<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Diverting some traffic from the ASA's public IP, to the DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220877#M349983</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you for some reason still want to apply this NAT only for those mention public IP addresses then I think the configuration might be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-POLICY-NAT permit tcp host 192.168.100.100 eq 443 host 2.2.2.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-POLICY-NAT permit tcp host 192.168.100.100 eq 443 host 2.2.2.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,outside) tcp interface https access-list DMZ-POLICY-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 May 2013 18:04:32 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-13T18:04:32Z</dc:date>
    <item>
      <title>Diverting some traffic from the ASA's public IP, to the DMZ</title>
      <link>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220875#M349981</link>
      <description>&lt;P&gt;Hey all, any ideas would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA has outside interface with a public IP, say 1.1.1.1&amp;nbsp; (This IP is global natted so people can access the internet, etc)&lt;/P&gt;&lt;P&gt;global (outside) 1 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need to open up port 443 for a few external servers to hit a server on our DMZ with a private IP 192.168.100.100.&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp 2.2.2.2 host 1.1.1.1 eq https &lt;/P&gt;&lt;P&gt;access-list outside_in extended permit tcp 2.2.2.3 host 1.1.1.1 eq https &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need all the rest of the traffic to continue to do whatever it is doing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking there is some sort of translation I can to do to accomplish this, any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Clarification....&lt;/P&gt;&lt;P&gt;I have two outside servers, say 2.2.2.2 and 2.2.2.3 they need to access 192.168.100.100 on our DMZ buy using the ASA's outside public ip 1.1.1.1&lt;/P&gt;&lt;P&gt;How can I do this, only diverting traffic from the 2 external servers and not all external servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ, outside) 1.1.1.1 192.168.100.100 255.255.255.255 wont work as that just translates everything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:42:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220875#M349981</guid>
      <dc:creator>David Tamburin</dc:creator>
      <dc:date>2019-03-12T01:42:45Z</dc:date>
    </item>
    <item>
      <title>Diverting some traffic from the ASA's public IP, to the DMZ</title>
      <link>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220876#M349982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the following configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,outside) tcp interface https 192.168.100.100 https netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in permit tcp host 2.2.2.2 host 1.1.1.1 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside_in permit tcp host 2.2.2.3 host 1.1.1.1 eq https&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will essentially forward the port TCP/443 from the ASA "outside" IP address to the "DMZ" IP address of 192.168.100.100. This applies to any source addresses on the public network BUT to be honest it doesnt matter as it doesnt change anything for the "DMZ" or "inside" users you might have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And additionally the ACL is already controlling which hosts can access this port TCP/443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please remember to mark the reply as the correct answer if it was. And/or rate helpfull answers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 May 2013 18:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220876#M349982</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-13T18:00:52Z</dc:date>
    </item>
    <item>
      <title>Diverting some traffic from the ASA's public IP, to the DMZ</title>
      <link>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220877#M349983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you for some reason still want to apply this NAT only for those mention public IP addresses then I think the configuration might be something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-POLICY-NAT permit tcp host 192.168.100.100 eq 443 host 2.2.2.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DMZ-POLICY-NAT permit tcp host 192.168.100.100 eq 443 host 2.2.2.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (DMZ,outside) tcp interface https access-list DMZ-POLICY-NAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 May 2013 18:04:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/diverting-some-traffic-from-the-asa-s-public-ip-to-the-dmz/m-p/2220877#M349983</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-13T18:04:32Z</dc:date>
    </item>
  </channel>
</rss>

