<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic One Direction NAT on FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851588#M460272</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clayton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do this: &lt;/P&gt;&lt;P&gt;static (inside,outside) 10.60.60.60 10.20.60.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;That would be a permanent static one to one translation so inbound an outbound connections from that server will be seeing at 10.60.60.60.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Feb 2012 20:12:11 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-02-01T20:12:11Z</dc:date>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851587#M460271</link>
      <description>&lt;P&gt;I want to configure a NAT Statement on a FWSM so that traffic initiated by an end user to a server with an IP Address of 10.20.x.x network will access it via a corresponding 10.60.x.x address.&amp;nbsp; But, I want all communications initiated by the server to stay at its original IP Address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore I have a End User trying to access a server.&amp;nbsp; User will type in 10.60.x.x, this hits the FWSM and changes the 10.60.x.x to 10.20.x.x&lt;/P&gt;&lt;P&gt;The return traffic will go back to the user as 10.60.x.x.&lt;/P&gt;&lt;P&gt;But, that server trying to access the internet, will source as 10.20.x.x and will continue its journey as 10.20.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How is this configured?&amp;nbsp; Would it be:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.60.60.60 10.20.60.60 netmask 255.255.255.255&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:22:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851587#M460271</guid>
      <dc:creator>clayton.buckwalter</dc:creator>
      <dc:date>2019-03-11T22:22:32Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851588#M460272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clayton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you do this: &lt;/P&gt;&lt;P&gt;static (inside,outside) 10.60.60.60 10.20.60.60 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;That would be a permanent static one to one translation so inbound an outbound connections from that server will be seeing at 10.60.60.60.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 20:12:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851588#M460272</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T20:12:11Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851589#M460273</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clayton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now here is what you can try:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NAT&amp;nbsp; extended permit ip host 10.60.60.60 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.20.60.60 10.20.60.60&lt;/P&gt;&lt;P&gt; static (inside,outside) 10.60.60.60 access-list NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That should do it!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate all the helpful posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 20:19:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851589#M460273</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T20:19:10Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851590#M460274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure if I am reading this correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you want the ACL to be &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list NAT extended permit ip any host 10.60.60.60&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (for any user trying to access the server?)&lt;/P&gt;&lt;P&gt;Also for the&amp;nbsp; "static (inside,outside) 10.60.60.60 access-list NAT"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Would you want it to read static (inside,outside) 10.20.60.60 access-list NAT&amp;nbsp; (so that the traffic NAT's to the 10.20.60.60 address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would make the lines:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; access-list NAT extended permit ip any host 10.60.60.60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 10.20.60.60 10.20.60.60&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; static (inside,outside) 10.20.60.60 access-list NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if I can perform it in this manner, is "static (inside,outside) 10.20.60.60 10.20.60.60" needed?&amp;nbsp; &lt;/P&gt;&lt;P&gt;The ACL is specifying direction, therefore it should not be hit if traffic is sourcing from 10.20.60.60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or am I completely off base here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Clayton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 20:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851590#M460274</guid>
      <dc:creator>clayton.buckwalter</dc:creator>
      <dc:date>2012-02-01T20:39:53Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851591#M460277</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clayton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You want the outside users to access 10.60.60.60 and get translated to 10.20.60.60&lt;/P&gt;&lt;P&gt;But you also want the user 10.20.60.60 to be natted or no-nated if he starts the connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not supported but we are doing a trick here to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.20.60.60 access-list NAT is need it for outbound connections.&lt;/P&gt;&lt;P&gt;Static (inside,outside) 10.20.60.60 10.20.60.60 is need it for the inbound connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To test it.&lt;/P&gt;&lt;P&gt;Packet-tracer input inside tcp 10.20.60.60 1025 4.2.2.2 80&lt;/P&gt;&lt;P&gt;You should see here the NAT with the ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet-tracer input outside tcp 4.2.2.2 1025 10.60.60.60 80&lt;/P&gt;&lt;P&gt;You should see the identity nat or No-nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do rate helpful posts!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Feb 2012 20:58:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851591#M460277</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-01T20:58:45Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851592#M460278</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would instead of having &lt;/P&gt;&lt;P&gt;static (inside,outside) 10.20.60.60 access-list NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;could I instead have&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.20.60.60 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or would the first static take presidence over the generic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Clayton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 15:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851592#M460278</guid>
      <dc:creator>clayton.buckwalter</dc:creator>
      <dc:date>2012-02-02T15:19:58Z</dc:date>
    </item>
    <item>
      <title>One Direction NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851593#M460279</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clayton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Nat order on 8.2 is :&lt;/P&gt;&lt;P&gt;1. NAT exemption—In order, until the first match.&lt;/P&gt;&lt;P&gt;2. Static NAT and Static PAT (regular and policy)—In order, until the first match. Static identity NAT&lt;/P&gt;&lt;P&gt;is included in this category.&lt;/P&gt;&lt;P&gt;3. Policy dynamic NAT—In order, until the first match. Overlapping addresses are allowed.&lt;/P&gt;&lt;P&gt;4. Regular dynamic NAT—Best match. Regular identity NAT is included in this category. The order of&lt;/P&gt;&lt;P&gt;the NAT rules does not matter; the NAT rule that best matches the real address is used. For example,&lt;/P&gt;&lt;P&gt;you can create a general rule to translate all addresses (0.0.0.0) on an interface. If you want to&lt;/P&gt;&lt;P&gt;translate a subset of your network (10.1.1.1) to a different address, then you can create a rule to&lt;/P&gt;&lt;P&gt;translate only 10.1.1.1. When 10.1.1.1 makes a connection, the specific rule for 10.1.1.1 is used&lt;/P&gt;&lt;P&gt;because it matches the real address best. We do not recommend using overlapping rules; they use&lt;/P&gt;&lt;P&gt;more memory and can slow the performance of the ASA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you try it with the suggestions I sent you??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Feb 2012 18:55:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-direction-nat-on-fwsm/m-p/1851593#M460279</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-02-02T18:55:49Z</dc:date>
    </item>
  </channel>
</rss>

