<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Help with 3 different Nats on a 1800 firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054465#M438165</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello T,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I understood this correctly but basically you want to do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Nat Workstations range&amp;nbsp; 10.0.0.100 - 200 to the IP&amp;nbsp; x.x.94.122&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Email would be 10.0.0.5 looking on the outside as&amp;nbsp; x.x.94.123&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I then need 10.0.0.2 - 4 to look on the outside as x.x.94.124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do it with route-maps but for simplicity I will do it just with ACL's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Ip access-list extended Workstation_B&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.2 any &lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.3 any&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.4 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list Workstation_B x.x.94.122 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) ip nat inside source static 10.0.0.5 x.x.94.123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) ip nat inside source dynamic any x.x.94.122&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you could try that and let me know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any other question..Sure..Just remember to rate all of the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Oct 2012 04:11:24 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-10-17T04:11:24Z</dc:date>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054464#M438164</link>
      <description>&lt;P&gt;I have a client that has 6 public IP addresses.&amp;nbsp; He needs to use 3 of them.&amp;nbsp; One for workstations which is currently working fine.&amp;nbsp; It is using the default gateway IP.&amp;nbsp; One for a email/web server which has a statis NAT and is also working fine.&amp;nbsp; But we need an additional NAT but it is for 3 servers that all need to go out as the smae public IP.&amp;nbsp; I am not sure and been unsuccessful getting those to go out as the same IP.&amp;nbsp; I either cannot get them to exit the same IP or it breaks the workstation NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Workstations would be 10.0.0.100 - 200 going oput the FE1 interface or I think x.x.94.122&lt;/P&gt;&lt;P&gt;Email would be 10.0.0.5 going out the statis NAT of x.x.94.123&lt;/P&gt;&lt;P&gt;I then need 10.0.0.2 - 4 to go out x.x.94.124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed some ACLs and IP info for security.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Attached is the current config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0&lt;/P&gt;&lt;P&gt; description $ETH-WAN$$FW_OUTSIDE$&lt;/P&gt;&lt;P&gt; ip address x.x.4.240 255.255.255.0&lt;/P&gt;&lt;P&gt; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nbar protocol-discovery&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip flow egress&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW out&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet1&lt;/P&gt;&lt;P&gt; ip address X.X.94.122 255.255.255.248&lt;/P&gt;&lt;P&gt; ip access-group 110 in&lt;/P&gt;&lt;P&gt; ip verify unicast reverse-path&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nbar protocol-discovery&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip flow egress&lt;/P&gt;&lt;P&gt; ip nat outside&lt;/P&gt;&lt;P&gt; ip inspect SDM_LOW out&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; duplex auto&lt;/P&gt;&lt;P&gt; speed auto&lt;/P&gt;&lt;P&gt; crypto map SDM_CMAP_1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet3&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet5&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet6&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet7&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet8&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface FastEthernet9&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Vlan1&lt;/P&gt;&lt;P&gt; description $ETH-SW-LAUNCH$$INTF-INFO-FE 2$$FW_INSIDE$$ES_LAN$&lt;/P&gt;&lt;P&gt; ip address 10.0.0.254 255.255.255.0&lt;/P&gt;&lt;P&gt; ip access-group 100 in&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; ip nbar protocol-discovery&lt;/P&gt;&lt;P&gt; ip flow ingress&lt;/P&gt;&lt;P&gt; ip flow egress&lt;/P&gt;&lt;P&gt; ip nat inside&lt;/P&gt;&lt;P&gt; ip virtual-reassembly&lt;/P&gt;&lt;P&gt; ip tcp adjust-mss 1452&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Async1&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt; no ip redirects&lt;/P&gt;&lt;P&gt; no ip unreachables&lt;/P&gt;&lt;P&gt; no ip proxy-arp&lt;/P&gt;&lt;P&gt; encapsulation slip&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip local pool SDM_POOL_1 192.168.12.1 192.168.12.254&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 0.0.0.0 X.X.94.121&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip flow-top-talkers&lt;/P&gt;&lt;P&gt; top 50&lt;/P&gt;&lt;P&gt; sort-by bytes&lt;/P&gt;&lt;P&gt; cache-timeout 200&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip http server&lt;/P&gt;&lt;P&gt;ip http access-class 2&lt;/P&gt;&lt;P&gt;ip http authentication local&lt;/P&gt;&lt;P&gt;ip http secure-server&lt;/P&gt;&lt;P&gt;ip http timeout-policy idle 60 life 86400 requests 10000&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.0.0.4 5900 interface FastEthernet0 5900&lt;/P&gt;&lt;P&gt;ip nat inside source static tcp 10.0.0.2 5001 interface FastEthernet0 5001&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.5 X.X.94.123 route-map SDM_RMAP_2&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.2 X.X.94.124 route-map SDM_RMAP_3&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.4 X.X.94.125 route-map SDM_RMAP_4&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list 100 remark auto generated by SDM firewall configuration&lt;/P&gt;&lt;P&gt;access-list 100 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 104 permit ip 10.0.0.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 105 remark SDM_ACL Category=2&lt;/P&gt;&lt;P&gt;access-list 105 deny&amp;nbsp;&amp;nbsp; ip host 10.0.0.5 192.168.12.0 0.0.0.255&lt;/P&gt;&lt;P&gt;access-list 105 permit ip host 10.0.0.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 110 remark auto generated by SDM firewall configuration&lt;/P&gt;&lt;P&gt;access-list 110 remark SDM_ACL Category=1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_4 permit 1&lt;/P&gt;&lt;P&gt; match ip address 107&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_1 permit 1&lt;/P&gt;&lt;P&gt; match ip address 104&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_2 permit 1&lt;/P&gt;&lt;P&gt; match ip address 105&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route-map SDM_RMAP_3 permit 1&lt;/P&gt;&lt;P&gt; match ip address 106&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:10:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054464#M438164</guid>
      <dc:creator>tyoungbauer</dc:creator>
      <dc:date>2019-03-12T00:10:11Z</dc:date>
    </item>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054465#M438165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello T,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure if I understood this correctly but basically you want to do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Nat Workstations range&amp;nbsp; 10.0.0.100 - 200 to the IP&amp;nbsp; x.x.94.122&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Email would be 10.0.0.5 looking on the outside as&amp;nbsp; x.x.94.123&lt;/P&gt;&lt;P style="background-color: #ffffff; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;I then need 10.0.0.2 - 4 to look on the outside as x.x.94.124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do it with route-maps but for simplicity I will do it just with ACL's&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Ip access-list extended Workstation_B&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.2 any &lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.3 any&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.4 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list Workstation_B x.x.94.122 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) ip nat inside source static 10.0.0.5 x.x.94.123&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) ip nat inside source dynamic any x.x.94.122&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way you could try that and let me know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Any other question..Sure..Just remember to rate all of the helpful posts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 04:11:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054465#M438165</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-17T04:11:24Z</dc:date>
    </item>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054466#M438168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I tried but I don’t think the 10.0.0.2 - 4 is working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat pool VoIP x.x.94.124 x.x.94.124 netmask 255.255.255.248 type rotary&lt;/P&gt;&lt;P&gt;ip nat inside source list VoIP pool VoIP overload&lt;/P&gt;&lt;P&gt;ip nat inside source route-map SDM_RMAP_1 interface FastEthernet1 overload&lt;/P&gt;&lt;P&gt;ip nat inside source static 10.0.0.5 x.x.94.123 route-map SDM_RMAP_2&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ip access-list extended VoIP&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.2 any&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.3 any&lt;/P&gt;&lt;P&gt;permit ip host 10.0.0.4 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 04:41:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054466#M438168</guid>
      <dc:creator>tyoungbauer</dc:creator>
      <dc:date>2012-10-17T04:41:29Z</dc:date>
    </item>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054467#M438170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tyon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try what I wrote down on the order I wrote it,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG style="text-decoration: underline; "&gt;Any other question..Sure,,Just remember to rate all of the support answers.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 04:48:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054467#M438170</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-17T04:48:50Z</dc:date>
    </item>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054468#M438173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I cannot.&amp;nbsp; when I run this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list Workstation_B x.x.94.122 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can only do &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list Workstation_B &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then I need to do interface or pool?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The config looks clsoe but I also need the workstation_B to go out x.x.94.124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Todd&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 05:19:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054468#M438173</guid>
      <dc:creator>tyoungbauer</dc:creator>
      <dc:date>2012-10-17T05:19:21Z</dc:date>
    </item>
    <item>
      <title>Help with 3 different Nats on a 1800 firewall</title>
      <link>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054469#M438175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See what you mean&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip local pool TEST x.x.94.124 x.x.94.124&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now use that on the NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Oct 2012 06:08:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/help-with-3-different-nats-on-a-1800-firewall/m-p/2054469#M438175</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-10-17T06:08:27Z</dc:date>
    </item>
  </channel>
</rss>

