<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to do This nat server thing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535132#M608917</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the latest configuration you pasted here,I see that you have only created a Static NAT for the 192.168.5.100 machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, we need to create Static PAT rules to get it work according to our requirement.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please add NAT rules as Mirober suggested and everything should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please remove the NAT configuration you added,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;object network PublicServer_NAT1&lt;BR /&gt; nat (test,outside) static A_24.222.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;no object network PublicServer_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;Then add the NAT rules as suggested by Mirober.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Oct 2010 13:35:56 GMT</pubDate>
    <dc:creator>apothula</dc:creator>
    <dc:date>2010-10-23T13:35:56Z</dc:date>
    <item>
      <title>How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535129#M608914</link>
      <description>&lt;P&gt;I have two servers on one network http ftp and port 8080&lt;/P&gt;&lt;P&gt; 192.168.2.100 http,ftp and 192.168.2.101 port 8080&lt;/P&gt;&lt;P&gt;I want to use one public address to access these servers 24.222.224.218 but cannot figure out how to allow this, it gives me&lt;/P&gt;&lt;P&gt;the server address config overlaps with an existing translation rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be appreciated, this is on an asa 5505 8.3&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:55:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535129#M608914</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2019-03-11T18:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535130#M608915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do this with the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;object network obj-192.168.2.100-www&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.2.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 24.222.224.218 service tcp 80 80&lt;/P&gt;&lt;P&gt; object network obj-192.168.2.100-ftp&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 
 host 192.168.2.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 24.222.224.218 service tcp 21 21&lt;BR /&gt;object network object-192.168.2.101&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 192.168.2.101&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 24.222.224.218 service tcp 8080 8080&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still get the overlap error with these commands, please post the output of 'show run object' and 'show run nat'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 18 Oct 2010 13:22:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535130#M608915</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-10-18T13:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535131#M608916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now I cant get it to see a web server&lt;/P&gt;&lt;P&gt;from outside and also the web server cant see out. I have posted my config can someone assi&lt;/P&gt;&lt;P&gt;st?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is only a test setup so I left most IP's in&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Result of the command: "Show run"&lt;/P&gt;&lt;P&gt;: Saved&lt;BR /&gt;:&lt;BR /&gt;ASA Version 8.3(1) &lt;BR /&gt;!&lt;BR /&gt;hostname pskipton&lt;BR /&gt;domain-name AVC&lt;BR /&gt;enable password IKxxneNMTRgDw/Xd encrypted&lt;BR /&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.1.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 24.222.XXX.XXX 255.255.255.248 &lt;BR /&gt;!&lt;BR /&gt;interface Vlan12&lt;BR /&gt; nameif test&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.5.1 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt; switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt; switchport access vlan 12&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;clock timezone AST -4&lt;BR /&gt;clock summer-time ADT recurring&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt; domain-name AVC&lt;BR /&gt;object network 192.168.1.0 &lt;BR /&gt; subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network A_24.222.XXX.220 &lt;BR /&gt; host 24.222.XXX.220&lt;BR /&gt;object network PublicServer_NAT1 &lt;BR /&gt; host 192.168.5.100&lt;BR /&gt;object network 192.168.5.0 &lt;BR /&gt; subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object-group protocol DM_INLINE_PROTOCOL_1&lt;BR /&gt; protocol-object udp&lt;BR /&gt; protocol-object tcp&lt;BR /&gt; protocol-object ip&lt;BR /&gt;access-list outside_access extended permit tcp any host 192.168.5.100 eq www &lt;BR /&gt;access-list outsidein standard permit 192.168.1.0 255.255.255.0 &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging enable&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu test 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;!&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt; nat (inside,outside) dynamic interface&lt;BR /&gt;object network PublicServer_NAT1&lt;BR /&gt; nat (test,outside) static A_24.222.XXX.XXX&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt; nat (test,outside) dynamic interface&lt;BR /&gt;access-group outside_access in interface outside&lt;BR /&gt;route outside 0.0.0.0 0.0.0.0 24.222.XXX.XXX 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;http server enable&lt;BR /&gt;http server idle-timeout 60&lt;BR /&gt;http 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-MD5 esp-aes-256 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-SHA esp-des esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-DES-MD5 esp-des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-MD5 esp-aes-192 esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-3DES-MD5 esp-3des esp-md5-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-SHA esp-aes esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-192-SHA esp-aes-192 esp-sha-hmac &lt;BR /&gt;crypto ipsec transform-set ESP-AES-128-MD5 esp-aes esp-md5-hmac &lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set pfs group1&lt;BR /&gt;crypto dynamic-map SYSTEM_DEFAULT_CRYPTO_MAP 65535 set transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 65535 ipsec-isakmp dynamic SYSTEM_DEFAULT_CRYPTO_MAP&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto isakmp enable outside&lt;BR /&gt;crypto isakmp policy 10&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 192.168.1.0 255.255.255.0 inside&lt;BR /&gt;ssh timeout 30&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcpd dns 24.222.0.96 24.222.0.97&lt;BR /&gt;!&lt;BR /&gt;dhcpd address 192.168.1.5-192.168.1.254 inside&lt;BR /&gt;dhcpd enable inside&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;no threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;webvpn&lt;BR /&gt;group-policy DfltGrpPolicy attributes&lt;BR /&gt; vpn-tunnel-protocol IPSec l2tp-ipsec &lt;BR /&gt;username pskipton password xJ9t9jwcg/1YgcqF encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt; class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;privilege cmd level 3 mode exec command perfmon&lt;BR /&gt;privilege cmd level 3 mode exec command ping&lt;BR /&gt;privilege cmd level 3 mode exec command who&lt;BR /&gt;privilege cmd level 3 mode exec command logging&lt;BR /&gt;privilege cmd level 3 mode exec command failover&lt;BR /&gt;privilege cmd level 3 mode exec command packet-tracer&lt;BR /&gt;privilege show level 5 mode exec command import&lt;BR /&gt;privilege show level 5 mode exec command running-config&lt;BR /&gt;privilege show level 3 mode exec command reload&lt;BR /&gt;privilege show level 3 mode exec command mode&lt;BR /&gt;privilege show level 3 mode exec command firewall&lt;BR /&gt;privilege show level 3 mode exec command asp&lt;BR /&gt;privilege show level 3 mode exec command cpu&lt;BR /&gt;privilege show level 3 mode exec command interface&lt;BR /&gt;privilege show level 3 mode exec command clock&lt;BR /&gt;privilege show level 3 mode exec command dns-hosts&lt;BR /&gt;privilege show level 3 mode exec command access-list&lt;BR /&gt;privilege show level 3 mode exec command logging&lt;BR /&gt;privilege show level 3 mode exec command vlan&lt;BR /&gt;privilege show level 3 mode exec command ip&lt;BR /&gt;privilege show level 3 mode exec command ipv6&lt;BR /&gt;privilege show level 3 mode exec command failover&lt;BR /&gt;privilege show level 3 mode exec command asdm&lt;BR /&gt;privilege show level 3 mode exec command arp&lt;BR /&gt;privilege show level 3 mode exec command route&lt;BR /&gt;privilege show level 3 mode exec command ospf&lt;BR /&gt;privilege show level 3 mode exec command aaa-server&lt;BR /&gt;privilege show level 3 mode exec command aaa&lt;BR /&gt;privilege show level 3 mode exec command eigrp&lt;BR /&gt;privilege show level 3 mode exec command crypto&lt;BR /&gt;privilege show level 3 mode exec command vpn-sessiondb&lt;BR /&gt;privilege show level 3 mode exec command ssh&lt;BR /&gt;privilege show level 3 mode exec command dhcpd&lt;BR /&gt;privilege show level 3 mode exec command vpnclient&lt;BR /&gt;privilege show level 3 mode exec command vpn&lt;BR /&gt;privilege show level 3 mode exec command blocks&lt;BR /&gt;privilege show level 3 mode exec command wccp&lt;BR /&gt;privilege show level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege show level 3 mode exec command webvpn&lt;BR /&gt;privilege show level 3 mode exec command module&lt;BR /&gt;privilege show level 3 mode exec command uauth&lt;BR /&gt;privilege show level 3 mode exec command compression&lt;BR /&gt;privilege show level 3 mode configure command interface&lt;BR /&gt;privilege show level 3 mode configure command clock&lt;BR /&gt;privilege show level 3 mode configure command access-list&lt;BR /&gt;privilege show level 3 mode configure command logging&lt;BR /&gt;privilege show level 3 mode configure command ip&lt;BR /&gt;privilege show level 3 mode configure command failover&lt;BR /&gt;privilege show level 5 mode configure command asdm&lt;BR /&gt;privilege show level 3 mode configure command arp&lt;BR /&gt;privilege show level 3 mode configure command route&lt;BR /&gt;privilege show level 3 mode configure command aaa-server&lt;BR /&gt;privilege show level 3 mode configure command aaa&lt;BR /&gt;privilege show level 3 mode configure command crypto&lt;BR /&gt;privilege show level 3 mode configure command ssh&lt;BR /&gt;privilege show level 3 mode configure command dhcpd&lt;BR /&gt;privilege show level 5 mode configure command privilege&lt;BR /&gt;privilege clear level 3 mode exec command dns-hosts&lt;BR /&gt;privilege clear level 3 mode exec command logging&lt;BR /&gt;privilege clear level 3 mode exec command arp&lt;BR /&gt;privilege clear level 3 mode exec command aaa-server&lt;BR /&gt;privilege clear level 3 mode exec command crypto&lt;BR /&gt;privilege clear level 3 mode exec command dynamic-filter&lt;BR /&gt;privilege cmd level 3 mode configure command failover&lt;BR /&gt;privilege clear level 3 mode configure command logging&lt;BR /&gt;privilege clear level 3 mode configure command arp&lt;BR /&gt;privilege clear level 3 mode configure command crypto&lt;BR /&gt;privilege clear level 3 mode configure command aaa-server&lt;BR /&gt;prompt hostname context &lt;BR /&gt;Cryptochecksum:77952a320e0b3abea34c25a61c55e355&lt;BR /&gt;: end&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 13:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535131#M608916</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T13:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535132#M608917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Perry,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the latest configuration you pasted here,I see that you have only created a Static NAT for the 192.168.5.100 machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, we need to create Static PAT rules to get it work according to our requirement.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Please add NAT rules as Mirober suggested and everything should be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please remove the NAT configuration you added,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;object network PublicServer_NAT1&lt;BR /&gt; nat (test,outside) static A_24.222.XXX.XXX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;no object network PublicServer_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="padding-left: 150px;"&gt;Then add the NAT rules as suggested by Mirober.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 13:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535132#M608917</guid>
      <dc:creator>apothula</dc:creator>
      <dc:date>2010-10-23T13:35:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535133#M608918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At this time I am just getting one working and it isnt cooperating but I think it should from what I have in the config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cant even get it to see the web server I have in there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 14:36:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535133#M608918</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T14:36:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535134#M608919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Now I have for the one server on 192.168.5.100,,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have access to the one machine from outside the network However on this system inside I cant see it what do I need so the 192.168.1.0 network can go out and back into the 24.222.224.220? and then ill work on the second server on port 8080.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 14:45:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535134#M608919</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T14:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535135#M608920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You might want to add an ACL on the outside interface allowing ftp traffic through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in permit tcp any any eq ftp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should get the FTP part to work.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;As far as the translation on port 8080 is concerned, as I suggested earlier, we need to change the NAT configuration according to Mirober's suggestion.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, we need to add an ACL allowing traffic on TCP port 8080 similar to the line i suggested above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 14:56:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535135#M608920</guid>
      <dc:creator>apothula</dc:creator>
      <dc:date>2010-10-23T14:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535136#M608921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you please explain your earlier post in better detail &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nash&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 15:03:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535136#M608921</guid>
      <dc:creator>apothula</dc:creator>
      <dc:date>2010-10-23T15:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535137#M608922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;show run nat&lt;BR /&gt;!&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt;nat (inside,outside) dynamic interface&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt;nat (test,outside) dynamic interface&lt;BR /&gt;object network obj-192.168.5.100-www&lt;BR /&gt;nat (test,outside) static 24.222.224.220 service tcp www www&lt;BR /&gt;object network obj-192.168.5.100-ftp&lt;BR /&gt;nat (test,outside) static interface service tcp ftp ftp&lt;BR /&gt;object network obj-192.168.5.101-8080&lt;BR /&gt;nat (test,outside) static interface service tcp 8080 8080&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run obj&lt;BR /&gt;object network 192.168.1.0&lt;BR /&gt;subnet 0.0.0.0 0.0.0.0&lt;BR /&gt;object network 192.168.5.0&lt;BR /&gt;subnet 192.168.5.0 255.255.255.0&lt;BR /&gt;object network obj-192.168.5.100-www&lt;BR /&gt;host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.100-ftp&lt;BR /&gt;host 192.168.5.100&lt;BR /&gt;object network obj-192.168.5.101-8080&lt;BR /&gt;host 192.168.5.101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show run access-list&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.5.0 eq www&lt;BR /&gt;access-list outside_access_in extended permit tcp any object 192.168.5.0 eq ftp&lt;BR /&gt;access-list outside_access_in extended permit object tcp-8080 any object 192.168.5.0&lt;BR /&gt;access-list outsidein standard permit 192.168.1.0 255.255.255.0&lt;BR /&gt;access-list outsidein standard permit 192.168.5.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now how do I set this up so that its accessable from the 192.168.1.0 network which is the other network on the asa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 15:16:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535137#M608922</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T15:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535138#M608923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perry, I think I understand your point here.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You mean to say that you can access the server from the outside with no issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, when you try to access the server from the Inside Network itself, you are facing problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well, if that is the case, the problem is because of DNS resolution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are two scenarios here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. We are using an external DNS server&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Soln : In this case we can use DNS doctoring to resolve the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. We are using an Internal DNS server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Soln1 : We could either make the DNS server provide the local IP address of the server for DNS queries coming from the inside network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Soln2 : Create a NAT translation to translation public to private on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if the information is useful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nash.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 15:16:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535138#M608923</guid>
      <dc:creator>apothula</dc:creator>
      <dc:date>2010-10-23T15:16:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535139#M608924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please see post before yours asking for clarification.. Thanks for all the help by the way&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 15:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535139#M608924</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T15:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535140#M608925</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am using an external dns server...24.222.0.96 and 24.222.0.97&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 15:25:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535140#M608925</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T15:25:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to do This nat server thing</title>
      <link>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535141#M608926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a matter of fact I cannot even get from inside out and back to my&lt;/P&gt;&lt;P&gt;outside ip address 24.222.224.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can get everywhere else on the internet though.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Oct 2010 17:27:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-do-this-nat-server-thing/m-p/1535141#M608926</guid>
      <dc:creator>pskipton01</dc:creator>
      <dc:date>2010-10-23T17:27:58Z</dc:date>
    </item>
  </channel>
</rss>

