<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT server access through a public IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303893#M311714</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It requires you to configure a bit unusual NAT configuration and you will also have to confirm that you have a certain setting enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So first you will have to confirm that you have the configuration &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;. You can show the settings with &lt;STRONG&gt;"show run same-security-traffic"&lt;/STRONG&gt; command for example. This command/setting will allow the ASA to have a connection incoming and leaving through the same interface. In this case that interface would seem to be &lt;STRONG&gt;"inside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual NAT configuration will be between the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. It will both translate the source address of the user to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address (server will see connection coming from the ASA interface IP address rather than the host directly. This is important for traffic to flow correctly with regards to the ASA) and also do the Static NAT required by the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a NAT configuration that should work for your situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-PUBLIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.115.33&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.115.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) source dynamic LAN interface destination static SERVER-PUBLIC SERVER-LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please&amp;nbsp; do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Oct 2013 18:45:30 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-10-01T18:45:30Z</dc:date>
    <item>
      <title>NAT server access through a public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303892#M311713</link>
      <description>&lt;P&gt;Hi, I have a ASA 5550 with a ios version 9. This ASA has a public ip to give access to the inside users (NAT overload) and it has an other public ip to do a static nat to connect the outside users with a&amp;nbsp; server inside of the network (http).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All works great but now, I need to achieve that if I am in the inside segment, I can access to the server but with the public ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am connected in the inside network, I have a 192.168.115.80 and the server has the 192.168.115.33, If I browse the server with the 192.168.115.33, I get access to the server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But now, instead of browse with the private ip (192.168.115.33) I want to browse with the public ip that I use to permit public user to get access. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;are there any feature to do this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!!!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:45:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303892#M311713</guid>
      <dc:creator>Carlos Yahir Ramirez Huerta</dc:creator>
      <dc:date>2019-03-12T02:45:45Z</dc:date>
    </item>
    <item>
      <title>NAT server access through a public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303893#M311714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It requires you to configure a bit unusual NAT configuration and you will also have to confirm that you have a certain setting enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So first you will have to confirm that you have the configuration &lt;STRONG&gt;"same-security-traffic permit intra-interface"&lt;/STRONG&gt;. You can show the settings with &lt;STRONG&gt;"show run same-security-traffic"&lt;/STRONG&gt; command for example. This command/setting will allow the ASA to have a connection incoming and leaving through the same interface. In this case that interface would seem to be &lt;STRONG&gt;"inside"&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The actual NAT configuration will be between the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; and &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface. It will both translate the source address of the user to the &lt;STRONG&gt;"inside"&lt;/STRONG&gt; interface IP address (server will see connection coming from the ASA interface IP address rather than the host directly. This is important for traffic to flow correctly with regards to the ASA) and also do the Static NAT required by the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a NAT configuration that should work for your situation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-PUBLIC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SERVER-LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.115.33&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 192.168.115.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) source dynamic LAN interface destination static SERVER-PUBLIC SERVER-LOCAL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please&amp;nbsp; do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 18:45:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303893#M311714</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-01T18:45:30Z</dc:date>
    </item>
    <item>
      <title>NAT server access through a public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303894#M311715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A _jive_internal="true" href="https://community.cisco.com/people/JouniForss" id="jive-21864416165802359924255" style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; outline: none; color: #000000; font-weight: bold; font-family: Arial, verdana, sans-serif;"&gt;JouniForss&lt;/A&gt; thanks for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I applied the comands like you said, but I can not connect yet. &lt;/P&gt;&lt;P&gt;I have the "&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;same-security-traffic permit intra-interface&lt;/STRONG&gt;" command and these are my nat and objects:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object network www&lt;/P&gt;&lt;P&gt; host 192.168.115.32&lt;/P&gt;&lt;P&gt;object network ip_publica_servicios&lt;/P&gt;&lt;P&gt; host 187.157.145.182&lt;/P&gt;&lt;P&gt;object network 115&lt;/P&gt;&lt;P&gt; subnet 192.168.115.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network Internet&lt;/P&gt;&lt;P&gt; description Vlans permitidas a internet&lt;/P&gt;&lt;P&gt; network-object 192.168.111.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.112.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.115.0 255.255.255.0&lt;/P&gt;&lt;P&gt; network-object 192.168.88.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic Internet interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static any any destination static usuarios_vpn usuarios_vpn no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;nat (inside,inside) source dynamic 115 interface destination static ip_publica_servicios www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network www&lt;/P&gt;&lt;P&gt; nat (inside,outside) static ip_publica_servicios service tcp www www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you think that the other nat can cause the problem?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 21:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303894#M311715</guid>
      <dc:creator>Carlos Yahir Ramirez Huerta</dc:creator>
      <dc:date>2013-10-01T21:08:44Z</dc:date>
    </item>
    <item>
      <title>NAT server access through a public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303895#M311716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is with the order of the NAT configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have 2 options to make this work&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remove the command you just added and add it with a line number so its at the top of the NAT rules&lt;/LI&gt;&lt;LI&gt;Remvoe your Dynamic PAT rule for all users and enter it in a new format so it doesnt cause problem for the NAT configuration I suggested. This option will naturally cause a small outage to Internet users behind the ASA while the first option doesnt cause this. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would rather use the second option though you might want to use the first if you dont want to cause any problems for Internet users (even though its a small outage in the connections)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First option can be done in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,inside) source dynamic 115 interface destination static ip_publica_servicios www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,inside) 1 source dynamic 115 interface destination static ip_publica_servicios www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second option which I prefer would be done in this way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source dynamic Internet interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) after-auto source dynamic Internet interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why I prefer removing the Dynamic PAT for Internet users and changing its configuration format is because at its current form its overriding all other NAT configurations because its configured as the higher priority NAT configuration which it really shouldnt be. By adding the &lt;STRONG&gt;"after-auto"&lt;/STRONG&gt; the Dynamic PAT will still work for all the LAN users but wont interfere with the other NAT configurations like its doing now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this clarifies the situation &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 21:16:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-server-access-through-a-public-ip/m-p/2303895#M311716</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-10-01T21:16:34Z</dc:date>
    </item>
  </channel>
</rss>

