<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT on ASA 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087406#M392105</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for your reply Jim.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im using asa911-k8.bin as the OS and looking to only really translate http traffic. Thats the only traffic which should be coming in anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Jan 2013 15:54:37 GMT</pubDate>
    <dc:creator>NES IT</dc:creator>
    <dc:date>2013-01-28T15:54:37Z</dc:date>
    <item>
      <title>NAT on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087404#M392096</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im a NAT newbie so any help would be greatly appreciated, but Im looking to NAT an internal address to the outside world. So, I have a remote host that I wish to connect to an internal host, but on a pseudo address. So I need the firewall to accept connections to address x.x.x.x and translate them to y.y.y.y (real internal address). I do not want the remote host to see the real internal address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ive read the various papers on NAt but am not sure which method I need to use. Also, my access lists would need to reference the real or natted address? Im not sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for any help.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dan&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:53:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087404#M392096</guid>
      <dc:creator>NES IT</dc:creator>
      <dc:date>2019-03-12T00:53:07Z</dc:date>
    </item>
    <item>
      <title>NAT on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087405#M392100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need a static NAT rule to allow inbound connections.&amp;nbsp; The whole NAT infrastructure changed at firmware 8.3, so &amp;lt;=8.2 you use the mapped addresses in the rules, and &amp;gt;=8.3 you use the real addresses.&amp;nbsp; Where real is what the inside host is sending and receiving on, and mapped is what the firewall is talking to the outside.&amp;nbsp; If you can supply more details about which ASA software version you are implementing and whether you are forwarding all ports and protocols or just some few TCP ports, we can be more specific with our help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 15:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087405#M392100</guid>
      <dc:creator>WSLH OIS NOC - OIS Infrastructure</dc:creator>
      <dc:date>2013-01-28T15:49:56Z</dc:date>
    </item>
    <item>
      <title>NAT on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087406#M392105</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thank you for your reply Jim.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im using asa911-k8.bin as the OS and looking to only really translate http traffic. Thats the only traffic which should be coming in anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Jan 2013 15:54:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087406#M392105</guid>
      <dc:creator>NES IT</dc:creator>
      <dc:date>2013-01-28T15:54:37Z</dc:date>
    </item>
    <item>
      <title>NAT on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087407#M392111</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Was that enough info Jim?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 14:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087407#M392111</guid>
      <dc:creator>NES IT</dc:creator>
      <dc:date>2013-01-29T14:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA 5520</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087408#M392118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Almost enough information.&amp;nbsp; It would help to know how many IPv4 addresses you have on the outside of the firewall, and how you plan to use them.&amp;nbsp; For a scenario with:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;* ASA software 9.1(1)&lt;/P&gt;&lt;P&gt;* 1 IPv4 address on the outside interface of the firewall, say 203.0.113.2&lt;/P&gt;&lt;P&gt;* inbound traffice to port 80 redirected to a particular server, say 172.16.1.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The video referenced in this forum thread might be helpful:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/docs/DOC-12324" rel="nofollow"&gt;https://supportforums.cisco.com/docs/DOC-12324&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The relevent command line documentation is at:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/nat_overview.html" rel="nofollow"&gt;http://www.cisco.com/en/US/docs/security/asa/asa91/configuration/firewall/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The configuration you want in this case would be something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network web-nat-8&lt;/P&gt;&lt;P&gt;host 172.16.1.8&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 172.16.1.8 203.0.113.2 service tcp 80 80 no-proxy-arp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL's now use the "real" addresses, so 172.16.1.8 in your rules, e.g.&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-INGRESS-01 permit tcp any4 172.16.1.8 port 80&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-INGRESS-01 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- Jim Leinweber, WI state lab of Hygiene&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 29 Jan 2013 16:59:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa-5520/m-p/2087408#M392118</guid>
      <dc:creator>WSLH OIS NOC - OIS Infrastructure</dc:creator>
      <dc:date>2013-01-29T16:59:17Z</dc:date>
    </item>
  </channel>
</rss>

