<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248251#M357713</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your original post and the linked post didnt mention anything about incoming traffic from the Internet/WAN/outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the actual case then you would need this version of the configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT Configuration When Using Separate Public IP address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE-ADDRESSES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;PUBLIC ip=""&gt;&lt;BR /&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 after-auto source dynamic SOURCE-ADDRESSES NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMTP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static NAT-IP service tcp 25 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="text-decoration: underline;"&gt;NAT Configuration When Using ASA "outside" Interface Public IP Address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE-ADDRESSES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 after-auto source dynamic SOURCE-ADDRESSES interface&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMTP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 25 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to make sure that you open the TCP/25 port on the ACLs on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also possible existing configurations can affect if this configuration works or not. But it can be confirmed either with testing traffic OR using the "packet-tracer" command on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example to test the incoming SMTP traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.2.3.4 12345 &lt;SEPARATE public="" ip="" or="" asa="" interface="" ip=""&gt; 25&lt;/SEPARATE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test the outgoing traffic from the hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.0.3 12345 1.2.3.4 &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.0.6 12345 1.2.3.4 &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to mark the question as answered if it was. Or ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 09 May 2013 15:32:19 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-05-09T15:32:19Z</dc:date>
    <item>
      <title>NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248244#M357706</link>
      <description>&lt;P&gt;I found a link to accomplish this on the old code but how can I get this done on 8.4.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/thread/2014532" target="_blank"&gt;https://supportforums.cisco.com/thread/2014532&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:40:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248244#M357706</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2019-03-12T01:40:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248245#M357707</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to achieve the equivalent of&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat-to-one permit ip host 192.168.1.1 any&lt;/P&gt;&lt;P&gt;access-list nat-to-one permit ip host 192.168.1.2 any&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list nat-to-one&lt;/P&gt;&lt;P&gt;global (outside) 2 83.111.111.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can do this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE-ADDRESSES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.1.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 83.111.111.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 after-auto source dynamic SOURCE-ADDRESSES NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Typo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:04:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248245#M357707</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T19:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248246#M357708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to make sure that the above NAT rule is matched before any other NAT rule on the firewall then you could use this command instead of the above one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 source dynamic SOURCE-ADDRESSES NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basicly what I did was only remove the "after-auto" parameter. With "after-auto" parameter the rule is moved to Section 3 (of 1 - 3) of the NAT rules. Without it its inserted in Section 1, which makes it one of the first NAT rules matches against connections/traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In addition to have the number "1" there means that the NAT rule is inserted at the very top of the NAT rules of Section 1. It wont remove any existing rules there. It will just be on top of them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have some NAT0 rules for VPN for these source addresses THEN I would suggest to insert it WITHOUT the line number or it might break the NAT0 rule previously configured for VPN. (Since it would be matched for traffic source from these hosts to any host on the "outside" and being line number 1 would override any other rule between "inside" and "outside")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:09:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248246#M357708</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-07T19:09:38Z</dc:date>
    </item>
    <item>
      <title>NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248247#M357709</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, I will give it a try and post back &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 May 2013 19:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248247#M357709</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-05-07T19:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248248#M357710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update, so I was able to configure it like that however next issue I ran into was that I was seeing a whole bunch of denies from the google postini servers trying to communicate with the NATed public IP, so seems like I might have to utilize additional public IP address.....?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;4&lt;/TD&gt;&lt;TD&gt;May 08 2013&lt;/TD&gt;&lt;TD&gt;20:38:53&lt;/TD&gt;&lt;TD&gt;106023&lt;/TD&gt;&lt;TD&gt;64.18.3.111&lt;/TD&gt;&lt;TD&gt;45388&lt;/TD&gt;&lt;TD&gt;1.1.1.1&lt;/TD&gt;&lt;TD&gt;25&lt;/TD&gt;&lt;TD&gt;Deny tcp src outside:64.18.3.111/45388 dst outside:1.1.1.1/25 by access-group "outside_in" [0x0, 0x0]&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I ended up doing something like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network NAT1&lt;/P&gt;&lt;P&gt; host 192.168.0.3&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 1.1.1.1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network NAT2&lt;/P&gt;&lt;P&gt; HOST 192.168.0.6&lt;/P&gt;&lt;P&gt; nat (inside,outside) static 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now both email servers inbound and outbound are using the same non RFC1918 IP for the outside world.&amp;nbsp; Is this a best practice though?&amp;nbsp; I think it would be better to have two different public IP's instead and in case of two mail servers arrange the mapping accordingly like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;mail1.yourdomain.com --&amp;gt; 192.168.0.3 --&amp;gt; 1.1.1.1 (inbound mail)&lt;/P&gt;&lt;P&gt;mail2.yourdomain.com --&amp;gt; 192.168.0.6 --&amp;gt; 1.1.1.2 (outbound mail)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 02:16:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248248#M357710</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-05-09T02:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248249#M357711</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mohammad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me see if I understand, this is for Inbound access to 2 different SMTP servers that are tasked with different dutties, if this is the case then I would go with the dedicated IP address or at least use the same IP address but with dedicated port numbers so we do not perform the sort of load-sharing that will be done here,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again if the run the same service and duttie this will work as a charm as you will be be doing load-sharing...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now going further, One is for inbound mail so I would do it like this&lt;/P&gt;&lt;P&gt;Object network SMTP_1&lt;/P&gt;&lt;P&gt;host 192.168.1.3&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;o&lt;SPAN style="font-size: 10pt;"&gt;bject service SMTP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;service tcp source eq 25 &lt;SPAN style="font-size: 10pt;"&gt;NAT1 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;object network SMTP_OUT&lt;/P&gt;&lt;P&gt;host 1.1.1.1&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;nat (inside,outside) 1 source static SMTP_1 SMTP_OUT service SMTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network SMTP_2&lt;/P&gt;&lt;P&gt;host 192.168.1.6&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;nat (inside,outside) 2 source dynamic SMTP_2 SMTP_OUT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this we will ensure that the port 25 will be always used by the Inbound traffic to server 1....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know how it goes,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio Carvajal &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 04:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248249#M357711</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-09T04:25:43Z</dc:date>
    </item>
    <item>
      <title>NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248250#M357712</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the email, so here is what the servers are doing....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.0.3 --&amp;gt; E Mail comes in to this server&lt;/P&gt;&lt;P&gt;192.168.0.6 --&amp;gt; Sends E Mail out this is Ciscos Iron Port device.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 15:23:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248250#M357712</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-05-09T15:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248251#M357713</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your original post and the linked post didnt mention anything about incoming traffic from the Internet/WAN/outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is the actual case then you would need this version of the configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT Configuration When Using Separate Public IP address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE-ADDRESSES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host &lt;PUBLIC ip=""&gt;&lt;BR /&gt;&lt;/PUBLIC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 after-auto source dynamic SOURCE-ADDRESSES NAT-IP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMTP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static NAT-IP service tcp 25 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="text-decoration: underline;"&gt;NAT Configuration When Using ASA "outside" Interface Public IP Address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network SOURCE-ADDRESSES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside,outside) 1 after-auto source dynamic SOURCE-ADDRESSES interface&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network SMTP-SERVER&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static interface service tcp 25 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you will have to make sure that you open the TCP/25 port on the ACLs on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also possible existing configurations can affect if this configuration works or not. But it can be confirmed either with testing traffic OR using the "packet-tracer" command on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example to test the incoming SMTP traffic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input outside tcp 1.2.3.4 12345 &lt;SEPARATE public="" ip="" or="" asa="" interface="" ip=""&gt; 25&lt;/SEPARATE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test the outgoing traffic from the hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.0.3 12345 1.2.3.4 &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;packet-tracer input inside tcp 192.168.0.6 12345 1.2.3.4 &lt;DESTINATION port=""&gt;&lt;/DESTINATION&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to mark the question as answered if it was. Or ask more if needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 15:32:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248251#M357713</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-09T15:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248252#M357714</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the reply and my apologies for not elaborating more.&amp;nbsp; Yes that is what I was trying to do.&amp;nbsp; I did what you suggested but there is an issue with that configuration because we have a PAT setup so if I do after auto then the NAT rule comes after that PAT for all the outbound internet traffic and it does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remove after auto and just use 1 then it puts it all the way on the top and then the incoming mail does not reach us.&amp;nbsp; So here is what I did:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object-group network Email_InOut&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; network-object host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 1.1.1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: line-through;"&gt;nat (inside,outside) after-auto 1 source dynamic Email_InOut obj-1.1.1.1&lt;/SPAN&gt; (did not use this)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network Inbound_Email&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.3&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 1.1.1.1 service tcp 25 25&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network IronPort&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; host 192.168.0.6&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; nat (inside,outside) static 1.1.1.1&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 16:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248252#M357714</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-05-09T16:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248253#M357715</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mohammad,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly, the configuration I sent will do it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 16:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248253#M357715</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-05-09T16:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248254#M357716</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah, since we dont see the full NAT configuration we wont know how the current existing configuration affects what we are trying to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why I personally suggest configuring Network Object NAT for the Static PAT / Port Forward AND Twice NAT/Manual NAT type of configuration for the Dynamic PAT is how I personally order the NAT rules in my configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Static PAT and Static NAT always as Network Object NAT (Section 2)&lt;/LI&gt;&lt;LI&gt;Default Dynamic PAT/NAT always as Twice NAT / Manual NAT (Usually Section 3 in special cases Section 1)&lt;/LI&gt;&lt;LI&gt;Special NAT setups like NAT0 and Policy NAT/PAT type configurations as Twice NAT / Manual NAT (Section 1)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally Static PAT and Static NAT can be done in the Section 1 also but I prefer keeping strict roles for every Section and so far it has worked for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wrote a NAT 8.3+ Document which pretty much states the way I configure and section the different type of configurations. Have a look if you want. Will probably add a lot more information to it later&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-31116" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-31116&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To me it seems the NAT configuration ordering/sectioning is causing the problems why the suggest configurations dont work. The existing configurations is set up so that it overrides the configurations suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Glad to hear you got it working though &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 16:43:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248254#M357716</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-09T16:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Two Internal IP's to one external IP in Cisco ASA 8.4</title>
      <link>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248255#M357717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you are right the existing NAT configuration was causing the issue so I had to modify it a bit but it seems to be working.&amp;nbsp; Thank you for the document link, good read.&amp;nbsp; I have saved it &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 May 2013 17:00:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-two-internal-ip-s-to-one-external-ip-in-cisco-asa-8-4/m-p/2248255#M357717</guid>
      <dc:creator>ALIAOF_</dc:creator>
      <dc:date>2013-05-09T17:00:15Z</dc:date>
    </item>
  </channel>
</rss>

