<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Reverse Port Redirection with ASA5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260930#M349677</link>
    <description>&lt;P&gt;Hello Community.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a singe IP Address in the Internet and want to forward SMTP traffic that hits our ASA Outside Interace to the internal Mailserver.&lt;/P&gt;&lt;P&gt;And we like to forward Http Traffic to our Webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;212.23.23.23 Port 25 -&amp;gt; 192.168.1.100 Port 25&lt;/P&gt;&lt;P&gt;212.23.23.23 Port 80 -&amp;gt; 192 168.1.200 Port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do i acomplish that. Which NAT rules do in need?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Patrick&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:45:20 GMT</pubDate>
    <dc:creator>Patrick Werner</dc:creator>
    <dc:date>2019-03-12T01:45:20Z</dc:date>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260930#M349677</link>
      <description>&lt;P&gt;Hello Community.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a singe IP Address in the Internet and want to forward SMTP traffic that hits our ASA Outside Interace to the internal Mailserver.&lt;/P&gt;&lt;P&gt;And we like to forward Http Traffic to our Webserver.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;212.23.23.23 Port 25 -&amp;gt; 192.168.1.100 Port 25&lt;/P&gt;&lt;P&gt;212.23.23.23 Port 80 -&amp;gt; 192 168.1.200 Port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How do i acomplish that. Which NAT rules do in need?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Patrick&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:45:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260930#M349677</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2019-03-12T01:45:20Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260931#M349678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depends on the IOS version you are running, examples below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prior 8.3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (nside,outside) tcp 212.23.23.23 25 192.168.1.100 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (nside,outside) tcp 212.23.23.23 80 192.168.1.200 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Starting in 8.3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_192.168.1.100&lt;/P&gt;&lt;P&gt; host 192.168.1.100&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 212.23.23.23 service tcp 25 25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_192.168.1.200&lt;/P&gt;&lt;P&gt; host 192.168.1.200&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 212.23.23.23 service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 May 2013 15:35:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260931#M349678</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-05-17T15:35:04Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260932#M349680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julomban.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the answer. But i have only one external IP adress, thats why i get the error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ERROR: Address 212.23.23.23 overlaps with outside interface address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside Interface:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; pppoe client vpdn group pppoex&lt;/P&gt;&lt;P&gt; ip address 212.23.23.23 255.255.255.255 pppoe setroute&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 13:59:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260932#M349680</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2013-05-23T13:59:26Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260933#M349687</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the parameter "interface" instead of the IP address "212.23.23.23" in the NAT configurations and it should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 14:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260933#M349687</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-23T14:28:47Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260934#M349688</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response. If you are using your outside interface on the NAT rule then use the keyword "interface":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Prior 8.3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (nside,outside) tcp interface 25 192.168.1.100 25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (nside,outside) tcp interface 80 192.168.1.200 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Starting in 8.3:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj_192.168.1.100&lt;/P&gt;&lt;P&gt;host 192.168.1.100&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 25 25&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network obj_192.168.1.200&lt;/P&gt;&lt;P&gt;host 192.168.1.200&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 May 2013 12:00:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260934#M349688</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2013-05-24T12:00:47Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260935#M349689</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jaun.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the answer, but somehow it doesnt work. i'm using IOS 9.01. Could be a problem with the rest of the nat rules :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 10.193.168.12&lt;/P&gt;&lt;P&gt; host 10.193.168.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.193.168.0 10.193.168.0 destination static 10.193.169.0 10.193.169.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.193.168.0 10.193.168.0 destination static 10.3.0.0 10.3.0.0&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic 10.193.168.0 interface&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.193.168.0 10.193.168.0 destination static 172.16.1.1 172.16.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network 10.193.168.12&lt;/P&gt;&lt;P&gt; nat (inside,outside) static interface service tcp smtp smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh nat translated interface outside&lt;BR /&gt;Manual NAT Policies (Section 1)&lt;BR /&gt;1 (inside) to (outside) source static 10.193.168.0 10.193.168.0&amp;nbsp;&amp;nbsp; destination static 10.193.169.0 10.193.169.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 205234, untranslate_hits = 206407&lt;BR /&gt;2 (inside) to (outside) source static 10.193.168.0 10.193.168.0&amp;nbsp;&amp;nbsp; destination static 10.3.0.0 10.3.0.0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 86, untranslate_hits = 86&lt;BR /&gt;3 (inside) to (outside) source dynamic 10.193.168.0 interface&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 275255, untranslate_hits = 45715&lt;BR /&gt;4 (inside) to (outside) source static 10.193.168.0 10.193.168.0&amp;nbsp;&amp;nbsp; destination static 172.16.1.1 172.16.1.1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 399, untranslate_hits = 409&lt;/P&gt;&lt;P&gt;Auto NAT Policies (Section 2)&lt;BR /&gt;1 (inside) to (outside) source static 10.193.168.12 interface&amp;nbsp;&amp;nbsp; service tcp smtp smtp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; translate_hits = 0, untranslate_hits = 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 11:12:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260935#M349689</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2013-05-25T11:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260936#M349690</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the Dynamic PAT is breaking the Port Forward / Static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So do this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat (inside,outside) source dynamic 10.193.168.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) &lt;SPAN style="color: #ff0000;"&gt;after-auto&lt;/SPAN&gt; source dynamic 10.193.168.0 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do notice that this will cause a minor outage in hosts connections to "outside" which use the Dynamic PAT. But this has to be changed for the Static PAT / Port Forward to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding the "after-auto" will move this Dynamic PAT configuration to the very end of the of the NAT rules called Section 3. The Network Object NAT for the Port Forward / Static PAT is Section 2. And the original Dynamic PAT rule and the others along with it are Section 1 NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The order they are gone through is naturally from Section 1 to Section 2 to Section 3. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememeber to mark the reply as the correct answer if it answered your question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 11:15:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260936#M349690</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-25T11:15:30Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260937#M349691</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That was it, thanks for your help. Just a little question more:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to forward more than one port, for this I've created an service-group:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group service ExchangePorts&lt;/P&gt;&lt;P&gt; description Exchange Ports&lt;/P&gt;&lt;P&gt; service-object object IMAP&lt;/P&gt;&lt;P&gt; service-object object POP3Secure&lt;/P&gt;&lt;P&gt; service-object tcp destination eq www&lt;/P&gt;&lt;P&gt; service-object tcp destination eq https&lt;/P&gt;&lt;P&gt; service-object tcp destination eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i can't add this group to the nat rule&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network 10.193.168.12&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp ExchangePorts ExchangePorts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And if I add more than one nat rule under the object network 10.193.168.12 the last one will be overwrite. I can add only one rule under object network 10.193.168.12.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 12:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260937#M349691</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2013-05-25T12:57:36Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260938#M349692</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sadly, atleast at the moment, you are not able to use &lt;STRONG&gt;"object-group service"&lt;/STRONG&gt; in a NAT configuration command of any type.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, any &lt;STRONG&gt;"object network"&lt;/STRONG&gt; can ONLY hold ONE &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration line or host/subnet/range configuration and any &lt;STRONG&gt;"object service"&lt;/STRONG&gt; can ONLY hold one configuration line also for the service in question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So for multiple ports I am affraid you have to use multiple &lt;STRONG&gt;"object network"&lt;/STRONG&gt; with their own &lt;STRONG&gt;"nat"&lt;/STRONG&gt; configuration lines. The only situation where you could manage with fewer configuration would be if you needed to forward a continuous range of ports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in your situation it would seem that you will have to use this format for each service/port that you need to forward&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network &lt;/STRONG&gt;&lt;OBJECT name=""&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/OBJECT&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.193.168.12&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service &lt;REAL service="" port=""&gt; &lt;MAPPED service="" port=""&gt;&lt;/MAPPED&gt;&lt;/REAL&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally if there are several local IP address involved in the port forwards then you use those IP address instead of the above mentioned one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you could for example create&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network HTTPS&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 10.193.168.12&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service 443 443&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And so on for each service.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know its messy but sadly its the only option at the moment&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 14:10:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260938#M349692</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-25T14:10:27Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260939#M349693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wrote a NAT 8.3+ Document on these forums. It goes over some basic information about the new NAT format if you want to have a look&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-31116"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally when in doubt, dont hesitate to start a discussion here on the Firewall section of CSC and ask more &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 14:12:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260939#M349693</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-25T14:12:05Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260940#M349694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks guys, it works now. Great support, i'm so happy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Little side question. Is it right that if you use remote vpn oder site-to-site vpn you have to nat both network. Thats means the remote vpn network and the local lan network. Or the site a network and the site b network?&lt;BR /&gt;&lt;BR /&gt;Example:&lt;BR /&gt;nat (inside,outside) source static 'Site A' 'Site A' destination static 'Site B' 'Site B'&lt;BR /&gt;nat (inside,outside) source static Local LAN' 'Local LAN' destination static 'Remote VPN network' 'Remote VPN network'&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 16:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260940#M349694</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2013-05-25T16:30:42Z</dc:date>
    </item>
    <item>
      <title>Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260941#M349695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to help &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do need a NAT configuration usually for both VPN Client and Site to Site VPN to function correctly. I guess the only exception is when a single ASA is ONLY used for VPN. Then you can actually have the ASA without ANY NAT configurations at all. But this doesnt apply to your situation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You basically already listed the type of NAT configurations you need already.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say we have a site with ASA firewall and that ASA has one Site to Site VPN and one VPN client connection configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The local site is 10.10.10.0/24&lt;/LI&gt;&lt;LI&gt;The remote site is 10.10.20.0/24&lt;/LI&gt;&lt;LI&gt;The VPN Pool is 10.10.100.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the above information if we wanted to make it so that both the local site and remote site and the local site and vpn pool could communicate using their original IP address, then we would configure the NAT in the following way&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.20.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; subnet 10.10.100.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static LAN LAN destination static REMOTE-LAN REMOTE-LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) source static LAN LAN destination static VPN-POOL VPN-POOL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same logic would apply if you were to configure more Site to Site VPNs or VPN Client connections on the local firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rememember to mark correct replys as the correct answer or rate helpfull answers &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 May 2013 17:39:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260941#M349695</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-25T17:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse Port Redirection with ASA5505</title>
      <link>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260942#M349696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. I'hereby ask you if you can help me out in another thread.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportforums.cisco.com/message/3947029#3947029" target="_blank"&gt;https://supportforums.cisco.com/message/3947029#3947029&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;The Cisco 1941 was installed with cisco professional tool. But the nat rule was missing. The remote vpn works and is up. But we cant reach the local lan. The vpn pool has just one address. Thats why i try to nat this only address to one address in the local lan. But if if i set this nat rule the vpn doesnt work because the pool cant handout this address anymore. If you like check the thread.&lt;BR /&gt;&lt;BR /&gt;Many thanks patrick&lt;BR /&gt;Sent from Cisco Technical Support iPhone App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 May 2013 17:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-port-redirection-with-asa5505/m-p/2260942#M349696</guid>
      <dc:creator>Patrick Werner</dc:creator>
      <dc:date>2013-05-26T17:12:43Z</dc:date>
    </item>
  </channel>
</rss>

