<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need Help on one Firewall Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261168#M346621</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have tried but no luck. Below is my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WEBSERVER&lt;/P&gt;&lt;P&gt; host 192.168.1.3&lt;/P&gt;&lt;P&gt;access-list WEBSERVER extended permit tcp any host 192.168.1.3 eq www&lt;/P&gt;&lt;P&gt;access-list WEBSERVER extended permit tcp any host 1.1.1.1 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WEBSERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;access-group WEBSERVER in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (outside) 100 access-list WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;global (inside) 100 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Jul 2013 13:32:09 GMT</pubDate>
    <dc:creator>jaskamboj</dc:creator>
    <dc:date>2013-07-11T13:32:09Z</dc:date>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261160#M346608</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am using cisco asa in my environment and which is connected to l2. One server and one router is also connected to L2. Now i want to access port 80 on my server from outside. &lt;/P&gt;&lt;P&gt;&lt;BR style="color: #000000; font-family: Arial, sans-serif; line-height: 15px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;How its possible if the server gateway is routers ip and i don't want to add static route in router or server towards the firewall. Nat and access List is done on firewall. what else i can do on firewall to access port 80 of my server from outside. Dont want to change anything on router/server.&lt;/P&gt;&lt;P&gt;&lt;BR style="color: #000000; font-family: Arial, sans-serif; line-height: 15px; background-color: #ffffff;" /&gt;&lt;/P&gt;&lt;P&gt;Below is the IP detail&lt;/P&gt;&lt;P&gt;1. Firewall inside 192.168.1.1 &amp;amp; Outside 1.1.1.1&lt;/P&gt;&lt;P&gt;2. Router IP - 192.168.1.2&lt;/P&gt;&lt;P&gt;3. Server IP - 192.168.1.3 &amp;amp; GW - 192.168.1.2&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:10:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261160#M346608</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2019-03-12T02:10:40Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261161#M346609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to your explanation the packets would arrive on the ASA and reach the server but the server would forward them through the router which would then probably forward them through another Internet connection or what is the default gateway of the router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If its something else than the ASA then the connections will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 18:20:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261161#M346609</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-10T18:20:15Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261162#M346611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for Reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes the default gateway is something else than the ASA and the connection getting failed. But is there any configuration which we can done on firewall to make it work. I hear from someone that we can done some mapping on firewall with that server and it should work even if the default gateway of server is different. and if the GW of router is not asa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 18:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261162#M346611</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-10T18:38:18Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261163#M346613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the software level of your firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 18:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261163#M346613</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-10T18:40:33Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261164#M346614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its Pix Firewall 7.2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 18:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261164#M346614</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-10T18:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261165#M346616</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well the only ways I could think that the connections could be gotten working would be&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Policy Based Routing on the Router that would forward the web servers traffic through the firewall instead of the routers default gateway (even just the return traffic for web connections)&lt;/LI&gt;&lt;LI&gt;Configuring NAT on the ASA firewall so that all traffic from the Internet would be NATed to an internal IP address from the network 192.168.1.0/24. This would mean that the server would be sending the traffic to ASA instead of using its default gateway. And this is ofcourse because the server would be seeing all connections coming from its connected network and wouldnt have to use the default gateway.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You havent mentioned what type of NAT you are doing on the ASA for the server Static PAT or Static NAT. Static PAT would be forwarding a single (or several ports) only while Static NAT would be dedicating a single public IP address for the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would imagine that you would have to configure 2 separate NAT statements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Dynamic Policy PAT for the External hosts&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;This should NAT all traffic coming from the Internet to the IP address of your ASAs "inside" interface WHEN the destination is the public IP address of your Web server.&lt;SPAN style="text-decoration: underline;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-NAT-WEBSERVER remark NAT inbound web traffic to an internal IP address&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list POLICY-NAT-WEBSERVER permit tcp any host 1.1.1.1 eq 80&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside) 100 access-list POLICY-NAT-WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (inside) 100 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Static NAT or Static PAT for Web server&lt;/SPAN&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Either of these NAT configurations should forward the connections to your Web servers public IP address on port TCP/80 to the Web server.&lt;/LI&gt;&lt;LI&gt;Together with the above NAT configuration the return traffic from the Web server should flow back through the ASA.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 1.1.1.1 192.168.1.3 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp 1.1.1.1 80 192.168.1.3 80 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using the public IP address on the ASA "outside" interface then replace the 1.1.1.1 with &lt;STRONG&gt;"interface"&lt;/STRONG&gt;. The IP address 1.1.1.1 stands for a public IP address that you might use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to ask more if needed&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 18:55:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261165#M346616</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-10T18:55:14Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261166#M346618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have done the following configuration only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;static (inside,outside) tcp 1.1.1.1 80 192.168.1.3 80 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE style="font-size: 10px; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;access-list server permit tcp any host 192.168.1.3 eq 80&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE style="font-size: 10px; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;PRE style="font-size: 10px; color: #000000; background-color: #ffffff;"&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now according to you need to add Dynamic policy as well for external hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will try and reply you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 19:16:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261166#M346618</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-10T19:16:52Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261167#M346620</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, the Static PAT (Port Forward) that you have configured will forward the traffic to your Web server but the return traffic will still be forwarded to the router by the web server and the connections will fail.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if we configure the Dynamic Policy PAT which NATs any users on the Internet to your firewalls "inside" interface local IP address then the Web server will send the return traffic there since host communicating in the same subnet will always send the traffic directly to eachother.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jul 2013 19:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261167#M346620</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-10T19:20:08Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261168#M346621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have tried but no luck. Below is my configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 1.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WEBSERVER&lt;/P&gt;&lt;P&gt; host 192.168.1.3&lt;/P&gt;&lt;P&gt;access-list WEBSERVER extended permit tcp any host 192.168.1.3 eq www&lt;/P&gt;&lt;P&gt;access-list WEBSERVER extended permit tcp any host 1.1.1.1 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network WEBSERVER&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp www www&lt;/P&gt;&lt;P&gt;access-group WEBSERVER in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;nat (outside) 100 access-list WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;&lt;STRONG style="border-collapse: collapse; list-style: none;"&gt;global (inside) 100 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 13:32:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261168#M346621</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-11T13:32:09Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261169#M346623</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have tried this on ASA version 8.4&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 13:52:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261169#M346623</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-11T13:52:53Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261170#M346625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said you had PIX 7.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The NAT configuration format I provided only works up to software level 8.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At 8.3 and after the configuration format is totally different.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which one are you using?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 16:20:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261170#M346625</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-11T16:20:51Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261171#M346626</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today i have tried on ASA with software version 8.4.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261171#M346626</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-11T18:17:03Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261172#M346628</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the new format you might be able to do both of the NAT configurations with a single &lt;STRONG&gt;"nat"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network WEBSERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.1.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object service WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; service tcp source eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static WEBSERVER interface destination static interface any service WWW WWW&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should both do Static PAT for your Webserver and translate any source address on the Internet to the &lt;STRONG&gt;"inside" &lt;/STRONG&gt;interface IP address WHEN they access your Web server through TCP/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jul 2013 18:40:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261172#M346628</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-11T18:40:13Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261173#M346630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Alot for help. Its working fine now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please share me the commands for Version 7.2 also.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 06:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261173#M346630</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-13T06:33:55Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261174#M346631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I provided that configuration in the earlier replies. The ones done with &lt;STRONG&gt;"static" , "nat" and "global"&lt;/STRONG&gt; configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have not tested the setup myself but it would seem like the only way to do it that I can think of at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please do remember to mark a reply as the correct answer if it has answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 14:19:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261174#M346631</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T14:19:03Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261175#M346632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have tried with earlier configuration but no luck..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 18:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261175#M346632</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-13T18:22:14Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261176#M346633</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have those old NAT format configurations on your PIX firewall then I would like to see the output of a &lt;STRONG&gt;"packet-tracer" &lt;/STRONG&gt;command simulating a connection coming for your webserver&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 123.123.123.123 12345 &lt;YOUR public="" ip=""&gt; 80&lt;/YOUR&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should tell us what NAT rules are matched on the firewall for such a connection. Just enter your public IP address used for the Web servers NAT command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jul 2013 19:08:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261176#M346633</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-13T19:08:16Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261177#M346634</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find the bleow report.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input outside tcp 1.1.1.2 www 1.1.1.1&amp;nbsp; www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 1&lt;/P&gt;&lt;P&gt;Type: FLOW-LOOKUP&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;Found no matching flow, creating a new flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 2&lt;/P&gt;&lt;P&gt;Type: UN-NAT&lt;/P&gt;&lt;P&gt;Subtype: static&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.1.3 eq 80 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 10&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;NAT divert to egress interface inside&lt;/P&gt;&lt;P&gt;Untranslate 1.1.1.1/80 to 192.168.1.3/80 using netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 3&lt;/P&gt;&lt;P&gt;Type: ACCESS-LIST&lt;/P&gt;&lt;P&gt;Subtype: log&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;access-group WEBSERVER in interface outside&lt;/P&gt;&lt;P&gt;access-list WEBSERVER extended permit tcp any host 1.1.1.1 eq www&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 4&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 5&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: rpf-check&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.1.3 eq 80 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 10&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 6&lt;/P&gt;&lt;P&gt;Type: NAT&lt;/P&gt;&lt;P&gt;Subtype: host-limits&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&amp;nbsp; match tcp inside host 192.168.1.3 eq 80 outside any&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; static translation to 1.1.1.1/80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 10&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 7&lt;/P&gt;&lt;P&gt;Type: IP-OPTIONS&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Phase: 8&lt;/P&gt;&lt;P&gt;Type: FLOW-CREATION&lt;/P&gt;&lt;P&gt;Subtype:&lt;/P&gt;&lt;P&gt;Result: ALLOW&lt;/P&gt;&lt;P&gt;Config:&lt;/P&gt;&lt;P&gt;Additional Information:&lt;/P&gt;&lt;P&gt;New flow created with id 10, packet dispatched to next module&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result:&lt;/P&gt;&lt;P&gt;input-interface: outside&lt;/P&gt;&lt;P&gt;input-status: up&lt;/P&gt;&lt;P&gt;input-line-status: up&lt;/P&gt;&lt;P&gt;output-interface: inside&lt;/P&gt;&lt;P&gt;output-status: up&lt;/P&gt;&lt;P&gt;output-line-status: up&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 08:22:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261177#M346634</guid>
      <dc:creator>jaskamboj</dc:creator>
      <dc:date>2013-07-15T08:22:16Z</dc:date>
    </item>
    <item>
      <title>Need Help on one Firewall Question</title>
      <link>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261178#M346635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only situation where I managed to get this working was when I configured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp interface www 192.168.1.3 www netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;global (inside) 100 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (outside) 100 0.0.0.0 0.0.0.0 outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to configure Dynamic Policy PAT on the &lt;STRONG&gt;"outside" -&amp;gt; "inside"&lt;/STRONG&gt; but it didnt seem to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Jul 2013 09:19:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-help-on-one-firewall-question/m-p/2261178#M346635</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-07-15T09:19:30Z</dc:date>
    </item>
  </channel>
</rss>

