<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: One-to-one NAT with redundant ISP links in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560109#M601302</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;Is there any way to do this just using a single outside address (for both interfaces),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg, 2.2.2.2 is the publicly routable address that translates to 192.168.1.10 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see how this would work without having 2 seperate IPs. And having 2 IPs for your web server is a bit pants.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right, you will need 2 ip addresses per ISP to translate your servers. And then of course you can still use the outside ip address of the ASA.&lt;/P&gt;&lt;P&gt;So someone would need 3 available ip addresses per ISP, that is why /29 is the mask someone would need from them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Oct 2010 13:33:05 GMT</pubDate>
    <dc:creator>Panos Kampanakis</dc:creator>
    <dc:date>2010-10-12T13:33:05Z</dc:date>
    <item>
      <title>One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560103#M601295</link>
      <description>&lt;P&gt;We have an ASA5505 with the Sec+ license.&amp;nbsp; I'm comfortable setting up failover using tracked routes, and allowing simple inbound traffic to the current mapped interface IP.&amp;nbsp; This requires that all internal destination IPs be PATed to the current interface address (as per the bolded &lt;STRONG&gt;global &lt;/STRONG&gt;statement below).&amp;nbsp; Our requirements are expanding and we would like to start using one-to-one NAT for our servers.&amp;nbsp; We have a /29 block on our primary link, but only have a /30 on the backup link.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Here's an example of what we have now.&amp;nbsp; This allows HTTP traffic to reach the internal IP of 192.168.1.10, regardless of whether the primary or backup link is active.&amp;nbsp; &lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;interface Vlan1
 nameif inside
 security-level 100
 ip address 192.168.1.1 255.255.255.0 
!
interface Vlan2
 nameif outside
 security-level 0
 ip address 1.1.1.1 255.255.255.248 
!
interface Vlan3
 nameif outside-backup
 security-level 0
 ip address 2.2.2.1 255.255.255.252&lt;BR /&gt;&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;&lt;STRONG&gt;global (outside-backup) 1 interface
&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;static (inside,outside) tcp interface www 192.168.1.10 www netmask 255.255.255.255&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;static (inside,outside) tcp interface smtp 192.168.1.11 smtp netmask 255.255.255.255&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-list acl_out extended permit tcp any interface eq www&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;access-group acl_out in interface outside access-group acl_out in interface outside-backup &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We'd like to break out the existing PAT setup to one-to-one NAT; something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;static (inside,outside) 2.2.2.2 192.168.1.10 netmask 255.255.255.255&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: courier new,courier;"&gt;static (inside,outside) 2.2.2.3 192.168.1.11 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the primary interface goes down, both internal hosts should remain accessible from the outside on the backup link.&amp;nbsp; I may be able to upgrade the backup link to a /29 as well, if that's what's needed here.&amp;nbsp; Is this a pipe dream, or possible?&amp;nbsp; If I can do it, what would the configuration look like? And finally, am I making &lt;STRONG&gt;any&lt;/STRONG&gt; sense at all? &lt;IMG class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/resources/scripts/tiny_mce3/plugins/jiveemoticons/images/spacer.gif" /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560103#M601295</guid>
      <dc:creator>sequoyatech</dc:creator>
      <dc:date>2019-03-11T18:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560104#M601297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nathan&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Mate - I *think* that you might be able to do this in 8.3, some of the Experts here might be able to help you solve it, but I think that is the puppy you need...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 21:05:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560104#M601297</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-10-11T21:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560105#M601298</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;You can do what you want Nathan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have 2 servers you will need extra ips for the isp link (let's assume its name is outside2) though. Let's say you had them and they were 3.3.3.2 and 3.3.3.3. Then you would just need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;static (inside,outside) 2.2.2.2 192.168.1.10 netmask 255.255.255.255&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;static (inside,outside) 2.2.2.3 192.168.1.11 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;static (inside,outside2) 3.3.3.2 192.168.1.10 netmask 255.255.255.255&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;static (inside,outside2) 3.3.3.3 192.168.1.11 netmask 255.255.255.255&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 21:13:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560105#M601298</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-11T21:13:38Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560106#M601299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is there any way to do this just using a single outside address (for both interfaces),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg, 2.2.2.2 is the publicly routable address that translates to 192.168.1.10 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see how this would work without having 2 seperate IPs. And having 2 IPs for your web server is a bit pants.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Oct 2010 21:23:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560106#M601299</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-10-11T21:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560107#M601300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could we fall back to PAT in that case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside2) 1 interface&lt;/P&gt;&lt;P&gt;static (inside,outside2) tcp interface www 192.168.1.10 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside2) tcp interface smtp 192.168.1.11 smtp netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 12:21:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560107#M601300</guid>
      <dc:creator>sequoyatech</dc:creator>
      <dc:date>2010-10-12T12:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560108#M601301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;Could we fall back to PAT in that case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside2) 1 interface&lt;/P&gt;&lt;P&gt;static (inside,outside2) tcp interface www 192.168.1.10 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside2) tcp interface smtp 192.168.1.11 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you could. When the ISP2 is up the statics hold for the 2 server and the global is for the rest behind the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 13:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560108#M601301</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-12T13:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560109#M601302</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;Is there any way to do this just using a single outside address (for both interfaces),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg, 2.2.2.2 is the publicly routable address that translates to 192.168.1.10 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can't see how this would work without having 2 seperate IPs. And having 2 IPs for your web server is a bit pants.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are right, you will need 2 ip addresses per ISP to translate your servers. And then of course you can still use the outside ip address of the ASA.&lt;/P&gt;&lt;P&gt;So someone would need 3 available ip addresses per ISP, that is why /29 is the mask someone would need from them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 13:33:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560109#M601302</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-10-12T13:33:05Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560110#M601303</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks all.&amp;nbsp; I hope to make the changes later today and will post back with the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 13:52:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560110#M601303</guid>
      <dc:creator>sequoyatech</dc:creator>
      <dc:date>2010-10-12T13:52:03Z</dc:date>
    </item>
    <item>
      <title>Re: One-to-one NAT with redundant ISP links</title>
      <link>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560111#M601304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Oct 2010 19:14:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/one-to-one-nat-with-redundant-isp-links/m-p/1560111#M601304</guid>
      <dc:creator>golly_wog</dc:creator>
      <dc:date>2010-10-12T19:14:01Z</dc:date>
    </item>
  </channel>
</rss>

