<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 8.4 PAT/NAT question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129334#M392695</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually did this:&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object service crashplan&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no service tcp destination eq 4242&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service tcp source eq 4242&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt;nat (inside,outside) 2 source static&amp;nbsp; backup-inside &lt;STRONG&gt;backup-outside&lt;/STRONG&gt; service crashplan crashplan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now I can telnet to port 4242 on the backup-outside public IP and get a response.&amp;nbsp; But the server itself is going out as the IP of the firewall still.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that crashplan tells some central service what IP it is using, and since it is using the IP of the interface it failes.&amp;nbsp; I then tried this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source static backup-inside backup-outside service crashplan crashplan&lt;/P&gt;&lt;P&gt;object network backup-inside&lt;/P&gt;&lt;P&gt;no nat (inside,outside) static interface service tcp 4242 4242&lt;/P&gt;&lt;P&gt;nat (inside,outside) 2 source static backup-inside interface service crashplan crashplan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now it seems I can connect to the IP of the firewall-outside interface on port 4242 and get data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems it is now working for my original option 2, how can I make it go out using a different IP from the interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Jan 2013 20:25:58 GMT</pubDate>
    <dc:creator>RussDraper</dc:creator>
    <dc:date>2013-01-16T20:25:58Z</dc:date>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129332#M392692</link>
      <description>&lt;P&gt;I am pulling my hair out trying to get this to work! I have other NAT/PAT entries for different IP addresses that work fine (DNS/WEB/SSH) but when I try to visit a website they show the IP of the outside interface, so it doesn't appear to be a static NAT.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I have a scrubbed example (using 1.2.3.x as public IPs) below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to get crashplan (uses tcp port 4242) to work from the outside, but right now it thinks its public IP is 1.2.3.6 in my example. I have basically 2 options:&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;option 1) 1-to-1 NAT using the 1.2.3.9 public IP&lt;/P&gt;&lt;P&gt;option 2) Port 4242 PAT on the interface IP of the ASA (1.2.3.6)&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The other PAT entries for server2 (ssh/web/dns) work fine, however server2 does think it has a public IP of 1.2.3.6 and not the 1.2.3.8 that it should have. I don't know why I can't just get a 1-to-1 NAT for this server.&amp;nbsp; I am just visiting &lt;A href="https://community.cisco.com/www.whatismyip.com" target="_blank"&gt;www.whatismyip.com&lt;/A&gt; to verify outgoing traffic.&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I am able to telnet to port 4242 from inside (to 172.16.1.5) and it does respond, so I know the box should work. I have the box named backup in the examples below, and I checked the ACL does show the hitcounts going up.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config items:&lt;/P&gt;&lt;P&gt; &lt;SPAN style="font-size: 10pt;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt;description outside&lt;/P&gt;&lt;P&gt;switchport access vlan 999&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt;description inside&lt;/P&gt;&lt;P&gt;switchport access vlan 101&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Vlan101&lt;/P&gt;&lt;P&gt;nameif inside&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 172.16.1.254 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan999&lt;/P&gt;&lt;P&gt;nameif outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 1.2.3.6 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;object service ssh&lt;/P&gt;&lt;P&gt;service tcp source eq ssh&lt;/P&gt;&lt;P&gt;object network server2-inside&lt;/P&gt;&lt;P&gt;host 172.16.1.1&lt;/P&gt;&lt;P&gt;object network server2-outside&lt;/P&gt;&lt;P&gt;host 1.2.3.8&lt;/P&gt;&lt;P&gt;object network server2&lt;/P&gt;&lt;P&gt;host 172.16.1.1&lt;/P&gt;&lt;P&gt;object network luigi&lt;/P&gt;&lt;P&gt;host 172.16.1.10&lt;/P&gt;&lt;P&gt;object network inside-network-vpn&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object network home-network-vpn&lt;/P&gt;&lt;P&gt;subnet 172.16.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;object service web&lt;/P&gt;&lt;P&gt;service tcp destination eq www&lt;/P&gt;&lt;P&gt;object service dns&lt;/P&gt;&lt;P&gt;service udp destination eq domain&lt;/P&gt;&lt;P&gt;object service crashplan&lt;/P&gt;&lt;P&gt;service tcp destination eq 4242&lt;/P&gt;&lt;P&gt;object network backup-inside&lt;/P&gt;&lt;P&gt;host 172.16.1.5&lt;/P&gt;&lt;P&gt;object network backup-outside&lt;/P&gt;&lt;P&gt;host 1.2.3.9&lt;/P&gt;&lt;P&gt;object-group network inside-network&lt;/P&gt;&lt;P&gt;network-object 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network remote-vpn-network&lt;/P&gt;&lt;P&gt;network-object 10.1.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;object-group network internal-vpn-allowed&lt;/P&gt;&lt;P&gt;network-object 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;network-object 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp 173.166.71.40 255.255.255.248 any eq 3389&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit icmp any any echo&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any host 172.16.1.1 eq www&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any host 172.16.1.1 eq ssh&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any host 172.16.1.1 eq https&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit udp any host 172.16.1.1 eq domain&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any object backup-inside eq 4242&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any object backup-outside eq 4242&lt;/P&gt;&lt;P&gt;access-list in_outside extended permit tcp any any eq 4242&lt;/P&gt;&lt;P&gt;access-list in_inside extended permit ip any any&lt;/P&gt;&lt;P&gt;access-list in_inside extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip 172.16.1.0 255.255.255.0 172.16.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip 172.16.1.0 255.255.255.0 10.1.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list no_nat extended permit ip 172.16.1.0 255.255.255.0 10.0.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list vpn_acl extended permit ip object inside-network-vpn object home-network-vpn&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging enable&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;mtu management 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static inside-network-vpn inside-network-vpn destination static home-network-vpn home-network-vpn&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server2-inside server2-outside service ssh ssh&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server2-inside server2-outside service web web&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static server2-inside server2-outside service dns dns&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static internal-vpn-allowed internal-vpn-allowed destination static remote-vpn-network remote-vpn-network&lt;/P&gt;&lt;P&gt;! I tried this as well, changing order of the final dynamic line also&lt;/P&gt;&lt;P&gt;! nat (inside,outside) source static backup-inside backup-outside service crashplan crashplan&lt;/P&gt;&lt;P&gt;nat (inside,outside) source dynamic any interface&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;object network server2&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 1.2.3.8 dns&lt;/P&gt;&lt;P&gt;object network luigi&lt;/P&gt;&lt;P&gt;nat (inside,outside) static 1.2.3.7&lt;/P&gt;&lt;P&gt;object network backup-inside&lt;/P&gt;&lt;P&gt;nat (inside,outside) static interface service tcp 4242 4242&lt;/P&gt;&lt;P&gt;access-group in_inside in interface inside&lt;/P&gt;&lt;P&gt;access-group in_outside in interface outside&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:48:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129332#M392692</guid>
      <dc:creator>RussDraper</dc:creator>
      <dc:date>2019-03-12T00:48:07Z</dc:date>
    </item>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129333#M392694</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Russell,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets work together on this one,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Start by changing the configuration to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object service crashplan&lt;/P&gt;&lt;P&gt;no service tcp destination eq 4242&lt;/P&gt;&lt;P&gt;service tcp source eq 4242&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then add the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 2 source static&amp;nbsp; &lt;SPAN style="font-size: 10pt;"&gt;backup-inside &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;server2-outside service &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;crashplan &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;crashplan&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Copy and paste that as requested and let me know the result &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 19:28:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129333#M392694</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T19:28:39Z</dc:date>
    </item>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129334#M392695</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your response!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I actually did this:&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object service crashplan&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no service tcp destination eq 4242&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;service tcp source eq 4242&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif; min-height: 8pt; height: 8pt;"&gt;nat (inside,outside) 2 source static&amp;nbsp; backup-inside &lt;STRONG&gt;backup-outside&lt;/STRONG&gt; service crashplan crashplan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now I can telnet to port 4242 on the backup-outside public IP and get a response.&amp;nbsp; But the server itself is going out as the IP of the firewall still.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The problem is that crashplan tells some central service what IP it is using, and since it is using the IP of the interface it failes.&amp;nbsp; I then tried this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no nat (inside,outside) source static backup-inside backup-outside service crashplan crashplan&lt;/P&gt;&lt;P&gt;object network backup-inside&lt;/P&gt;&lt;P&gt;no nat (inside,outside) static interface service tcp 4242 4242&lt;/P&gt;&lt;P&gt;nat (inside,outside) 2 source static backup-inside interface service crashplan crashplan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And now it seems I can connect to the IP of the firewall-outside interface on port 4242 and get data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it seems it is now working for my original option 2, how can I make it go out using a different IP from the interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 20:25:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129334#M392695</guid>
      <dc:creator>RussDraper</dc:creator>
      <dc:date>2013-01-16T20:25:58Z</dc:date>
    </item>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129335#M392696</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see that server on the outside using the other IP you must do a one to one translation and not a Port-forwarding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With port-forwarding only inbound packets will trigger that UN-NAT translation....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A static one to one is the solution;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) 2 source static&amp;nbsp; backup-inside &lt;STRONG style="border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;backup-outside&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Jan 2013 20:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129335#M392696</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-16T20:58:51Z</dc:date>
    </item>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129336#M392697</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I know, I had tried that before and it didn't work.&amp;nbsp; It may have been related to the Verizon FIOS ONT router problem I had before and not actually the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now for whatever reason (whether that line is there or not) it is going out the correct public IP address, whether that static line is there or not!&amp;nbsp; I tried clearing xlate and arp but that doesn't seem to reset it to before (going out interface IP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For now this solves my issue so I consider this resolved.&amp;nbsp; Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jan 2013 20:30:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129336#M392697</guid>
      <dc:creator>RussDraper</dc:creator>
      <dc:date>2013-01-18T20:30:03Z</dc:date>
    </item>
    <item>
      <title>8.4 PAT/NAT question</title>
      <link>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129337#M392698</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hello Rusell,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; My pleasure to help, please mark the question as answered so future users can learn from this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2013 15:14:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-4-pat-nat-question/m-p/2129337#M392698</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-01-20T15:14:55Z</dc:date>
    </item>
  </channel>
</rss>

