<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX 515e :Allow LAN users to access ISP assigned Public IPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124029#M393987</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using the external DNS server then this will work;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 111.111.111.10 192.168.2.4 dns netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users behind the internal interface will not be able to connect to the public IP. Unless you use the "dns doctoring" as I demonstrated&amp;nbsp; above. Only problem with that is that you MUST be using an external DNS&amp;nbsp; server, not an internal DNS server because the PIX actually changes the&amp;nbsp; dns response to give the client the natted IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, this works only if you are using a external DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 Dec 2012 23:01:15 GMT</pubDate>
    <dc:creator>julomban</dc:creator>
    <dc:date>2012-12-17T23:01:15Z</dc:date>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124028#M393986</link>
      <description>&lt;P&gt;Pix 515e &lt;/P&gt;&lt;P&gt;6.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have this situation :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A web server on our DMZ is exposed for external access from ANYWHERE like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 111.111.111.10 192.168.2.4 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;access-list DCT permit tcp any host 111.111.111.10 eq www &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an "A" record (webserver.yyy) on a public DNS for this public IP&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This works fine for external users. &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://webserver.yyy" target="_blank"&gt;http://webserver.yyy&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I have been asked to allowed our LAN user to access the same link and I CANNOT CREATE AN INTERNAL DNS RECORD TO TAKE CARE OF THIS, which means when our internal users access that link, the request goes out of OUTSIDE interface with a NAT overloaded address(111.111.111.2) that is in the same subnet as the URL is trying to resolve. Once it knows the IP address thru DNS resolution tries to comes back in thru the same Interface(OUTSIDE) to hit the web server in the DMZ and is not able to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;QUESTIONS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1- Where does the request from an internal user to hit url &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://webserver.yyy" target="_blank"&gt;http://webserver.yyy&lt;/A&gt;&lt;SPAN&gt; is dropped?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- what can be done to allow this type of connectivity in the PIX 515e device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:38:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124028#M393986</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2019-03-12T00:38:18Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124029#M393987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using the external DNS server then this will work;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 111.111.111.10 192.168.2.4 dns netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users behind the internal interface will not be able to connect to the public IP. Unless you use the "dns doctoring" as I demonstrated&amp;nbsp; above. Only problem with that is that you MUST be using an external DNS&amp;nbsp; server, not an internal DNS server because the PIX actually changes the&amp;nbsp; dns response to give the client the natted IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, this works only if you are using a external DNS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 23:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124029#M393987</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-17T23:01:15Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124030#M393988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your quick reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would it allow me to Nat one-to-one the same IP twice.? I already have this one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 111.111.111.10 192.168.2.4 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the server is in the DMZ&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Dec 2012 23:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124030#M393988</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-12-17T23:09:25Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124031#M393989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the server (192.168.2.4) is directly conencted to the DMZ network then yes you can configure a second NAT rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,DMZ) 111.111.111.10 192.168.2.4 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 13:06:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124031#M393989</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-18T13:06:14Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124032#M394000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Juan for reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you mean j&lt;SPAN style="text-decoration: underline;"&gt;ust this&lt;/SPAN&gt; extra line correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,DMZ) 111.111.111.10 192.168.2.4 &lt;STRONG&gt;dns&lt;/STRONG&gt; netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I added the "dns" argument&amp;nbsp; you have mentioned already&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;look forward to reply&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 13:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124032#M394000</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-12-18T13:25:55Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124033#M394006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct and there is no need to add the DNS keyword on the static NAT rule. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 13:43:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124033#M394006</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-18T13:43:42Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124034#M394015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Juan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I got it to work this way:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 111.111.111.10 192.168.2.4 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess that's what you meant instead of (DMZ, DMZ) which produced this error:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"DMZ 2 has same security level as DMZ 2"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is working, thanks for the pointer. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I assume it works now, because when the reply from external DNS comes back thru looking for &lt;/P&gt;&lt;P&gt;"111.111.111.10" and when it passes the inside interface, comes translated as "192.168.2.4" and the hosts in the LAN know how to find it thru routing...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 14:54:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124034#M394015</guid>
      <dc:creator>johnramz</dc:creator>
      <dc:date>2012-12-18T14:54:13Z</dc:date>
    </item>
    <item>
      <title>PIX 515e :Allow LAN users to access ISP assigned Public IPs</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124035#M394026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Perfect, my bad I thought it was on the same DMZ network. If the inside network is involved then yes, you need to have the static that you pointer. &lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Regards,&lt;/P&gt;&lt;P&gt;Juan Lombana&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Dec 2012 16:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-allow-lan-users-to-access-isp-assigned-public-ips/m-p/2124035#M394026</guid>
      <dc:creator>julomban</dc:creator>
      <dc:date>2012-12-18T16:50:58Z</dc:date>
    </item>
  </channel>
</rss>

