<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Inside Access to NAT IP on outside interface in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962175#M440221</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, we have DNS inspection turned on. I think what I need to work with the VCS server, is that my internal subnet on the inside interface of the ASA (192.168.225.0/24) need to access a NAT'd IP (1.2.3.0/29). The VCS server has an IP address which is in the outside interface IP range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal clients are having issues connecting to 1.2.3.2 which is the VCS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.225.x (Inside Interface Range)&amp;lt;=====&amp;gt;(Outside Interface Range)1.2.3.2/29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal hosts cannot connect to 1.2.3.2/29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't know if this was some security feature that didn't allow internal hosts to access the outside internface IP range or not. Currently all internal hosts are PAT'd to 1.2.3.1 (outside inteface IP)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Jul 2012 21:29:05 GMT</pubDate>
    <dc:creator>JohnTylerPearce</dc:creator>
    <dc:date>2012-07-02T21:29:05Z</dc:date>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962167#M440213</link>
      <description>&lt;P&gt;Hey, we have a server that has an outside IP and an inside IP. It's inside ip is 192.168.222.30/24 and it's outside IP is&lt;/P&gt;&lt;P&gt;199.204.50.2/29. The connection to this server from the outside is perfectly fine, but access from inside users to the&lt;/P&gt;&lt;P&gt;NAT'd IP which is 199.204.50.2/29 is having issues, however, access to the inside IP works fine (this part makes sense)&lt;/P&gt;&lt;P&gt;Will It be a must to set the inside DNS A record to the inside IP and not the outside IP, or can users on the inside interface&lt;/P&gt;&lt;P&gt;access the NAT'd IP which is assigned to the server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;LAN(192.168.222.0/24)&amp;lt;=====&amp;gt;InsideASAOutside&amp;lt;=====&amp;gt;(Server with NAT IP 192.168.222.30/24, it's also physicall assigned to this server)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is an ASA 5510 with 8.4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:24:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962167#M440213</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2019-03-11T23:24:53Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962168#M440214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are two solutions, depending of your DNS-Design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your clients query only an inside server, then this server has to resolve the FQDN to the inside IP.&lt;/P&gt;&lt;P&gt;If an external DNS-Server is queried, then the nat-statement needs "dns-doctoring" which is configured with the parameter "dns".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 21:17:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962168#M440214</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-06-29T21:17:19Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962169#M440215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You want the inside subnet to access the server 192.168.222.30 using his public NATed IP 199.204.50.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you try using a NAT for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside) source static "object for 192.168.222.30" "object for 199.204.50.2"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with also the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 29 Jun 2012 22:06:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962169#M440215</guid>
      <dc:creator>alejands</dc:creator>
      <dc:date>2012-06-29T22:06:46Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962170#M440216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Basically, we have a vmview connection server that has a dns name of vmview.companyx.com. The internal DNS for this site points to a public IP which is on an IP in the outside interface network range. From what you guys have suggested, and what I have researched, I believe I need to implement DNS re-write/Doctoring. I'm trying to find some good examples of syntax about this command on 8.4 code.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 11:09:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962170#M440216</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2012-06-30T11:09:46Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962171#M440217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your case should be similar to the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_objects.html#wp1140517"&gt;http://www.cisco.com/en/US/docs/security/asa/asa84/configuration/guide/nat_objects.html#wp1140517&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's really that easy, that you just add the parameter "dns".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 Jun 2012 15:15:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962171#M440217</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-06-30T15:15:53Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962172#M440218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hey, thanks for the information guys. This worked but did not fix the problem. The internal DNS is hq.companyx.com and the external dns is companyx.com. We get the response now from vmview.companyx.com as our internal IP, but the VmView VCS rejects it. From what I heard, this is because it's expecting to get a reponse from an outside connection. From what I was thinking, does the ASA NAT an internal IP, (I have 225.0/24 PATd to outside IP), if the outside IP is on the directly connected subnet of the outside interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 18:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962172#M440218</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2012-07-02T18:03:52Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962173#M440219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do I understand you right:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- On the ASA you translate your inside source IPs when you access the DMZ from inside?&lt;/P&gt;&lt;P&gt;- On your VMView-server is some access-controll that only allows access from certain IPs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that's the case it would be best to allow the VMview-server to be accessed from the inside-IP-range. Additionally you should exempt the communication from being natted when send from inside to DMZ.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 19:49:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962173#M440219</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2012-07-02T19:49:32Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962174#M440220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Jean,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have DNS inspection enabled (with policy-map) while testing with DNS doctoring?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thx&lt;/P&gt;&lt;P&gt;MS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 21:06:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962174#M440220</guid>
      <dc:creator>mvsheik123</dc:creator>
      <dc:date>2012-07-02T21:06:54Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962175#M440221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, we have DNS inspection turned on. I think what I need to work with the VCS server, is that my internal subnet on the inside interface of the ASA (192.168.225.0/24) need to access a NAT'd IP (1.2.3.0/29). The VCS server has an IP address which is in the outside interface IP range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal clients are having issues connecting to 1.2.3.2 which is the VCS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.225.x (Inside Interface Range)&amp;lt;=====&amp;gt;(Outside Interface Range)1.2.3.2/29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The internal hosts cannot connect to 1.2.3.2/29.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't know if this was some security feature that didn't allow internal hosts to access the outside internface IP range or not. Currently all internal hosts are PAT'd to 1.2.3.1 (outside inteface IP)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Jul 2012 21:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962175#M440221</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2012-07-02T21:29:05Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962176#M440222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok so If the DNS response from the DNS server will show 199.204.50.2 then this is what you need to do 8.4 talking&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Public_Server&lt;/P&gt;&lt;P&gt;host 199.204.50.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Internal_Server&lt;/P&gt;&lt;P&gt;host 192.168.222.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,inside) source dynamic any interface destination static Public_Server Internal_Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rate all the helpful posts!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 03:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962176#M440222</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-07-03T03:02:49Z</dc:date>
    </item>
    <item>
      <title>Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962177#M440223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Thanks, everyone for your help! Nicely done jcarvaja.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Jul 2012 12:15:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/1962177#M440223</guid>
      <dc:creator>JohnTylerPearce</dc:creator>
      <dc:date>2012-07-03T12:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Inside Access to NAT IP on outside interface</title>
      <link>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/3340328#M440224</link>
      <description>&lt;P&gt;Hello Julio,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have one question regarding this I have a server that has an IP private 10.0.0.20/24 and is published on public IP X.X.X.X&lt;/P&gt;
&lt;P&gt;I have an ASA 5516&lt;/P&gt;
&lt;P&gt;how can I make users able to access server on both private and public IP in the same time&lt;/P&gt;
&lt;P&gt;I have tried it for example nat(servers-zone,outside) users are able to access only on internal IP but not on public IP&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tried nat(servers-zone,any) users are able to access only on public IP internal IP doesn't work anymore&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kindly assist please&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Mar 2018 11:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-access-to-nat-ip-on-outside-interface/m-p/3340328#M440224</guid>
      <dc:creator>tanios191</dc:creator>
      <dc:date>2018-03-01T11:42:20Z</dc:date>
    </item>
  </channel>
</rss>

