<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT question one outside address permited to all inside addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393943#M309879</link>
    <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; What is the proper config to allow a single outside addr access to every device to multiple ports on an inside network?&lt;/P&gt;&lt;P&gt;We have a vendor that supports our access points and other wifi related devices at one of our remotes sites. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only subnet in use at this site is the inside network with subnet 192.168.223.0/24&lt;/P&gt;&lt;P&gt;I am hopping I do not need to create a static entry for every device and every port because there are a lot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I have in the 5505 ios 8.2 to allow them to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.223.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 100.100.100.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 100.100.100.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.223.0 255.255.255.0 192.168.223.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name 99.99.99.99 vendor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in_1 extended deny ip host vendor host 192.168.223.251&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp host vendor any object-group xxx&lt;BR /&gt;access-list outside_access_in_1 extended permit udp host vendor any object-group xxx&lt;/P&gt;&lt;P&gt;global (outside) 1 100.100.100.3 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in_1 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the inside devices need to initiate access to go outside. All of the traffic these inside devices generate goes to the 192.168.223.251 device which is a server with dual connected NICs.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:58:44 GMT</pubDate>
    <dc:creator>john.wright</dc:creator>
    <dc:date>2019-03-12T02:58:44Z</dc:date>
    <item>
      <title>NAT question one outside address permited to all inside addresses</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393943#M309879</link>
      <description>&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; What is the proper config to allow a single outside addr access to every device to multiple ports on an inside network?&lt;/P&gt;&lt;P&gt;We have a vendor that supports our access points and other wifi related devices at one of our remotes sites. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only subnet in use at this site is the inside network with subnet 192.168.223.0/24&lt;/P&gt;&lt;P&gt;I am hopping I do not need to create a static entry for every device and every port because there are a lot!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I have in the 5505 ios 8.2 to allow them to access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 192.168.223.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 100.100.100.2 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 100.100.100.1 1&lt;/P&gt;&lt;P&gt;route inside 192.168.223.0 255.255.255.0 192.168.223.254 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; name 99.99.99.99 vendor&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit icmp any any&lt;BR /&gt;access-list outside_access_in_1 extended deny ip host vendor host 192.168.223.251&lt;/P&gt;&lt;P&gt;access-list outside_access_in_1 extended permit tcp host vendor any object-group xxx&lt;BR /&gt;access-list outside_access_in_1 extended permit udp host vendor any object-group xxx&lt;/P&gt;&lt;P&gt;global (outside) 1 100.100.100.3 netmask 255.255.255.0&lt;BR /&gt;nat (inside) 1 192.168.223.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group outside_access_in_1 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;None of the inside devices need to initiate access to go outside. All of the traffic these inside devices generate goes to the 192.168.223.251 device which is a server with dual connected NICs.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:58:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393943#M309879</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2019-03-12T02:58:44Z</dc:date>
    </item>
    <item>
      <title>NAT question one outside address permited to all inside addresse</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393944#M309882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the Vendor doesnt not have any existing connection to your network and wants to connect to your internal network devices through the Internet then every device would need a public IP address. But this isnt really an option with so many devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest that you either provide the Vendor access to your network through a VPN Client connection or better yet configure a L2L VPN connection between your site and the Vendor site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would enable the Vendor to connect to your devices with their actual IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could control the Vendor access either with VPN Filter ACL specific to their VPN connection or use an interface ACL to control this traffic provided that some other setting were also changed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said, if the Vendor is attempting to connect through the Internet without any VPN connection then every device would needs its own public IP address OR you would have to have a DMZ server to which the Vendor connects and the Vendor would have limited access through the DMZ Server to the devices required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 15:42:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393944#M309882</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-31T15:42:22Z</dc:date>
    </item>
    <item>
      <title>NAT question one outside address permited to all inside addresse</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393945#M309885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Jouni&lt;/P&gt;&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;I think the VPN tunnel is the best idea.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Oct 2013 19:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-one-outside-address-permited-to-all-inside/m-p/2393945#M309885</guid>
      <dc:creator>john.wright</dc:creator>
      <dc:date>2013-10-31T19:05:00Z</dc:date>
    </item>
  </channel>
</rss>

