<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Allow access to public IPs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-allow-access-to-public-ips/m-p/1600602#M568245</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For accessing DMZ servers using public IPs instead of their private IPs, we will have to configure destination NAT for server. For example 11.11.11.11 is the public IP for DMZ server 10.10.10.10 then following static NAT will be needed to access 10.10.10.10 from inside using IP:11.11.11.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 11.11.11.11 10.10.10.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if a user on inside network will try to hit IP 11.11.11.11 (destination) then it will get translated to 10.10.10.10 on dmz. Now for source NAT we can use static or dynamic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic: &lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&amp;nbsp;&amp;nbsp;&amp;nbsp; //'0 0' means all IPs on inside, you may use inside pool&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static Identity: &lt;/P&gt;&lt;P&gt;static (inside, dmz) &lt;INSIDE-POOL&gt; &lt;INSIDE-POOL&gt; netmask &lt;MASK of="" inside="" pool=""&gt;&lt;/MASK&gt;&lt;/INSIDE-POOL&gt;&lt;/INSIDE-POOL&gt;&lt;/P&gt;&lt;P&gt;Example: If '192.168.1.0/24' is inside pool then it will be &lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using static identity will help in logging/monitoring because the real IP of inside user will hit the server but if you don't want this then you may use dynamic for source NAT (in this case DMZ interface IP will be source seen on DMZ server). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in short we will have to do destination NAT for server and source NAT (dynamic or static) for user on inside. And if there are ACLs configured on inside and dmz then the ACL should be allowing the required traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this will help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shahid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 01 Feb 2011 19:37:44 GMT</pubDate>
    <dc:creator>shzaman</dc:creator>
    <dc:date>2011-02-01T19:37:44Z</dc:date>
    <item>
      <title>ASA Allow access to public IPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-access-to-public-ips/m-p/1600601#M568244</link>
      <description>&lt;P&gt;I have an ASA 5505 with four vlans - outside, dmz, inside and guest.&amp;nbsp; In the dmz there are a few web and mail servers and I want to allow users on the inside network to access the dmz servers via their public IP not private IP.&amp;nbsp; By doing this just makes management of dns and clients easier...&amp;nbsp; Is this possible?&amp;nbsp; On the PIX I think I remeber people say it could not been done?&amp;nbsp; Appreciate any ideas - thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-james&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:43:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-access-to-public-ips/m-p/1600601#M568244</guid>
      <dc:creator>jjursch</dc:creator>
      <dc:date>2019-03-11T19:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Allow access to public IPs</title>
      <link>https://community.cisco.com/t5/network-security/asa-allow-access-to-public-ips/m-p/1600602#M568245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For accessing DMZ servers using public IPs instead of their private IPs, we will have to configure destination NAT for server. For example 11.11.11.11 is the public IP for DMZ server 10.10.10.10 then following static NAT will be needed to access 10.10.10.10 from inside using IP:11.11.11.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 11.11.11.11 10.10.10.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if a user on inside network will try to hit IP 11.11.11.11 (destination) then it will get translated to 10.10.10.10 on dmz. Now for source NAT we can use static or dynamic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dynamic: &lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&amp;nbsp;&amp;nbsp;&amp;nbsp; //'0 0' means all IPs on inside, you may use inside pool&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static Identity: &lt;/P&gt;&lt;P&gt;static (inside, dmz) &lt;INSIDE-POOL&gt; &lt;INSIDE-POOL&gt; netmask &lt;MASK of="" inside="" pool=""&gt;&lt;/MASK&gt;&lt;/INSIDE-POOL&gt;&lt;/INSIDE-POOL&gt;&lt;/P&gt;&lt;P&gt;Example: If '192.168.1.0/24' is inside pool then it will be &lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using static identity will help in logging/monitoring because the real IP of inside user will hit the server but if you don't want this then you may use dynamic for source NAT (in this case DMZ interface IP will be source seen on DMZ server). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in short we will have to do destination NAT for server and source NAT (dynamic or static) for user on inside. And if there are ACLs configured on inside and dmz then the ACL should be allowing the required traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this will help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Shahid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 19:37:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-allow-access-to-public-ips/m-p/1600602#M568245</guid>
      <dc:creator>shzaman</dc:creator>
      <dc:date>2011-02-01T19:37:44Z</dc:date>
    </item>
  </channel>
</rss>

