<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Conditional Nat on an ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850495#M429739</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indeed, that was my 3rd prefered solution.&lt;/P&gt;&lt;P&gt;My seccond prefered is the one I have setup now; I had a spare F5 LB lying around and put it to use &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The most prefered one is of course to have it all cleanly configured in one device; The asa. Cisco has got to have a way to do this...&lt;/P&gt;&lt;P&gt;Checkpoint an juniper all can do this type of packet-crafting, perhaps I'm just overlooking something obvious.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 29 Dec 2007 01:56:58 GMT</pubDate>
    <dc:creator>bart.mollemans</dc:creator>
    <dc:date>2007-12-29T01:56:58Z</dc:date>
    <item>
      <title>Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850488#M429722</link>
      <description>&lt;P&gt;A practical dillemma led me here:&lt;/P&gt;&lt;P&gt;A customer has several remote sites wich each have a pc that connects to a virtual IP in the HQ lan, which in term is natted to a real HQ server IP on the asa. Now the need has risen to nat a specific group of remote sites to a diferent real HQ server IP...&lt;/P&gt;&lt;P&gt;My current work-arround is a hardware loadbalancer, but imho there should be a nice/clean cisco (nat) alternative...no?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a viasual clarification, please see my attached visio.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for any hints or suggestions you might have,&lt;/P&gt;&lt;P&gt;Bart&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:50:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850488#M429722</guid>
      <dc:creator>bart.mollemans</dc:creator>
      <dc:date>2020-02-21T09:50:38Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850489#M429724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bart-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can the remote offices that need to point to the new server, point to a new NAT address or do they have to point to 4.4.4.3?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Dec 2007 20:40:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850489#M429724</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-12-27T20:40:36Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850490#M429726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This was my first question too, but the devices at the remote sites are in fact a type of apliances that require (costly) 3rd party intervention if we need to change a system setting plus there are over 600 remote sites... so no ...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2007 07:24:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850490#M429726</guid>
      <dc:creator>bart.mollemans</dc:creator>
      <dc:date>2007-12-28T07:24:29Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850491#M429729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;create object groups to more easily manage which remote sites need the server nat'ed to which IP - then you can use the same object groups to configure your standard interface acl's.&lt;/P&gt;&lt;P&gt;In this example, 192.168.1.1 is the internal IP of the server.  the 31.x.x.x addresses are the nat'ed IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat1_acl permit ip host 192.168.1.1 object-group remote_sites_A&lt;/P&gt;&lt;P&gt;access-list nat2_acl permit ip host 192.168.1.1 object-group remote_sites_B&lt;/P&gt;&lt;P&gt;static (inside,outside) 31.1.1.1 access-list nat1_acl&lt;/P&gt;&lt;P&gt;static (inside,outside) 31.1.1.2 access-list nat2_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2007 15:23:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850491#M429729</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-12-28T15:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850492#M429732</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanx for the reply but this does not tackle the issue at hand.&lt;/P&gt;&lt;P&gt;I have 2 internal servers (a,b) who need to be reached on a virtual ip c.&lt;/P&gt;&lt;P&gt;If Ip address group X connecting to address c, the natting should lead them to internal server a. Addtionally when addres group y connects to address c the asa natting should lead them to internal server b...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2007 15:33:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850492#M429732</guid>
      <dc:creator>bart.mollemans</dc:creator>
      <dc:date>2007-12-28T15:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850493#M429734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;my bad.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how about:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nat1_acl permit ip host 192.168.1.a object-group X&lt;/P&gt;&lt;P&gt;access-list nat2_acl permit ip host 192.168.1.b object-group Y&lt;/P&gt;&lt;P&gt;static (inside,outside) 31.1.1.1 access-list nat1_acl&lt;/P&gt;&lt;P&gt;static (inside,outside) 31.1.1.1 access-list nat2_acl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2007 15:43:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850493#M429734</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-12-28T15:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850494#M429737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there a gateway device at each remote office that could NAT? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Dec 2007 18:37:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850494#M429737</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-12-28T18:37:51Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850495#M429739</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Indeed, that was my 3rd prefered solution.&lt;/P&gt;&lt;P&gt;My seccond prefered is the one I have setup now; I had a spare F5 LB lying around and put it to use &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The most prefered one is of course to have it all cleanly configured in one device; The asa. Cisco has got to have a way to do this...&lt;/P&gt;&lt;P&gt;Checkpoint an juniper all can do this type of packet-crafting, perhaps I'm just overlooking something obvious.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Dec 2007 01:56:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850495#M429739</guid>
      <dc:creator>bart.mollemans</dc:creator>
      <dc:date>2007-12-29T01:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Nat on an ASA</title>
      <link>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850496#M429740</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;perhaps idd... I was just staring myself blind at the asdm gui. In commandline this makes perfect sense. So in effect we have 2 static policy Nat's with for the Original source 192.168.1.a(192.168.1.b for 2nd packet), original destination object group siteA(siteB for 2nd packet). And on the outside interface a translated address of 31.1.1.1. thx I'll try and let you know Srue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 29 Dec 2007 02:25:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/conditional-nat-on-an-asa/m-p/850496#M429740</guid>
      <dc:creator>bart.mollemans</dc:creator>
      <dc:date>2007-12-29T02:25:47Z</dc:date>
    </item>
  </channel>
</rss>

