<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DNAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dnat/m-p/4023539#M22836</link>
    <description>&lt;P&gt;jonk34567,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would help if you could post your interface and object configuration first. Then we can guide you through the necessary steps to enable NAT.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Feb 2020 17:51:07 GMT</pubDate>
    <dc:creator>Sergey Lisitsin</dc:creator>
    <dc:date>2020-02-04T17:51:07Z</dc:date>
    <item>
      <title>DNAT</title>
      <link>https://community.cisco.com/t5/network-security/dnat/m-p/4023531#M22835</link>
      <description>&lt;P&gt;&lt;EM&gt;I need to configure DNAT in cisco asa. my servers in DMZ should be accessed from internet. Can anyone explain me the steps along with commands or asdm screenshots.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 17:32:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dnat/m-p/4023531#M22835</guid>
      <dc:creator>jonk34567</dc:creator>
      <dc:date>2020-02-04T17:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT</title>
      <link>https://community.cisco.com/t5/network-security/dnat/m-p/4023539#M22836</link>
      <description>&lt;P&gt;jonk34567,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would help if you could post your interface and object configuration first. Then we can guide you through the necessary steps to enable NAT.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 17:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dnat/m-p/4023539#M22836</guid>
      <dc:creator>Sergey Lisitsin</dc:creator>
      <dc:date>2020-02-04T17:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: DNAT</title>
      <link>https://community.cisco.com/t5/network-security/dnat/m-p/4023544#M22837</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configuration will depends on whether you have extra public ip address available for every server or you will configure port forwarding on the outside interface of firewall. Let me put example for scenario if you have public IP available&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) if you have dedicated public IP available&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;object network webserver-external-ip&lt;BR /&gt; host 198.51.100.101&lt;BR /&gt;!&lt;BR /&gt;object network webserver&lt;BR /&gt; host 192.168.1.100&lt;BR /&gt; nat (dmz,outside) static webserver-external-ip service tcp www www&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Further, you need told traffic to above webserver on the outside interface using ACL:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;access-list outside_acl extended permit tcp any object webserver eq www&lt;BR /&gt;!&lt;BR /&gt;access-group outside_acl in interface outside&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;Reference for config examples:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 17:53:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dnat/m-p/4023544#M22837</guid>
      <dc:creator>Muhammad Awais Khan</dc:creator>
      <dc:date>2020-02-04T17:53:52Z</dc:date>
    </item>
  </channel>
</rss>

