<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix 515E - Static NAT Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415483#M529788</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is it possible to replace the "any" with an IP address of the outside server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Dec 2005 13:42:25 GMT</pubDate>
    <dc:creator>Mansoor Hafeez</dc:creator>
    <dc:date>2005-12-08T13:42:25Z</dc:date>
    <item>
      <title>Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415479#M529784</link>
      <description>&lt;P&gt;In my network, there is one server that is on an untrusted network. i have a firewall between that server and my network. I only want to allow that server to send data to a server on my network, and deny all other access.&lt;/P&gt;&lt;P&gt;is this option possible in the PIX firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:34:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415479#M529784</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2020-02-21T08:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415480#M529785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The scenario mentioned in this link deals to a similar kinda access inline with urs.&lt;/P&gt;&lt;P&gt;only difference is its allowing/permitting the smtp services alone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you mite want to look at these altered config lines ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list input permit ip host outsideserverip host yourpublicip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group input in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) yourpublicip yourinsideserverip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outsideserverip --- remoteend server ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yourpublicip --- the outside interface ip configured in ur outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yourinsideserverip --- the orginal ip configured on your servers nic which is kept in inside lan behind the pix&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 10:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415480#M529785</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2005-12-08T10:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415481#M529786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me explain little bit more. The untrusted Server IP is 172.16.2.22 and it is supposed to access the trusted Server 192.168.100.2 on particular tcp port 6789.but in access-list I cannot define this particular IP to access the inside server on a specific TCP port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the access-list above defines IP access, which will include all TCP ports, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want the access-list to allow access on a specific tcp port. is this possible with the PIX firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 11:37:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415481#M529786</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2005-12-08T11:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415482#M529787</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned in the link attached in my post you can define the access on particular port as &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list input permit tcp any host 209.164.3.5 eq 6789 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope that should work out for u..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 11:43:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415482#M529787</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2005-12-08T11:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415483#M529788</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;is it possible to replace the "any" with an IP address of the outside server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 13:42:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415483#M529788</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2005-12-08T13:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415484#M529790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;its very much possible to define specific ip prefixing "host" keyword in front of that ip address..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list input permit tcp host youroutsideserverip host 209.164.3.5 eq 6789 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 13:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415484#M529790</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2005-12-08T13:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 515E - Static NAT Question</title>
      <link>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415485#M529794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks..&lt;/P&gt;&lt;P&gt;i tried this command before, but then it didnot allow any sort of communication from the outside server to the internal server...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Dec 2005 14:47:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-515e-static-nat-question/m-p/415485#M529794</guid>
      <dc:creator>Mansoor Hafeez</dc:creator>
      <dc:date>2005-12-08T14:47:31Z</dc:date>
    </item>
  </channel>
</rss>

