<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX 501 Natting  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476695#M530276</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to try the access list feature and see if it will work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026694" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026694&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static &lt;/P&gt;&lt;P&gt;Configure a one-to-one address translation rule by mapping a local IP address to a global IP address, or a local port to a global port. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[no] static [(local_ifc,global_ifc)] {global_ip | interface} {local_ip [netmask mask] | access-list acl_name} [dns] [norandomseq] [max_conns [emb_limit]] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[no] static [(local_ifc,global_ifc)] {tcp | udp} {global_ip | interface} global_port {local_ip local_port [netmask mask] | access-list acl_name} [dns] [norandomseq] [max_conns [emb_limit]] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show static &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syntax Description&lt;/P&gt;&lt;P&gt; access-list &lt;/P&gt;&lt;P&gt; Lets you identify local traffic for network address translation (NAT) by specifying the local and destination addresses (or ports). This feature is known as policy NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The subnet mask used in the access list is also used for the global_ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only include permit statements in the access list. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 28 Nov 2005 21:34:08 GMT</pubDate>
    <dc:creator>Michael Stuckey</dc:creator>
    <dc:date>2005-11-28T21:34:08Z</dc:date>
    <item>
      <title>PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476690#M530264</link>
      <description>&lt;P&gt;I have a PIX 501 behind a comcast cable modem.  I need to send port 21 to 1 internal IP and the following ports to another internal:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SIP ports 5060 through 5061 using UDP protocol &lt;/P&gt;&lt;P&gt;NTP port 123 using UDP protocol &lt;/P&gt;&lt;P&gt;TFTP port 69 using UDP protocol &lt;/P&gt;&lt;P&gt;DNS port 53 using UDP protocol &lt;/P&gt;&lt;P&gt;RTP ports 10,000 through 20,000 using UDP protocol &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas as i cannot NAT a range of ports (to my knowledge) and it would take forever to manually enter 10,000+ single NAT entries.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:33:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476690#M530264</guid>
      <dc:creator>bkaren1278</dc:creator>
      <dc:date>2020-02-21T08:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476691#M530266</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do static port mapping between the public ip and the inside ips .&lt;/P&gt;&lt;P&gt;Also u need to enable the access for the same so that i can be accessible from outside network..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do find this link which speaks about mapping the smtp port to a inside ip address and also enabling the access from the outside world using the public ip adderss..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml#configs" target="_blank"&gt;http://www.cisco.com/en/US/partner/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094466.shtml#configs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regds&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 13:11:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476691#M530266</guid>
      <dc:creator>spremkumar</dc:creator>
      <dc:date>2005-11-28T13:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476692#M530267</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm let me try to elaborate more on my question:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 1 public IP given dynamically by my cable modem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have 2 internal IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my current setup i have a NAT of Outside to 192.168.151.10 on port 21&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now have to add Nats for the following to 192.168.151.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SIP ports 5060 through 5061 using UDP protocol &lt;/P&gt;&lt;P&gt;NTP port 123 using UDP protocol &lt;/P&gt;&lt;P&gt;TFTP port 69 using UDP protocol &lt;/P&gt;&lt;P&gt;DNS port 53 using UDP protocol &lt;/P&gt;&lt;P&gt;RTP ports 10,000 through 20,000 using UDP protocol &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 13:21:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476692#M530267</guid>
      <dc:creator>bkaren1278</dc:creator>
      <dc:date>2005-11-28T13:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476693#M530271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is some infor from the ciso site, you will always have to know your IP address or set up your remote access using Dynamic DNS.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static PAT Examples &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To redirect Telnet traffic from the PIX Firewall outside interface to the inside host at 10.1.1.15, enter: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface telnet 10.1.1.15 telnet netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To redirect FTP traffic from the PIX Firewall outside interface to the inside host at 10.1.1.30, enter: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ftp 10.1.1.30 ftp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To redirect DNS traffic from the PIX Firewall outside interface to the inside host at 10.1.1.30, enter: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface domain 10.1.1.30 domain netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this helps rate the comments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 18:11:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476693#M530271</guid>
      <dc:creator>Michael Stuckey</dc:creator>
      <dc:date>2005-11-28T18:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476694#M530274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This solution would be perfect except you cannot nat port ranges.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e. i cannot say &lt;/P&gt;&lt;P&gt;static (inside,outside) udp interface eq 10000-20000 10.1.1.30 eq 10000-20000 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any other suggestions are greatly appreciated?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 18:35:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476694#M530274</guid>
      <dc:creator>bkaren1278</dc:creator>
      <dc:date>2005-11-28T18:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: PIX 501 Natting</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476695#M530276</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to try the access list feature and see if it will work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026694" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/s.htm#wp1026694&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static &lt;/P&gt;&lt;P&gt;Configure a one-to-one address translation rule by mapping a local IP address to a global IP address, or a local port to a global port. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[no] static [(local_ifc,global_ifc)] {global_ip | interface} {local_ip [netmask mask] | access-list acl_name} [dns] [norandomseq] [max_conns [emb_limit]] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[no] static [(local_ifc,global_ifc)] {tcp | udp} {global_ip | interface} global_port {local_ip local_port [netmask mask] | access-list acl_name} [dns] [norandomseq] [max_conns [emb_limit]] &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show static &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Syntax Description&lt;/P&gt;&lt;P&gt; access-list &lt;/P&gt;&lt;P&gt; Lets you identify local traffic for network address translation (NAT) by specifying the local and destination addresses (or ports). This feature is known as policy NAT. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The subnet mask used in the access list is also used for the global_ip. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can only include permit statements in the access list. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Nov 2005 21:34:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-natting/m-p/476695#M530276</guid>
      <dc:creator>Michael Stuckey</dc:creator>
      <dc:date>2005-11-28T21:34:08Z</dc:date>
    </item>
  </channel>
</rss>

