<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Natting outside hosts for access to inside hosts on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320057#M549571</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It terminates on the PIX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Apr 2005 12:38:25 GMT</pubDate>
    <dc:creator>lisbeth.jacobsen</dc:creator>
    <dc:date>2005-04-08T12:38:25Z</dc:date>
    <item>
      <title>Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320055#M549568</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I am trying to translate a host coming in over a VPN on a PIX running 6.3(1) with no success.&lt;/P&gt;&lt;P&gt;I have tried a static mapping and also a nat with a global as follows:&lt;/P&gt;&lt;P&gt;nat (outside) 3 10.10.10.0 255.255.255.0 outside 0 0&lt;/P&gt;&lt;P&gt;global (inside) 3 192.168.168.169&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or:&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.168.169 10.10.10.10 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also added access-list statements to allow the natted address (192.168.168.169) in on the external interface&lt;/P&gt;&lt;P&gt;and added routes via the outside interface for the un-natted address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if I have the logic right&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:03:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320055#M549568</guid>
      <dc:creator>lisbeth.jacobsen</dc:creator>
      <dc:date>2020-02-21T08:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320056#M549569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the vpn connection terminate on the pix, or is it just passing thru the pix to an inside vpn gateway?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2005 11:15:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320056#M549569</guid>
      <dc:creator>ehirsel</dc:creator>
      <dc:date>2005-04-08T11:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320057#M549571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It terminates on the PIX&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2005 12:38:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320057#M549571</guid>
      <dc:creator>lisbeth.jacobsen</dc:creator>
      <dc:date>2005-04-08T12:38:25Z</dc:date>
    </item>
    <item>
      <title>Re: Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320058#M549573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure if I follow what you are trying to do but here is my take. You have users connecting to your network via a VPN to your PIX. Once connected your users are given 192.168.168.169 as their address. These users cannot access resources behind the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your users are successfully connecting to the VPN and their VPN IP is 192.168.168.169. You can create an access-list to allow this IP access to your internal network:&lt;/P&gt;&lt;P&gt;access-list 105 permit ip 10.10.10.0 255.255.255.0 192.168.168.169 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 105&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now the VPN user with IP 192.168.168.169 is granted access to 10.10.10.0 (your internal network).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2005 19:39:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320058#M549573</guid>
      <dc:creator>bhatok</dc:creator>
      <dc:date>2005-04-08T19:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320059#M549574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me clarify.&lt;/P&gt;&lt;P&gt;I have a vpn user coming in with a 10.x.x.x/24 address which I want to translate to a 192.x.x.x/24 address for access to another 172.x.x.x address on my internal network&lt;/P&gt;&lt;P&gt;My  problem is that I am not doing the natting correctly and the vpn user continues to be seen with a 10.x.x.x address&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Apr 2005 23:05:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320059#M549574</guid>
      <dc:creator>lisbeth.jacobsen</dc:creator>
      <dc:date>2005-04-08T23:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: Natting outside hosts for access to inside hosts on PIX</title>
      <link>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320060#M549575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create these access-lists:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn_innat_01 permit ip 10.x.y.0 255.255.255.0 172.a.b.c 255.sm.sm.sm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list vpn_outnat_01 permit ip 172.a.b.c 255.sm.sm.sm 192.168.y.0 255.255.sm.sm&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create these statics:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (out, in) 192.168.y.0 access-list vpn_innat_01&lt;/P&gt;&lt;P&gt;static (in, out) 172.a.b.c access-list vpn_outnat_01&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may need to also add an entry to the acl applied to the outside interface to allow the vpn connections to access the 172.x.x.x addresses unless you have the sysopt permit-ipsec option set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try these and let us know how it proceeds.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The acls and statics that I am having you enter allow the vpn connections to get nat'ed when accessing the 172.x.x.x hosts and allow addressability of those hosts to the vpn users.  If you already have a static (in. out) 172.x.x.x 172.x.x.x statement already do not add the static (in, out) that I specified as it is already present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These only work if you are running pix 6.3.3 code or higher.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 14 Apr 2005 11:06:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natting-outside-hosts-for-access-to-inside-hosts-on-pix/m-p/320060#M549575</guid>
      <dc:creator>ehirsel</dc:creator>
      <dc:date>2005-04-14T11:06:10Z</dc:date>
    </item>
  </channel>
</rss>

