<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Is this the correct way to NAT to two different interfaces in ASA 8.4(2)? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/is-this-the-correct-way-to-nat-to-two-different-interfaces-in/m-p/1786615#M530209</link>
    <description>&lt;P&gt;We just upgraded our ASA 5520 from 8.2 to 8.4(2) and I am just now getting familliar with the new config. We have an inside, outside, and DMZ interface. There is a web server in the DMZ with IP 10.6.129.5. I would like to NAT this address to a public internet IP that we own, so that users coming in from the outside can hit it. Let's say that the public IP on the outside is 172.16.129.5. I would also like my Inside users on the private LAN who are trying to hit 172.16.129.5 accomplish the same thing as users coming from the Outside. So is this a supported config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5-01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (dmz,outside) static 172.16.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5-01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (dmz,inside) static 172.16.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list acl-outside extended permit tcp any host 10.6.129.5 eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list acl-inside extended permit tcp any host 10.6.129.5 eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I enter the config into the ASA, it took the commands and everything works as desired. But I remember from the PIX world that NATing the same address to two different interfaces on the firewall causes intermittent problems. I would just like to know if what I am doing here on the ASA 8.4(2) is a supported config. Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 21:28:17 GMT</pubDate>
    <dc:creator>colin.nguyen</dc:creator>
    <dc:date>2019-03-11T21:28:17Z</dc:date>
    <item>
      <title>Is this the correct way to NAT to two different interfaces in ASA 8.4(2)?</title>
      <link>https://community.cisco.com/t5/network-security/is-this-the-correct-way-to-nat-to-two-different-interfaces-in/m-p/1786615#M530209</link>
      <description>&lt;P&gt;We just upgraded our ASA 5520 from 8.2 to 8.4(2) and I am just now getting familliar with the new config. We have an inside, outside, and DMZ interface. There is a web server in the DMZ with IP 10.6.129.5. I would like to NAT this address to a public internet IP that we own, so that users coming in from the outside can hit it. Let's say that the public IP on the outside is 172.16.129.5. I would also like my Inside users on the private LAN who are trying to hit 172.16.129.5 accomplish the same thing as users coming from the Outside. So is this a supported config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5-01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (dmz,outside) static 172.16.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;object network obj-10.6.129.5-01&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (dmz,inside) static 172.16.129.5&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list acl-outside extended permit tcp any host 10.6.129.5 eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list acl-inside extended permit tcp any host 10.6.129.5 eq 80&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I enter the config into the ASA, it took the commands and everything works as desired. But I remember from the PIX world that NATing the same address to two different interfaces on the firewall causes intermittent problems. I would just like to know if what I am doing here on the ASA 8.4(2) is a supported config. Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:28:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-the-correct-way-to-nat-to-two-different-interfaces-in/m-p/1786615#M530209</guid>
      <dc:creator>colin.nguyen</dc:creator>
      <dc:date>2019-03-11T21:28:17Z</dc:date>
    </item>
    <item>
      <title>Is this the correct way to NAT to two different interfaces in AS</title>
      <link>https://community.cisco.com/t5/network-security/is-this-the-correct-way-to-nat-to-two-different-interfaces-in/m-p/1786616#M530210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Colin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is supported, the configuration its fine, you are not going to have problems with that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Sep 2011 01:04:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/is-this-the-correct-way-to-nat-to-two-different-interfaces-in/m-p/1786616#M530210</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2011-09-22T01:04:09Z</dc:date>
    </item>
  </channel>
</rss>

