<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5520 / NAT Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444628#M428114</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then this is a NAT limitation with Cisco.  Checkpoint does not have this limitation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 16 Jan 2006 15:13:21 GMT</pubDate>
    <dc:creator>slade</dc:creator>
    <dc:date>2006-01-16T15:13:21Z</dc:date>
    <item>
      <title>ASA 5520 / NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444626#M428107</link>
      <description>&lt;P&gt;Hello, is it possible to have the ASA 'listen' on two public IP addresses, but connections initiated TO either of those public addresses are directed to a SINGLE host behind the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the connections would all be going to a single service (telnet), not multiple services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:38:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444626#M428107</guid>
      <dc:creator>slade</dc:creator>
      <dc:date>2020-02-21T08:38:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 / NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444627#M428110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;it's not feasible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 23 192.168.1.1 23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.2 23 192.168.1.1 23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;imagine a telnet session is initiated from the outside. asa receives the packet destined for 1.1.1.1 with tcp port 23. asa then looks up the static and forwords the packet to 192.168.1.1. now, the return traffic from 192.168.1.1 received by asa. asa will be confused because asa is not able to determine which static should be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;further, you may configure the telnet server to listen on multiple port. by default, telnet server listen to tcp port 23. providing the telnet server listen to both tcp port 23 and tcp port 10000, then the issue should be resolved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. static (inside,outside) tcp 1.1.1.1 23 192.168.1.1 23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.2 10000 192.168.1.1 10000 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then the user from outside would need to do "telnet 1.1.1.2 10000" instead of "telnet 1.1.1.2".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2006 00:08:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444627#M428110</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-16T00:08:50Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 / NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444628#M428114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then this is a NAT limitation with Cisco.  Checkpoint does not have this limitation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jan 2006 15:13:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444628#M428114</guid>
      <dc:creator>slade</dc:creator>
      <dc:date>2006-01-16T15:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 / NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444629#M428118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i believe it's feasible if the ip of the other end is known, then you can configure policy nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;otherwise i'm not too sure how the firewall can make a decision on which ip should be used for nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for more detail in configuring policy nat:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a008052564b.html#wp1042553" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_guide_chapter09186a008052564b.html#wp1042553&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jan 2006 02:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444629#M428118</guid>
      <dc:creator>jackko</dc:creator>
      <dc:date>2006-01-17T02:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5520 / NAT Problem</title>
      <link>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444630#M428122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, it is possible through policy NAT.  However, you can't combine one static and then add a policy NAT.  There will still be the 'overlapping' address problem.  The solution is to create two policy nats. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My original post was regarding unknown (any) source hosts coming inbound to a host behind the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Today we were hit with another similar problem only this time we knew all the host addresses (sources inbound from the public side).  Policy NAT did work in this case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are going to test using 'any' as the source inbound to see if we can resolve the other issue.  I think as long as there is not an existing static NAT that would conflict, it is possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks much.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jan 2006 03:32:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5520-nat-problem/m-p/444630#M428122</guid>
      <dc:creator>slade</dc:creator>
      <dc:date>2006-01-18T03:32:50Z</dc:date>
    </item>
  </channel>
</rss>

