<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Nat help required in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285956#M345267</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have Internet router having public IP pool(144.xxxx Series) They are connected to ASA firewall , from ASA, it was Outside&lt;/P&gt;&lt;P&gt;Our requirement is we need to access that router from Inside Interface with some Private IP Pool.(10.xx.xx), One of the server hosted in DMZ location will fetch the config of the router, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do static nat&amp;nbsp; in asa 10.xxx --- to 144.xxx will help me in that case along with access list(port no 22) as config will be fetched over ssh protocol.&lt;/P&gt;&lt;P&gt;How to do the routing in that case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, subhojit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 02:20:44 GMT</pubDate>
    <dc:creator>subhojithalder198</dc:creator>
    <dc:date>2019-03-12T02:20:44Z</dc:date>
    <item>
      <title>ASA Nat help required</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285956#M345267</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have Internet router having public IP pool(144.xxxx Series) They are connected to ASA firewall , from ASA, it was Outside&lt;/P&gt;&lt;P&gt;Our requirement is we need to access that router from Inside Interface with some Private IP Pool.(10.xx.xx), One of the server hosted in DMZ location will fetch the config of the router, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do static nat&amp;nbsp; in asa 10.xxx --- to 144.xxx will help me in that case along with access list(port no 22) as config will be fetched over ssh protocol.&lt;/P&gt;&lt;P&gt;How to do the routing in that case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks, subhojit&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285956#M345267</guid>
      <dc:creator>subhojithalder198</dc:creator>
      <dc:date>2019-03-12T02:20:44Z</dc:date>
    </item>
    <item>
      <title>ASA Nat help required</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285957#M345269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Small addition, we like to do the Nat smothing like that Outside to Inside, Normally, we do inside to outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br/Subhojit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 14:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285957#M345269</guid>
      <dc:creator>subhojithalder198</dc:creator>
      <dc:date>2013-08-02T14:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Nat help required</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285958#M345271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if i got it right from you. Correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have an internet router that is connected to ASA's outside interface and you want to manage this router from an inside network, let's say, 10.1.1.0/24 using SSH. However, i didn't get the DMZ and server part. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the case, try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.1.1.10 144.xxx.xxx.xxx netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You do not need an ACL applied to the inside interface to allow SSH traffic to it because by default, traffic is allowed from higher security interface to a lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, i wonder why you want to apply this scenario. Why wouldn't you simply connect the router's mgmt interface to a dedicated management subnet? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;AM&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Aug 2013 15:52:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-help-required/m-p/2285958#M345271</guid>
      <dc:creator>turbo_engine26</dc:creator>
      <dc:date>2013-08-02T15:52:06Z</dc:date>
    </item>
  </channel>
</rss>

