<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DMZ Nat question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956953#M435775</link>
    <description>&lt;P&gt;I have a setup like this (not real addresses--just testing here)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 12.200.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.100.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 12.2.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now internal clients access the dmz, and machines in the dmz access the internal clients. Therefore, we have access-lists like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 12.2.200.10 host 10.100.1.9 eq 7205&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the internal host is also being natted to an address within the dmz, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 12.2.200.101 10.100.1.9 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So how is the host on the dmz (12.2.200.10) accessing the internal host (10.100.1.9) using its private address? I thought ingress access lists always need to point to the public (global) address, not the private (that is the purpose).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is working, I just don't know how&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 23:11:55 GMT</pubDate>
    <dc:creator>Colin Higgins</dc:creator>
    <dc:date>2019-03-11T23:11:55Z</dc:date>
    <item>
      <title>DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956953#M435775</link>
      <description>&lt;P&gt;I have a setup like this (not real addresses--just testing here)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 12.200.200.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 10.100.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif dmz&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 12.2.200.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now internal clients access the dmz, and machines in the dmz access the internal clients. Therefore, we have access-lists like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list dmz extended permit tcp host 12.2.200.10 host 10.100.1.9 eq 7205&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but the internal host is also being natted to an address within the dmz, like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 12.2.200.101 10.100.1.9 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So how is the host on the dmz (12.2.200.10) accessing the internal host (10.100.1.9) using its private address? I thought ingress access lists always need to point to the public (global) address, not the private (that is the purpose).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is working, I just don't know how&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:11:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956953#M435775</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2019-03-11T23:11:55Z</dc:date>
    </item>
    <item>
      <title>DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956954#M435776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static statementy that you have is always for bi-dircetional traffic, which means it is both for the traffic initiated from inside to dmz and for dmz to inside, that's y you are abe to ping both ways. The private ip is staticay now binded to your public ip, so no matter which te tarffic is intiated, it would always be binded to that public ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 19:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956954#M435776</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-25T19:06:58Z</dc:date>
    </item>
    <item>
      <title>DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956955#M435777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Varun:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Teachnically speaking, shouldn't the host on the dmz (12.2.200.10) only see the internal host (10.100.1.9) at its natted address (12.2.200.101)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ther is also a general NAT statement&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the dmz host 12.2.200.10 tries to open a session on port 7205 to inside host 10.100.1.9, it will use the general NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but if the inside host has a static NAT to a dmz address to 12.2.200.101, the access list will have to reference that public address, and the general NAT will not be used yes?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV id="ynano_hooks_page" style="display: none;"&gt;&lt;DIV id="callsToClient_page" style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV id="eventsFromClient_page" style="display: none;"&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV id="ynano_hooks_page" style="display: none;"&gt;&lt;DIV id="callsToClient_page" style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV id="eventsFromClient_page" style="display: none;"&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 19:21:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956955#M435777</guid>
      <dc:creator>Colin Higgins</dc:creator>
      <dc:date>2012-05-25T19:21:28Z</dc:date>
    </item>
    <item>
      <title>DMZ Nat question</title>
      <link>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956956#M435778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, The order of operation of your statics would be top to bottom, when the inside host access teh dmz, it doesnt need an ACL since higher to lower is alowed by default, then next it would check the static and if your general static is above the specific nat, then always general would be hit and packets would go on real ip's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May be I am wrong in assuming, but if you can share the output of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run static&lt;/P&gt;&lt;P&gt;show run nat&lt;/P&gt;&lt;P&gt;show run global&lt;/P&gt;&lt;P&gt;show run access-list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another very good tool to verify "packet-tracer"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input inside tcp 10.100.1.9 23456 12.2.200.10 7205 detailed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, &lt;BR /&gt;Varun Rao &lt;BR /&gt;Security Team, &lt;BR /&gt;Cisco TAC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 19:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dmz-nat-question/m-p/1956956#M435778</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2012-05-25T19:51:41Z</dc:date>
    </item>
  </channel>
</rss>

