<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco ASA public and private network on inside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867476#M25779</link>
    <description>&lt;P&gt;Try the below NAT command.&lt;/P&gt;&lt;P&gt;object-group network INSIDE-SUBNET&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 172.17.67.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
    <pubDate>Tue, 04 Jun 2019 14:56:55 GMT</pubDate>
    <dc:creator>vsurresh</dc:creator>
    <dc:date>2019-06-04T14:56:55Z</dc:date>
    <item>
      <title>Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867384#M25776</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a Cisco ASA 5516 that we use for public networking.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a single IP on the outside interface and IP a /22 block on the inside interface. The need has come up to privately IP something behind the firewall. So i have added an IP to VLAN1 of the switch for the new private IP range 172.17.67.0/24. Traffic can ping gateway and inside interface of ASA but cannot get to internet. I think i need some type of NAT as we have nothing in our NAT table except nonats for site to site VPN connections.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone have any examples of how we would NAT this?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;basic layout with masked IP addresses&lt;/P&gt;&lt;P&gt;WAN&amp;lt;--&amp;gt;25.25.25.25 (outside)&amp;lt;--&amp;gt;25.26.26.26/22(inside)&amp;lt;--&amp;gt;172.17.67.1/24 (layer3 switch behind inside)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 13:11:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867384#M25776</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-04T13:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867476#M25779</link>
      <description>&lt;P&gt;Try the below NAT command.&lt;/P&gt;&lt;P&gt;object-group network INSIDE-SUBNET&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 172.17.67.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 14:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867476#M25779</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2019-06-04T14:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867484#M25781</link>
      <description>&lt;P&gt;Thanks for this. This may work in a dynamic case but looking for a static example sorry didn't specify. as host inside will be nat'd one to one to public IP. I have to open ports to the internet for the host so it cannot be outside interface ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;inside&lt;/P&gt;&lt;P&gt;25.26.26.27 &amp;lt;--&amp;gt; 172.17.67.27 for example.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 15:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867484#M25781</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-04T15:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867526#M25783</link>
      <description>&lt;P&gt;I have added this as well and still do not get internet access &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/466343"&gt;@vsurresh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Try the below NAT command.&lt;/P&gt;&lt;P&gt;object-group network INSIDE-SUBNET&lt;/P&gt;&lt;P&gt;&amp;nbsp;subnet 172.17.67.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outside) dynamic interface&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 16:07:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867526#M25783</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-04T16:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867537#M25787</link>
      <description>Do you want users to access this host via the public IP as well?&lt;BR /&gt;For example, users can internally access the host via 172.17.67.27:80 and external users can access it via 25.26.26.27:80&lt;BR /&gt;Is this what are you trying to achieve? If that is the case please add the below&lt;BR /&gt;&lt;BR /&gt;object network host-name&lt;BR /&gt;host 172.17.67.27&lt;BR /&gt;nat (inside,outside) static 25.26.26.27 service tcp 80 80&lt;BR /&gt;&lt;BR /&gt;You will also need inbound ACL to permit the traffic from outside to inside.&lt;BR /&gt;</description>
      <pubDate>Tue, 04 Jun 2019 16:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867537#M25787</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2019-06-04T16:29:51Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867558#M25791</link>
      <description>Can you please run a packet-tracer command and post the output?&lt;BR /&gt;&lt;BR /&gt;#packet-tracer input inside tcp 172.17.67.27 25000 8.8.8.8 80</description>
      <pubDate>Tue, 04 Jun 2019 16:57:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867558#M25791</guid>
      <dc:creator>vsurresh</dc:creator>
      <dc:date>2019-06-04T16:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867637#M25793</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/466343"&gt;@vsurresh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Can you please run a packet-tracer command and post the output?&lt;BR /&gt;&lt;BR /&gt;#packet-tracer input inside tcp 172.17.67.27 25000 8.8.8.8 80&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I executed this and it claims up and working but still do not get internet access on system IP'd 172.17.67.226 actually. But goes through NAT as expected.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 19:28:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867637#M25793</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-04T19:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867693#M25795</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/466343"&gt;@vsurresh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Do you want users to access this host via the public IP as well?&lt;BR /&gt;For example, users can internally access the host via 172.17.67.27:80 and external users can access it via 25.26.26.27:80&lt;BR /&gt;Is this what are you trying to achieve? If that is the case please add the below&lt;BR /&gt;&lt;BR /&gt;object network host-name&lt;BR /&gt;host 172.17.67.27&lt;BR /&gt;nat (inside,outside) static 25.26.26.27 service tcp 80 80&lt;BR /&gt;&lt;BR /&gt;You will also need inbound ACL to permit the traffic from outside to inside.&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/466343"&gt;@vsurresh&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;Do you want users to access this host via the public IP as well?&lt;BR /&gt;For example, users can internally access the host via 172.17.67.27:80 and external users can access it via 25.26.26.27:80&lt;BR /&gt;Is this what are you trying to achieve? If that is the case please add the below&lt;BR /&gt;&lt;BR /&gt;object network host-name&lt;BR /&gt;host 172.17.67.27&lt;BR /&gt;nat (inside,outside) static 25.26.26.27 service tcp 80 80&lt;BR /&gt;&lt;BR /&gt;You will also need inbound ACL to permit the traffic from outside to inside.&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Yes, that is what i am trying to achieve but the public IP address is on the inside interface not the outside. Outside has a single IP address and inside is /22 public IP's then i have the private also behind on interface inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I do have internet access now it ended up being a routing issue in the layer 3 switch.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Jun 2019 20:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867693#M25795</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-04T20:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867848#M25797</link>
      <description>&lt;P&gt;&lt;SPAN&gt;WAN&amp;lt;--&amp;gt;25.25.25.25 (outside)&amp;lt;--&amp;gt;25.26.26.26/22(inside)&amp;lt;--&amp;gt;172.17.67.1/24 (layer3 switch behind inside)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Are you using the similar to above design currently, And if so Yes, how is existing connections working, when your L3 switch upstream interface connected to firewall is not in same subnet with firewall inside interface subnet?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;- You said , you can reach firewall int -IP - 25.26.26.26 from 172.17.67.0/24 network, how is that possible?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2019 03:07:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3867848#M25797</guid>
      <dc:creator>venkat_n7</dc:creator>
      <dc:date>2019-06-05T03:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco ASA public and private network on inside interface</title>
      <link>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3872367#M25799</link>
      <description>&lt;P&gt;Sorry for the confusion but the NAT you gave me did work to get traffic from inside to outside on the proper IP address. I do have a route to point back to the layer 3 switch on the firewall to get traffic back to it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Jun 2019 11:52:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-asa-public-and-private-network-on-inside-interface/m-p/3872367#M25799</guid>
      <dc:creator>ChaneySys</dc:creator>
      <dc:date>2019-06-13T11:52:07Z</dc:date>
    </item>
  </channel>
</rss>

