<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA 8.4 NAT subnets to 1 IP Address in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090389#M393084</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct. All users in network 10.10.10.0/24 would be sharing the IP address configured under object PUBLIC as their PAT address towards Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 13 Jan 2013 12:41:28 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-13T12:41:28Z</dc:date>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090384#M393074</link>
      <description>&lt;P&gt;Hello guys,&lt;BR /&gt;I'm wondering if this is possible on an ASA.&lt;BR /&gt;I know it is possible on a router (i think)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently have a Outside interface with public address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface GigabitEthernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.192 standby 10.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have one to one NATing going on from inside to outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g:&lt;BR /&gt;object network test&lt;BR /&gt;nat (inside,outside) static 10.1.1.3 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proposal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;new interface:&lt;/P&gt;&lt;P&gt;int g1/1&lt;/P&gt;&lt;P&gt;nameif inside2&lt;/P&gt;&lt;P&gt;ip address 172.16.1.1 255.255.255.0 standby 172.16.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network test2_range&lt;/P&gt;&lt;P&gt;range 172.16.1.3 172.16.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network test2_range&lt;/P&gt;&lt;P&gt;nat (inside2,outside) static 10.1.1.4 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will this work? i.e IP Address range from 172.16.1.3 - 254 will NAT to 10.1.1.4?&lt;BR /&gt;I want the subnet to share 1 IP Address. is this possible?&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:45:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090384#M393074</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2019-03-12T00:45:33Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090385#M393076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat that you are trying to do is only one to one nat, and it cannot be one to many. You cannot use static command for it. If it is to be one to many then you would have to use dynamic keyword for it, which would be your port address translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 01:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090385#M393076</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2013-01-11T01:34:22Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090386#M393077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in this example I would use:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network test2_range&lt;/P&gt;&lt;P&gt;subnet 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside2,outside) dynamic 10.1.1.4 dns&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 13:19:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090386#M393077</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-11T13:19:28Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090387#M393079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest the following configuration format for Default PAT configurations&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will make them NAT rules that are matched for traffic as the very last ones which they usually should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The names and IPs/networks used below are just examples. Object/Object-group names are best configured with more descriptive names.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Using the "outside" interface for PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source Networks for PAT&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Using a separate public IP address for PAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P&gt; description Source Networks for PAT&lt;/P&gt;&lt;P&gt; network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network PUBLIC&lt;/P&gt;&lt;P&gt; host x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE PUBLIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Jan 2013 13:25:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090387#M393079</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-11T13:25:36Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090388#M393082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;BR /&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I use your example no2 - Using seperate public IP address for PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the outcome would be any address in the /24 range will be PATted to the configured PUBLIC IP Address host?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object-group network DEFAULT-PAT-SOURCE&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;description Source Networks for PAT&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;network-object 10.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;object network PUBLIC&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;host 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;nat (inside,outside) after-auto source dynamic DEFAULT-PAT-SOURCE PUBLIC&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g Outcome: &lt;BR /&gt;10.10.10.55 -&amp;gt; 1.2.3.4:525252&lt;BR /&gt;10.10.10.213-&amp;gt; 1.2.3.4:35865&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this correct in understanding this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 12:34:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090388#M393082</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-13T12:34:03Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090389#M393084</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, that is correct. All users in network 10.10.10.0/24 would be sharing the IP address configured under object PUBLIC as their PAT address towards Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 12:41:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090389#M393084</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-13T12:41:28Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090390#M393087</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jouni,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Awesome Thanks for your reply, I will let you know how the change goes later on!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 12:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090390#M393087</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-13T12:44:19Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090391#M393089</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/people/JDMJeffy84" id="jive-50600816727208811100603"&gt;JDMJeffy84&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe you would greatly benefit from my upcoming webcast. Details below. I will be disucssing the old and new NAT syntax.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://community.cisco.com/community/netpro/expert-corner"&gt;https://supportforums.cisco.com/community/netpro/expert-corner#view=webcasts&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Upcoming Live Webcast in English: January 15, 2013&lt;/P&gt;&lt;P&gt;Troubleshooting ASA and Firewall Service Modules&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Register today for this Cisco Support Community live webcast.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Kureli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Jan 2013 15:20:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090391#M393089</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2013-01-13T15:20:11Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090392#M393091</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Worked all fine Jouni! But I have an issue and I have tried ways fixing this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two inside LANs&lt;/P&gt;&lt;P&gt;192.168.50.x (VLAN 50) &amp;amp; 192.168.100.x (VLAN 100)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN 50 has PAT 192.168.50.0/24 to 1.2.3.4&lt;/P&gt;&lt;P&gt;VLAN 100 has 1 to 1 NATS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They hit ASA and NAT on outside interface&lt;BR /&gt;int g0/0&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip add 1.2.3.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My issue is I have a webserver sitting in VLAN 100 in DMZ (192.168.100.5 -&amp;gt; NAT 1.2.3.50)&lt;BR /&gt;Traffic from VLAN 50 will traverse internal to ASA and out the Internet and into OUTSIDE interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this bit the ASA sends travel back to VLAN 50 (used packet tracer and looked at syslog)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understand how ASA process packets:&lt;BR /&gt;&lt;SPAN&gt;Client on VLAN 50 - 192.168.50.200 - &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://1.2.3.50"&gt;http://1.2.3.50&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This will go to ASA and PAT to Outside Interface - 192.168.50.200 -&amp;gt; 1.2.3.4:50501&lt;/P&gt;&lt;P&gt;Go internet and loop back to Outside interface&lt;/P&gt;&lt;P&gt;NAT back to 192.168.50.200&lt;/P&gt;&lt;P&gt;But I cannot access the webserver - Page timeout on web browser&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried putting rules on Outside interface but no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know it's a wierd setup&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 21:13:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090392#M393091</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-14T21:13:49Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090393#M393092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if I understood you correctly&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;You now have a PAT for your other Vlan towards "outside"&lt;/LI&gt;&lt;LI&gt;You now have 1:1 Static NATs for servers from other Vlan towards "outside"&lt;/LI&gt;&lt;LI&gt;You want to access the Web server(s) from the other Vlan but arent succeeding in it&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a pretty common problem people run into&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since your host attempting the Web server connection using the public/NAT IP address is behind the ASA, it CANT use the public IP address. You should use the local address of the Web server rather than the Public NAT IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this is not possible I guess you could try to do the 1:1 Static NAT also from the Web Server Vlan to the other Vlan and this way the Web server would also be visible to the other Vlan with the public IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't guarantee this will work but can't think of anything else at the moment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 21:27:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090393#M393092</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-14T21:27:17Z</dc:date>
    </item>
    <item>
      <title>ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090394#M393095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that's correct Jouni. 1 Vlan is PAT and other VLAN is 1:1 static NAT.&lt;/P&gt;&lt;P&gt;And PAT vlan is required to access webserver in Static NAT vlan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I thought of doing that but they require using DNS name.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So are you saying NAT inside to inside? I've enabled access to same security levels but no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tricky one&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 22:02:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090394#M393095</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-14T22:02:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090395#M393096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean you could try doing the 1:1 Static NAT of the Web server also between the 2 Vlans&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would have the Static NAT configured twice&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Between server Vlan and outside&lt;/LI&gt;&lt;LI&gt;Between server Vlan and user Vlan (for lack of a better term)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This could possibly be done with a single Static NAT command by changing the destination interface of the NAT with "any"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network STATIC&lt;/P&gt;&lt;P&gt; host 10.10.10.10&lt;/P&gt;&lt;P&gt; nat (inside,&lt;STRONG&gt;any&lt;/STRONG&gt;) static 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above should do a 1:1 Static NAT for the LAN host towards any other ASA interface. So in your towards "outside" and also the other Vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But as I said I'm not sure if it will work. I haven't had to do similiar NATs that often.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 22:16:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090395#M393096</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-14T22:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 8.4 NAT subnets to 1 IP Address</title>
      <link>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090396#M393097</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will give that a try.&lt;BR /&gt;Do you know what is the order of traffic flow?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is it Routing/ NAT/ ACL?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jan 2013 23:29:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-8-4-nat-subnets-to-1-ip-address/m-p/2090396#M393097</guid>
      <dc:creator>JDMJeffy84</dc:creator>
      <dc:date>2013-01-14T23:29:54Z</dc:date>
    </item>
  </channel>
</rss>

