<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static NAT Command Clarification in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995998#M434578</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.15 192.168.50.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tells the firewall to not nat traffic going between the two interfaces. I have used this in the past between inside and dmz interfaces, but never between an internal interface and the outside interface.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it would be blocking a normal 1-1 nat static nat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Jun 2012 15:21:25 GMT</pubDate>
    <dc:creator>deyster94</dc:creator>
    <dc:date>2012-06-08T15:21:25Z</dc:date>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995996#M434574</link>
      <description>&lt;P&gt;Hi all :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From one of existing configuration file, I found there is static NAT command as below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;whereby the security level in the DMZ is 50 and the subnet is 192.168.50.0/24,while security level at outside is 20 and the subnet is 192.168.20.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command actually not causing any hiding of the DMZ IP address, right? I ping from outside to one valid IP of the DMZ network, for example 192.168.50.5, it still can ping.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not understand what is the purpose of this command line. Is it a wrong command line?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then try a standard way of static NAT as below :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.15 192.168.50.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is for the purpose of hiding 192.168.50.5 at DMZ from outside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With the previous command line that is "static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.255" still around, this DMZ IP of 192.168.50.5 is not hide. I tried to delete away the command "static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.255", the hiding of 192.168.50.5 is OK because it cannot be ping from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can anybody confirmed that this command line "static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.255" servered no purpose and actually it is causing problem on other valid static NAT command?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995996#M434574</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2019-03-11T23:16:57Z</dc:date>
    </item>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995997#M434576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have to cirrect the error of the netmask:&lt;/P&gt;&lt;P&gt;It is not 255.255.255.255 and it is 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the command is "static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.250" and not "static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.255".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and hipe there is answer for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 05:39:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995997#M434576</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-06-08T05:39:05Z</dc:date>
    </item>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995998#M434578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.15 192.168.50.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tells the firewall to not nat traffic going between the two interfaces. I have used this in the past between inside and dmz interfaces, but never between an internal interface and the outside interface.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, it would be blocking a normal 1-1 nat static nat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2012 15:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995998#M434578</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2012-06-08T15:21:25Z</dc:date>
    </item>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995999#M434580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Deyster94 :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry that the netmask is not 255.255.255.255 and it is 255.255.255.0. If it is 255.255.255.0, is it same also not nat traffic going between the two interfaces and block also a normal 1-1 nat static nat?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 09:56:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1995999#M434580</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-06-09T09:56:05Z</dc:date>
    </item>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1996000#M434582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok let me explain,&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.50.0 192.168.50.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command is also called "self static", this means if a source 192.168.50.x in subnet DMZ goes to outside world the source IP should be preserve (source ip would remain as 192.168.50.x). &lt;/P&gt;&lt;P&gt;Also if someone from outside world 192.168.20.x tries to access a machine in DMZ 192.168.50.x then it will access the machine using its real IP and not any natted IP. The above static will give you the same results as&lt;/P&gt;&lt;P&gt;nat (dmz) 0 access-list nat_0_acl&lt;/P&gt;&lt;P&gt;access-list nat_0_acl permit ip 192.168.50.0 255.255.255.0 192.168.20.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets come down to another static now,&lt;/P&gt;&lt;P&gt;static (dmz,outside) 192.168.20.15 192.168.50.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above means if a source outside sends a request on 192.168.20.15, firewall will translate it to 192.168.50.5 on DMZ. basically you are hiding the machine xxx.50.5 behind xx.20.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate if this helps !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Jun 2012 18:23:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1996000#M434582</guid>
      <dc:creator>abinjola</dc:creator>
      <dc:date>2012-06-09T18:23:32Z</dc:date>
    </item>
    <item>
      <title>Static NAT Command Clarification</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1996001#M434583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Abinjola and Deyster94 :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks to both of you to explain the command line.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am now clear the purpose of this command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;best regards,&lt;/P&gt;&lt;P&gt;tangsuan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 10 Jun 2012 02:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-command-clarification/m-p/1996001#M434583</guid>
      <dc:creator>Tang-Suan Tan</dc:creator>
      <dc:date>2012-06-10T02:28:00Z</dc:date>
    </item>
  </channel>
</rss>

