<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX - PATing or not depending on outside interface used in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375250#M562435</link>
    <description>&lt;P&gt;I'm still digging into this, but have a need to not NAT any traffic starting on the inside to 2 of my lower-security interfaces (dmz1 &amp;amp; dmz2), but have that same traffic PATed to the interface address if it goes out outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using nat (inside) 0 0.0.0.0 0.0.0.0 for the non-nating of traffic that goes from inside to dmz1 &amp;amp; dmz2. So, this keeps me from putting in another nat statement [like nat (inside) 1 0.0.0.0 0.0.0.0)] as that causes an error message saying the nat statements overlap. Makes a certain amount of sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like a "static (inside,outside) interface 10.1.1.0 netmask 255.255.255.0" would be the perfect solution. But I get a "Invalid netmask with interface option" error message when I try to input that. So, that must not be able to do groups of addresses. It also only lets me do a single static to the interface address, so that is not going to fly even if I was willing to type in every host individually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping that static command would let me overload all the inside addresses to the outside interface address when data is going out the "outside" interface, while the "nat (inside) 0" lets me non NAT anything going to dmz1 &amp;amp; dmz2, but no dice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts on what I'm missing here? There has got a be a way to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 07:38:34 GMT</pubDate>
    <dc:creator>sheidelbach</dc:creator>
    <dc:date>2020-02-21T07:38:34Z</dc:date>
    <item>
      <title>PIX - PATing or not depending on outside interface used</title>
      <link>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375250#M562435</link>
      <description>&lt;P&gt;I'm still digging into this, but have a need to not NAT any traffic starting on the inside to 2 of my lower-security interfaces (dmz1 &amp;amp; dmz2), but have that same traffic PATed to the interface address if it goes out outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using nat (inside) 0 0.0.0.0 0.0.0.0 for the non-nating of traffic that goes from inside to dmz1 &amp;amp; dmz2. So, this keeps me from putting in another nat statement [like nat (inside) 1 0.0.0.0 0.0.0.0)] as that causes an error message saying the nat statements overlap. Makes a certain amount of sense.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like a "static (inside,outside) interface 10.1.1.0 netmask 255.255.255.0" would be the perfect solution. But I get a "Invalid netmask with interface option" error message when I try to input that. So, that must not be able to do groups of addresses. It also only lets me do a single static to the interface address, so that is not going to fly even if I was willing to type in every host individually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping that static command would let me overload all the inside addresses to the outside interface address when data is going out the "outside" interface, while the "nat (inside) 0" lets me non NAT anything going to dmz1 &amp;amp; dmz2, but no dice. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any thoughts on what I'm missing here? There has got a be a way to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375250#M562435</guid>
      <dc:creator>sheidelbach</dc:creator>
      <dc:date>2020-02-21T07:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: PIX - PATing or not depending on outside interface used</title>
      <link>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375251#M562458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you have:&lt;/P&gt;&lt;P&gt;192.168.0.0/24 on inside&lt;/P&gt;&lt;P&gt;192.168.1.0/24 on DMZ1&lt;/P&gt;&lt;P&gt;192.168.2.0/24 on DMZ2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NoNATinside permit ip 192.168.0.0 255.255.255.0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list NoNATinside permit ip 192.168.0.0 255.255.255.0 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NoNATinside&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2004 17:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375251#M562458</guid>
      <dc:creator>jzsides</dc:creator>
      <dc:date>2004-09-21T17:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: PIX - PATing or not depending on outside interface used</title>
      <link>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375252#M562476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Way cool! Did not notice an ACL as being an option for NAT commands.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Waaaaay cool!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 21 Sep 2004 18:59:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-pating-or-not-depending-on-outside-interface-used/m-p/375252#M562476</guid>
      <dc:creator>sheidelbach</dc:creator>
      <dc:date>2004-09-21T18:59:05Z</dc:date>
    </item>
  </channel>
</rss>

