the traffic originating source as RF interface IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly let me know if this is your requirement or you need something else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
    <pubDate>Thu, 06 Nov 2014 23:49:35 GMT</pubDate>
    <dc:creator>Prashant Joshi</dc:creator>
    <dc:date>2014-11-06T23:49:35Z</dc:date>
    <item>
      <title>natting inside network to dmz</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565996#M205408</link>
      <description>&lt;P&gt;We have a requirement that we monitor a non-routable network at a remote location. The FW is operational for all other functions I am adding the items listed be low&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the config items on the FW 5505 with base license.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif inside&lt;BR /&gt;&amp;nbsp;security-level 100&lt;BR /&gt;&amp;nbsp;ip address 10.51.14.252&amp;nbsp;255.255.0.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;&amp;nbsp;nameif outside&lt;BR /&gt;&amp;nbsp;security-level 0&lt;BR /&gt;&amp;nbsp;ip address x.x.x.x&amp;nbsp;255.255.255.0&lt;BR /&gt;!&lt;BR /&gt;interface Vlan401&lt;BR /&gt;&amp;nbsp;no forward interface Vlan1&lt;BR /&gt;&amp;nbsp;nameif RF&lt;BR /&gt;&amp;nbsp;security-level 50&lt;BR /&gt;&amp;nbsp;ip address 192.168.223.1 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network xxx&lt;BR /&gt;&amp;nbsp;description xxx&amp;nbsp;networks&lt;BR /&gt;&amp;nbsp;network-object 10.49.0.0 255.255.0.0&lt;BR /&gt;&amp;nbsp;network-object 10.51.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;Current&amp;nbsp;&lt;/P&gt;&lt;P&gt;nat-control&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;BR /&gt;nat (inside) 1 10.51.14.0 255.255.255.0&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;nat (outside) 0 access-list outside_nat0_outbound_1 outside&lt;BR /&gt;access-group inside_access_in_1 in interface inside&lt;BR /&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are not permitted to&amp;nbsp;route 192.168.223.0/24 network and we are not permitted to change the network so we need to nat 192.168.223.0 to the inside 10.51.14.0.&lt;/P&gt;&lt;P&gt;Are we on the right track to do this with the config below added to current config?&lt;/P&gt;&lt;P&gt;New Items&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group xxx&amp;nbsp;192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list rfaccess extended permit ip 10.51.14.0 255.255.255.0 192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (RF) 2 interface&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list rfaccess&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:02:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565996#M205408</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2019-03-12T05:02:28Z</dc:date>
    </item>
    <item>
      <title>access-list inside_nat0</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565997#M205409</link>
      <description>&lt;P&gt;access-list inside_nat0_outbound extended deny ip 10.51.14.0 255.255.255.0&amp;nbsp;192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list inside_nat0_outbound extended permit ip object-group xxx&amp;nbsp;192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list rfaccess extended permit ip 10.51.14.0 255.255.255.0 192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;global (RF) 2 interface&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list rfaccess&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 17:32:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565997#M205409</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T17:32:03Z</dc:date>
    </item>
    <item>
      <title>PrashantThank you very much</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565998#M205410</link>
      <description>&lt;P&gt;Prashant&lt;/P&gt;&lt;P&gt;Thank you very much for responding.&lt;/P&gt;&lt;P&gt;My colleague was wondering if we will be able to add the 192.168.223.x addresses of the units being monitored to our network monitoring system as individual addresses?&lt;/P&gt;&lt;P&gt;We will be monitoring a total of 40 AP's and switches that have a 192.168.223.x address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or do we have to static&amp;nbsp;address all of these addresses in order to add them to our network monitor?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 18:20:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565998#M205410</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2014-11-06T18:20:59Z</dc:date>
    </item>
    <item>
      <title>with the given configuration</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565999#M205411</link>
      <description>&lt;P&gt;with the given configuration if 10.51.14.0/24 network needs to go for&amp;nbsp; 192.168.223.0/24 destination, ASA will NAT the source with RF interface IP , which means 192.168.223.0/24 will always see the traffic originating source as RF interface IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly let me know if this is your requirement or you need something else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2014 23:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2565999#M205411</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-06T23:49:35Z</dc:date>
    </item>
    <item>
      <title>PrashantWe will need to</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566000#M205412</link>
      <description>&lt;P&gt;Prashant&lt;/P&gt;&lt;P&gt;We will need to monitor these devices at 192.168.223.0 from our home network which is 10.49.0.0. The remote network is 10.51.14 which we route over our MPLS but 192.168 is not routable.&lt;/P&gt;&lt;P&gt;We use Solarwinds NPM to monitor all other remote sites.&lt;/P&gt;&lt;P&gt;All 40 devices have a 192.168.223.x address. If I add 192.168.223.240 for example to NPM will this ASA config allow us to monitor that device and ping it from 10.49.x.x?&lt;/P&gt;&lt;P&gt;Or do I need to have a staic nat for all of these?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2014 14:06:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566000#M205412</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2014-11-07T14:06:31Z</dc:date>
    </item>
    <item>
      <title>As per your configuration 192</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566001#M205413</link>
      <description>&lt;P&gt;As per your configuration 192.168.223.1 is configured on RF interface of the ASA,&amp;nbsp; I believe all 40 devices are behind this interface.&lt;/P&gt;&lt;P&gt;where is 10.49.x.x network and how it reachable via this ASA and and which ASA interface is connected&amp;nbsp; to MPLS link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Prashant Joshi&lt;/P&gt;</description>
      <pubDate>Sun, 09 Nov 2014 06:14:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566001#M205413</guid>
      <dc:creator>Prashant Joshi</dc:creator>
      <dc:date>2014-11-09T06:14:57Z</dc:date>
    </item>
    <item>
      <title>PrashantThere are two</title>
      <link>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566002#M205414</link>
      <description>&lt;P&gt;Prashant&lt;/P&gt;&lt;P&gt;There are two networks at this location; 10.51.14.0/24 which is routed via our MPLS and is behind the ASA.&lt;/P&gt;&lt;P&gt;And 192.168.223.0/24&amp;nbsp;which is standalone with no routing but we will set up intervlan routing within the site in the near future and it will also be behind that same ASA when we go live with this. It will not however be routed as I mentioned before because we are not allowed to route 192.168.x.x networks via the MPLS. So we were hopping to be able to do some kind of natting in order to manage and monitor it from 10.49.x.x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The 10.49.x.x network is our HQ network&amp;nbsp;from which we do all the monitoring of our world wide MPLS. It is behind an ASA as well.&lt;/P&gt;&lt;P&gt;I wanted to changed all 40 devices to a network&amp;nbsp;that is routable but I am not permitted to do so. That would make this so much easier!&lt;/P&gt;&lt;P&gt;We really appreciate your help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2014 13:26:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-inside-network-to-dmz/m-p/2566002#M205414</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2014-11-10T13:26:03Z</dc:date>
    </item>
  </channel>
</rss>

