<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with configuring Twice NAT from Internal Address to Interna in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470341#M270072</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Jeff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you'ld better to fix DNS replies (so clients could be connecting using internal IP-addresses).&lt;/P&gt;&lt;P&gt;To do this, you could use DNS doctoring with keyword "dns" under NAT staement, like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network obj-dst-webserver-real&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; nat (dmz2,outside) static 200.1.1.88 &lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;PS: refer to &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bf4132.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bf4132.shtml&lt;/A&gt;&lt;SPAN&gt; for details.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 09 Feb 2014 07:46:44 GMT</pubDate>
    <dc:creator>Vasilii Mikhailovskii</dc:creator>
    <dc:date>2014-02-09T07:46:44Z</dc:date>
    <item>
      <title>Help with configuring Twice NAT from Internal Address to Internal Webserver</title>
      <link>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470340#M270071</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my first time posting to the Support Community, and I'm hoping some folks with more insight into the "new" NAT structures in post 8.3 can shed some light on what's going wrong with this strange configuration that's been requested of me...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our sysadmins are decommissioning DNS zones for domains which we are not authoratative for.&amp;nbsp; I understand that this is a good idea.&amp;nbsp; DNS requests now go to an authoratative server via the internet, so instead of allowing direct internal communications to the webservers via our DNS and RFC1918 addressing, the communication now must route to the public (global) IP associated with our hosted webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The initial problem is that we were routing everything through a Websense proxy to the internet, and that traffic was all PAT'd to the outside interface IP of 200.1.1.254 (scrubbed).&amp;nbsp; If traffic would try to re-enter via the existing static NAT to the webserver (200.1.1.88 &amp;gt;&amp;gt; 192.168.2.188), I'd get denies via an IP spoof error.&amp;nbsp; I determined to try PAT'ing this traffic to a new PAT IP using Twice NAT to identify the particular communication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My configuration is below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;! Cisco Adaptive Security Appliance Software Version 9.0(x)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nameif outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; security-level 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip address 200.1.1.254 255.255.255.0 standby 200.1.1.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nameif dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; security-level 41&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip address 192.168.1.254 255.255.255.0 standby 192.168.1.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;interface GigabitEthernet0/2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nameif dmz2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; security-level 43&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip address 192.168.2.254 255.255.255.0 standby 192.168.2.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;interface GigabitEthernet0/3&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nameif inside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; security-level 100&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; ip address 172.22.16.254 255.240.0.0 standby 172.22.16.253&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-src-real&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; subnet 192.168.1.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-src-nat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; host 200.1.1.200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-dst-webserver-nat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; host 200.1.1.88&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-dst-webserver-real&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; host 192.168.2.188&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object-group PROXY-SERVERS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;description Network Proxy Servers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; network-object host 192.168.1.36&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;route outside 0.0.0.0 0.0.0.0 201.1.1.1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-group dmz1 in interface dmz1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-group outside in interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list dmz1 extended permit ip object-group PROXY-SERVERS any4&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list outside extended permit tcp any4 host 192.168.2.188 eq https&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-dst-webserver-real&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nat (dmz2,outside) static 200.1.1.88&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;object network obj-src-real&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt; nat (dmz1,outside) dynamic interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;nat (dmz1,outside) source dynamic obj-src-real obj-src-nat destination static obj-dst-webserver-nat obj-dst-webserver-nat&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The twice NAT is perplexing to me, as I can only get an xlate if I specify the mapped (outside) address twice in the destination portion of the syntax.&amp;nbsp; I do not know if this is correct.&amp;nbsp; I see the xlate build, no denies on the firewall, and the connections table on the firewall using the mapped (outside address) indicates a three-way handshake (saA flags), but no data passes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The proxy logs indicate the same 504 "bad gateway" errors that I've been struggling with since the beginning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've attached packet traces and a diagram for reference.&amp;nbsp; If anyone can help me make some sense of this, I'd be very happy.&amp;nbsp; Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:42:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470340#M270071</guid>
      <dc:creator>_Pouzaj24</dc:creator>
      <dc:date>2019-03-12T03:42:23Z</dc:date>
    </item>
    <item>
      <title>Help with configuring Twice NAT from Internal Address to Interna</title>
      <link>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470341#M270072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, Jeff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you'ld better to fix DNS replies (so clients could be connecting using internal IP-addresses).&lt;/P&gt;&lt;P&gt;To do this, you could use DNS doctoring with keyword "dns" under NAT staement, like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network obj-dst-webserver-real&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt; nat (dmz2,outside) static 200.1.1.88 &lt;STRONG&gt;dns&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 11.818181991577148px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;PS: refer to &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bf4132.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_tech_note09186a0080bf4132.shtml&lt;/A&gt;&lt;SPAN&gt; for details.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Feb 2014 07:46:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470341#M270072</guid>
      <dc:creator>Vasilii Mikhailovskii</dc:creator>
      <dc:date>2014-02-09T07:46:44Z</dc:date>
    </item>
    <item>
      <title>Help with configuring Twice NAT from Internal Address to Interna</title>
      <link>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470342#M270073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to what Mikhailovsky has mentioned, keep in mind that with DNS doctoring, all traffic after DNS resolution will be sent directly to the web server real IP, so you will need to make sure that there are ACLs in place to permit such traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- &lt;BR /&gt;Please remember to rate and select a correct answer&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Feb 2014 11:17:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470342#M270073</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-02-09T11:17:37Z</dc:date>
    </item>
    <item>
      <title>Help with configuring Twice NAT from Internal Address to Interna</title>
      <link>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470343#M270074</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Many thanks, guys.&amp;nbsp; This is exactly what I was looking for.&amp;nbsp; From what I've read, the DNS Hairpin could've been configured, but by comparison it is overly-complicated for my purposes anyway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Feb 2014 15:57:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-configuring-twice-nat-from-internal-address-to/m-p/2470343#M270074</guid>
      <dc:creator>_Pouzaj24</dc:creator>
      <dc:date>2014-02-10T15:57:47Z</dc:date>
    </item>
  </channel>
</rss>

