<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How would you solve this access issue in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824216#M489678</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; In LAB you can route your packets from Public to Private IP but in real world 192.168.x.x is private IP and not routed over internet.&lt;/P&gt;&lt;P&gt; So only way to connect would be NATTED IP and if you want to access on 192.168.x.x then VPN solution. No other way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Dec 2011 19:15:10 GMT</pubDate>
    <dc:creator>ajay chauhan</dc:creator>
    <dc:date>2011-12-30T19:15:10Z</dc:date>
    <item>
      <title>How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824213#M489672</link>
      <description>&lt;P&gt;Current translations is an established stable network translation:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.144.158.7 192.168.100.20&lt;/P&gt;&lt;P&gt;access-list allows port 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;While maintaining the above translation&lt;/SPAN&gt; we have been ask by the developers to allow direct access to 192.168.100.20 for a secure socket connection on port 443. I did a similar thing during a data center migration by doing this.&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.144.158.7 192.168.100.20 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;This configuration was in place for months with out issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;client connecting to 192.168.100.20 connected to 192.168.100.20&lt;/P&gt;&lt;P&gt;client connecting to 10.144.158.7 connected to 192.168.100.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As long as the order of the static table is maintained the firewall will allow it to be configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My first question would be, how would you have done it? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ultimate question will be, with details to follow if you are interested, why it would periodically fail when applied to a well established VPN L2L tunnel configuration.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:08:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824213#M489672</guid>
      <dc:creator>charlie.ford</dc:creator>
      <dc:date>2019-03-11T22:08:44Z</dc:date>
    </item>
    <item>
      <title>How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824214#M489674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This explaination makes me little bit confused . Can you post me the full config also mentioned where is the source and destination and what results you want to get.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ajay&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 15:15:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824214#M489674</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-12-30T15:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824215#M489677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The configurations no longer exist but I can recreate them in the lab for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying to find a better way to explain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer on outside interface needs to get to 192.168.100.20 and has been doing so for years. They use the static translation 205.144.158.7 to connect to 192.168.100.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has become necessary to grant the customer on the outside interface direct access to 192.168.100.20 without translation while still allowing them access through the original static translation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the customer on the outside interface will be accessing both the new 192.168.100.20 and the old 205.144.158.7 but connecting to the same internal server 192.168.100.20. It works, I have done it but is there a better way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="cid:image001.png@01CCC6E1.FC17EF30"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;access-list outside line 1 extended permit icmp any host 205.144.158.7 (hitcnt=0) 0xf4592732&lt;/P&gt;&lt;P&gt;access-list outside line 2 extended permit tcp any host 205.144.158.7 eq www (hitcnt=3) 0xe2670b47&lt;/P&gt;&lt;P&gt;access-list outside line 3 extended permit tcp any host 205.144.158.7 eq https (hitcnt=1) 0x6b2d9f98&lt;/P&gt;&lt;P&gt;access-list outside line 4 extended permit icmp any host 192.168.100.20 (hitcnt=0) 0x8ab9d8f4&lt;/P&gt;&lt;P&gt;access-list outside line 5 extended permit tcp any host 192.168.100.20 eq www (hitcnt=1) 0xc67c07f6&lt;/P&gt;&lt;P&gt;access-list outside line 6 extended permit tcp any host 192.168.100.20 eq https (hitcnt=1) 0x7675a5b1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This passes the packet-tracer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your response. Lab configuration attached.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charlie&lt;/P&gt;&lt;P&gt;402-963-8295&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 16:59:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824215#M489677</guid>
      <dc:creator>charlie.ford</dc:creator>
      <dc:date>2011-12-30T16:59:07Z</dc:date>
    </item>
    <item>
      <title>How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824216#M489678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; In LAB you can route your packets from Public to Private IP but in real world 192.168.x.x is private IP and not routed over internet.&lt;/P&gt;&lt;P&gt; So only way to connect would be NATTED IP and if you want to access on 192.168.x.x then VPN solution. No other way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 19:15:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824216#M489678</guid>
      <dc:creator>ajay chauhan</dc:creator>
      <dc:date>2011-12-30T19:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824217#M489679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I apologize for not making myself clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a privet circuit in the lab environment, would it be helpful if I gave you the real addresses? Or can you pretend the Customer network is trusted and routed to the gateway firewall where this configuration exists? No Internet, just customer to customer, like through a VPN tunnel?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I am not making this clear please let me know and I will try again. I really need to solve this problem without using another firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Charlie&lt;/P&gt;&lt;P&gt;402-963-8295&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 21:48:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824217#M489679</guid>
      <dc:creator>charlie.ford</dc:creator>
      <dc:date>2011-12-30T21:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: How would you solve this access issue</title>
      <link>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824218#M489680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Charlie,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What Ajay has mentioned is correct, now as you said on the last note :&lt;/P&gt;&lt;P&gt; No Internet, just customer to customer, like through a VPN tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you only need connectivity between both sides without internet you do not need a routable public ip address, now you are going to use Identity nat and also a static one to one, both are going to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA wil be able to send the packets that are getting to 205.144.158.7 to the inside host, and also with proxy arp the identity nat statement (192.168.100.20).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You already have the ACLs in place, that is all you need as long as Ajay said they do not need to access 192.168.100.20 by the real IP address over the internet (unless you have a VPN established)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Dec 2011 22:50:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-would-you-solve-this-access-issue/m-p/1824218#M489680</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-12-30T22:50:34Z</dc:date>
    </item>
  </channel>
</rss>

