<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Please help with a PIX NAT problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323222#M550523</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really need help with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a switch that has a public ip address (192.168.0.2), that I would like to manage from the private ip address (10.0.0.5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to be able to telnet to 10.0.1.5 which would be the NATed ip address of the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;name 10.0.1.5 Switch_A_NAT&lt;/P&gt;&lt;P&gt;name 192.168.0.2 Switch_A&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny ip any any log&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.0.0.0 255.255.255.0 host 10.0.1.5 eq telnet&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.0.0.0 255.255.255.0 host 192.168.0.2 eq telnet&lt;/P&gt;&lt;P&gt;ip address outside 192.168.0.1 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.0.1.15 255.255.255.192&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.0.1.5 192.168.0.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error received:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:10.0.0.5/3534 dst outside:10.0.1.5/23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 08:00:49 GMT</pubDate>
    <dc:creator>chansh</dc:creator>
    <dc:date>2020-02-21T08:00:49Z</dc:date>
    <item>
      <title>Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323222#M550523</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really need help with this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a switch that has a public ip address (192.168.0.2), that I would like to manage from the private ip address (10.0.0.5).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to be able to telnet to 10.0.1.5 which would be the NATed ip address of the switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;name 10.0.1.5 Switch_A_NAT&lt;/P&gt;&lt;P&gt;name 192.168.0.2 Switch_A&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny ip any any log&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.0.0.0 255.255.255.0 host 10.0.1.5 eq telnet&lt;/P&gt;&lt;P&gt;access-list inside_access_in permit tcp 10.0.0.0 255.255.255.0 host 192.168.0.2 eq telnet&lt;/P&gt;&lt;P&gt;ip address outside 192.168.0.1 255.255.255.224&lt;/P&gt;&lt;P&gt;ip address inside 10.0.1.15 255.255.255.192&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.0.1.5 192.168.0.2 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error received:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305005: No translation group found for tcp src inside:10.0.0.5/3534 dst outside:10.0.1.5/23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323222#M550523</guid>
      <dc:creator>chansh</dc:creator>
      <dc:date>2020-02-21T08:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323223#M550524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Even with "outside nat" you still need a translation from inside to outside plus an ACL, and the outside nat will be unnecessary in this case.&lt;/P&gt;&lt;P&gt;Try removing the outside static, and translate inside to outside:&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.5 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.0.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or, identity nat translation&lt;/P&gt;&lt;P&gt;static (inside, outside) 10.0.0.5 10.0.0.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or:&lt;/P&gt;&lt;P&gt;static (inside, outside) 192.168.0.30 10.0.0.5 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACL outside_access_in is redundant (except for logging behaviour)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mustafa&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Mar 2005 13:57:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323223#M550524</guid>
      <dc:creator>mhussein</dc:creator>
      <dc:date>2005-03-15T13:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323224#M550525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;use outside nat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Mar 2005 14:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323224#M550525</guid>
      <dc:creator>joeqiu2002</dc:creator>
      <dc:date>2005-03-15T14:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323225#M550526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First I assume the IP addresses you are giving are not the actual addresses, since they are all from the RFC 1918 group. Assuming that and looking at your config, a first glance shows one problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your static NAT mapping is incorrectly stated. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try these commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no static (outside,inside) 10.0.1.5 192.168.0.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.0.1.5 192.168.0.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have the (inside,outside) statement reveresed.Nothing will work until that is corrected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris Weber CCDP&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:cw@layer9corp.com"&gt;cw@layer9corp.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 03:42:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323225#M550526</guid>
      <dc:creator>layer9</dc:creator>
      <dc:date>2005-03-18T03:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323226#M550527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also what is with the Inside Access List? Are you trying to deny certain systems on your network from accessing the Internet? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;An access-list applied to the inside Interface of a PIX, Ethernet 1 which has the highest security level is in most cases a moot command, and causes problems in most cases. Traffic from the inside is already by default permitted to the outside, from the higher security interface to the lower is always permitted on the PIX. Applying an access list to this interface can restrict outbound traffic and cause all sorts of headaches. Unless you absolutely have to restrict certain users from accessing the Internet (and even then there are better ways to do this) I would remove the access-list inside from the PIX altoghether. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You basically have the whole thing backwards, not to be critical of course. Your access-list inside is set to permit telnet to the Switch, but it is applied to the INSIDE interface. It needs to be applied to the OUTSIDE interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you applied an access list to the OUTSIDE interface blocking EVERYTHING!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Type these commands or copy them from here and apply them in Global Config mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. No access-group outside_access_in in interface outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. No access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. access-group inside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do this AFTER doing what I told you to do in my first post. You need to correct the STATIC NAT statements first, then set the Access-lists. You can cut and paste my commands from this message directly into your PIX from Global Config Mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris Weber CCDP&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:cw@layer9corp.com"&gt;cw@layer9corp.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 03:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323226#M550527</guid>
      <dc:creator>layer9</dc:creator>
      <dc:date>2005-03-18T03:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: Please help with a PIX NAT problem</title>
      <link>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323227#M550530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh no, it's me again. You have another problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have your access-lists written incorrectly. You are applying them as if you were permitting the NAT address to the Internal address. You don't need to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If your outside address, the address you have set as the external NAT address of the switch is 10.0.1.5 then your access-list would read as follows.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list mysamplelist permit tcp any host 10.0.1.5 eq 23&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you apply the access list to the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group mysamplelist in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There, we just rebuilt your PIX in 3 posts. &lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris Weber CCDP&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:cw@layer9corp.com"&gt;cw@layer9corp.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Mar 2005 04:04:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/please-help-with-a-pix-nat-problem/m-p/323227#M550530</guid>
      <dc:creator>layer9</dc:creator>
      <dc:date>2005-03-18T04:04:10Z</dc:date>
    </item>
  </channel>
</rss>

