<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PIX Translation in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-translation/m-p/363023#M554019</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I justed realized this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to remove your fixup protocol statments pointing to DNS and SMTP if they exist, and any other protocol that you have a static PAT for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Dec 2004 17:06:30 GMT</pubDate>
    <dc:creator>robysolutions</dc:creator>
    <dc:date>2004-12-08T17:06:30Z</dc:date>
    <item>
      <title>PIX Translation</title>
      <link>https://community.cisco.com/t5/network-security/pix-translation/m-p/363021#M554017</link>
      <description>&lt;P&gt;I am configuring a PIX 506e for implementation on a network. The inside network consists of about 25 combined workstations and servers with an IP addressing scheme of 10.x.x.0/24. Some servers need certain TCP or UDP ports translated publicly for each server. The outside network is 66.x.x.32/29 with 5 public addresses available to the client. I would like to translate individual ports on public address 66.x.x.33 - 6.x.x.37 for inbound traffic and use 66.x.x.38 as the outside interface of the PIX and allow all other outbound traffic to be translated to that interface's address. I am familiar with the PIX using one-to-one NAT but I would like someone to validate my config with this scenerio before I go live with it just to make sure I haven't created a problem somewhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.34 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.34 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.34 eq smtp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.34 eq pop3&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.35 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.35 eq ftp&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.35 eq ftp-data&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.36 eq 407&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.36 eq 3389&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit udp any host 66.x.x.36 eq 407&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit udp any host 66.x.x.36 eq 3283&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.37 eq www&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp 64.x.x.0 255.255.255.0 host 66.x.x.37 eq telnet&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any host 66.x.x.37 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside 66.x.x.38 255.255.255.248&lt;/P&gt;&lt;P&gt;ip address inside 10.x.x.254 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.34 www 10.x.x.1 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.34 3389 10.x.x.1 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.34 smtp 10.x.x.1 smtp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.34 pop3 10.x.x.1 pop3 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.35 3389 10.x.x.8 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.35 ftp 10.x.x.2 ftp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.35 ftp-data 10.x.x.2 ftp-data netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.36 407 10.x.x.23 407 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.36 3389 10.x.x.10 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 66.x.x.36 407 10.x.x.23 407 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) udp 66.x.x.36 3283 10.x.x.23 3283 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.37 www 10.x.x.4 www netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.37 telnet 10.x.x.200 telnet netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 66.x.x.37 3389 10.x.x.30 3389 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:47:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-translation/m-p/363021#M554017</guid>
      <dc:creator>stevecox</dc:creator>
      <dc:date>2020-02-21T07:47:43Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Translation</title>
      <link>https://community.cisco.com/t5/network-security/pix-translation/m-p/363022#M554018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would have to say everything looks good. I don't see any problems with the configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2004 16:56:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-translation/m-p/363022#M554018</guid>
      <dc:creator>robysolutions</dc:creator>
      <dc:date>2004-12-08T16:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Translation</title>
      <link>https://community.cisco.com/t5/network-security/pix-translation/m-p/363023#M554019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I justed realized this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to remove your fixup protocol statments pointing to DNS and SMTP if they exist, and any other protocol that you have a static PAT for.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2004 17:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-translation/m-p/363023#M554019</guid>
      <dc:creator>robysolutions</dc:creator>
      <dc:date>2004-12-08T17:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: PIX Translation</title>
      <link>https://community.cisco.com/t5/network-security/pix-translation/m-p/363024#M554020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the information.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Dec 2004 18:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-translation/m-p/363024#M554020</guid>
      <dc:creator>stevecox</dc:creator>
      <dc:date>2004-12-08T18:50:13Z</dc:date>
    </item>
  </channel>
</rss>

