<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: A basic NAT question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015809#M402975</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you configure NAT translation, normally you look at it from the inside host perspective as that is the source to be NATed and inside has higher security level than outside.&lt;/P&gt;&lt;P&gt;Static NAT statement is bi-directional, so when you configure it with "nat (inside,outside)", it works for the other direction too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Oct 2012 19:59:59 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2012-10-11T19:59:59Z</dc:date>
    <item>
      <title>A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015804#M402960</link>
      <description>&lt;P&gt;I would like to ask a basic NAT question, please find the attached diagram, the firewall has 2 interfaces: Inside and outside. we have a web server hosted inside the firewall offerring web services to Internet users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The server private IP address is 192.168.1.10 and a Public IP: 2.2.2.2;&lt;/P&gt;&lt;P&gt;The firewall only allow certain IP range from Internet (3.3.3.0/24)to access the server via TCP port 80;&lt;/P&gt;&lt;P&gt;Firewall need to do NAT to translate the 2.2.2.2 to 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please find my configuration:&lt;/P&gt;&lt;P&gt;object network InsidePrivateIP&lt;/P&gt;&lt;P&gt; host 192.168.1.10&lt;/P&gt;&lt;P&gt;object network InsidePublicIP&lt;/P&gt;&lt;P&gt; host 2.2.2.2&lt;/P&gt;&lt;P&gt;object network OutsideNetwork&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;subnet 3.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static OutsideNetwork OutsideNetwork destination static InsidePublicIP InsidePrivateIP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to know Whether my (outside, inside) sequence is correct or not, because the server is accepting the incoming HTTP request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And can I use a simpler way to implement it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network InsidePublicIP&lt;/P&gt;&lt;P&gt; host 2.2.2.2&lt;/P&gt;&lt;P&gt;nat (outside,inside) static 192.168.1.10&lt;/P&gt;&lt;P&gt;and create the ACL to allow the traffic:&lt;/P&gt;&lt;P&gt;source IP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;3.3.3.0/24&lt;/P&gt;&lt;P&gt;source port:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;any&lt;/P&gt;&lt;P&gt;destination IP:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;2.2.2.2&lt;/P&gt;&lt;P&gt;destination port:80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance, I will rate your reply.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015804#M402960</guid>
      <dc:creator>bindong.shi</dc:creator>
      <dc:date>2019-03-12T00:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015805#M402962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your simpler way is the correct way but it should have been as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network serverIP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; host 192.168.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; nat (inside,outside) &lt;STRONG&gt;static &lt;/STRONG&gt;2.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside-acl permit tcp 3.3.3.0 255.255.255.0 object serverIP eq 80&lt;/P&gt;&lt;P&gt;access-group outside-acl in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Jennifer Halim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 15:13:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015805#M402962</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-11T15:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015806#M402965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your prompt reply.&lt;/P&gt;&lt;P&gt;Can you please let me know where is the problem for first configuration?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 15:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015806#M402965</guid>
      <dc:creator>bindong.shi</dc:creator>
      <dc:date>2012-10-11T15:23:41Z</dc:date>
    </item>
    <item>
      <title>A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015807#M402971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the first configuration, you still need to configure the access-list as well, as NAT is not enough to restrict traffic from specific subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the format should have been as follows:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static InsidePrivateIP InsidePublicIP destination static OutsideNetwork OutsideNetwork&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why make it so complicated when you can configure it the simpler way, right? &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 15:30:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015807#M402971</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-11T15:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015808#M402974</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes, you are right, the simpler, the better.&lt;/P&gt;&lt;P&gt;andshouldn't be "nat (outside,inside)"? since the traffic is incoming traffic, that is also the part i am confused:&lt;/P&gt;&lt;P&gt;accorrding cisco document, it is "nat (inside,outside)", but when i configure the FW using GUI, I select the source (outside) interface and destinatio interface (inside), the command line is "nat (outside,inside)".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 15:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015808#M402974</guid>
      <dc:creator>bindong.shi</dc:creator>
      <dc:date>2012-10-11T15:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: A basic NAT question</title>
      <link>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015809#M402975</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you configure NAT translation, normally you look at it from the inside host perspective as that is the source to be NATed and inside has higher security level than outside.&lt;/P&gt;&lt;P&gt;Static NAT statement is bi-directional, so when you configure it with "nat (inside,outside)", it works for the other direction too.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Oct 2012 19:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/a-basic-nat-question/m-p/2015809#M402975</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2012-10-11T19:59:59Z</dc:date>
    </item>
  </channel>
</rss>

