<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configuring FWSM on 6509 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517864#M609136</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try it out; but would it be possible that I can ping the host in vlan 4 from vlan 3 or vice versa on their mapped IPs, instead of real IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the same way when inside users or other LAN users are able to ping host in vlan 3 &amp;amp; 4 on their mapped IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I am clear in explaning the objectives.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 15 Oct 2010 15:37:37 GMT</pubDate>
    <dc:creator>zulqurnain</dc:creator>
    <dc:date>2010-10-15T15:37:37Z</dc:date>
    <item>
      <title>Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517860#M609124</link>
      <description>&lt;P&gt;&lt;SPAN class="pBody postableBody"&gt;Hi Everyone,&lt;BR /&gt;&lt;BR /&gt;I have a scenario which I am working on; it is required from myself that on our 6509 FWSM I create&amp;nbsp; 2 or 4 possible VLANs (maybe more) having different security levels; having different IP subnets; and machines connected to these VLANs should be mapped to FWSM outside interface so that inside users/LAN users connecting to these machines cannot know the real IP; meaning like we do the publishing of webserver using FW to internet, same way difference is I am not publishing to internet only to LAN users / users who will belong to inside of FWSM. &lt;BR /&gt;&lt;BR /&gt;At present I have configure the 6509 and FWSM as below&lt;BR /&gt;&lt;BR /&gt;6509-E&lt;BR /&gt;Created 4 VLANs with ofcourse different IPs and named with as below e.g. &lt;BR /&gt;&lt;BR /&gt;VLAN 1 = 172.21.101.0/24 inside L2&lt;BR /&gt;VLAN 2 = 172.21.102.0/24 outside L3 (to make is routable on the LAN; servers will be published using this interface)&lt;BR /&gt;VLAN 3 = 172.21.103.0/24 SVRGRP_1&lt;BR /&gt;VLAN 4 = 172.21.104.0/24 SVRGRP_2&lt;BR /&gt;&lt;BR /&gt;Assigned different ports on 6509 to different VLANs excluding VLAN 2 because it is to be used on FWSM as outside; configured the machines in those VLANs with corresponding IPs. &lt;BR /&gt;&lt;BR /&gt;FWSM&lt;BR /&gt;As stated above VLAN 1 become inside and VLAN 2 outside; then created access-lists for all interfaces to allow any/any and configured icmp permit any for all interfaces;configured static for hosts in VLAN 3 and VLAN 4 and inside as following&lt;BR /&gt;static (SVRGRP_1,outside) 172.21.102.200 172.21.103.10 netmask 255.255.255.255&lt;BR /&gt;static (DVRGRP_2,outside) 172.21.102.201 172.21.104.12 netmask 255.255.255.255 &lt;BR /&gt;static (inside,outside) 172.21.102.65 172.20.101.65 netmask 255.255.255.255&lt;BR /&gt;&lt;BR /&gt;Machines in VLAN 3,4 and inside are able to ping to GW and LAN users without any problem &amp;amp; vice versa from LAN users to these hosts in different VLANs ( using their mapped IPs and not real IPs &amp;amp; this was one of the objectives); yet different VLANs e.g. VLAN 3 cannot ping to VLAN 4 on mapped IPs as well as real IPs; &lt;BR /&gt;&lt;BR /&gt;Thus as said before only LAN client machines can ping VLAN 3 and VLAN 4 and inside hosts on their mapped IP.&lt;BR /&gt;&lt;BR /&gt;I hope my objective is clear and one of the experts will help find a solution to my problem &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:54:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517860#M609124</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2019-03-11T18:54:32Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517861#M609126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are the security levels for these interfaces?&lt;/P&gt;&lt;P&gt;Have you enabled nat-control? (sh run all | i nat-control)&lt;/P&gt;&lt;P&gt;What do the logs say when ping fails between vlan 3 and vlan 4?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you configured translation between vlan 3 and vlan 4? Assuming vlan 3 is of higer security level than vlan 4 you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(&lt;SPAN class="pBody postableBody"&gt;SVRGRP_1,&lt;/SPAN&gt;&lt;SPAN class="pBody postableBody"&gt;SVRGRP_2) 17&lt;/SPAN&gt;&lt;SPAN class="pBody postableBody"&gt;2.21.103.0 &lt;/SPAN&gt;&lt;SPAN class="pBody postableBody"&gt;17&lt;/SPAN&gt;&lt;SPAN class="pBody postableBody"&gt;2.21.103.0 net 255.255.255.0&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 01:11:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517861#M609126</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-15T01:11:47Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517862#M609130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Security-Levels are as following&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 1 (inside) = 100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 2 (outside) = 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 3 (SVRGRP_1) = 90&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; VLAN 4 (SVRGRP_2) = 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. nat-control is enabled;&amp;nbsp; should I disabled it and what steps are required in e.g. restart firewall or clear xlate or something else ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. when I ping from vlan 3 to vlan 4 or vice versa I get error 305005 and if I configure nat according to 305005 recommended action I get error 305006&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/system/message/logmsgs.html#wp1280900"&gt;http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/system/message/logmsgs.html#wp1280900&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. No I have not yet configured a static translation because I thought if I do this configuration then I will end up ping from vlan 3 host to vlan 4 host on there real IPs instead of there mapped IPs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 10:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517862#M609130</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2010-10-15T10:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517863#M609133</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pls. configure the static translation that I provided and try the ping using the real address on the other interface and vice versa. It should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you turn off nat-control there is no need for a reboot and there is no need for the identity static that I suggested either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 12:27:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517863#M609133</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-15T12:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517864#M609136</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try it out; but would it be possible that I can ping the host in vlan 4 from vlan 3 or vice versa on their mapped IPs, instead of real IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean the same way when inside users or other LAN users are able to ping host in vlan 3 &amp;amp; 4 on their mapped IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope I am clear in explaning the objectives.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 15 Oct 2010 15:37:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517864#M609136</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2010-10-15T15:37:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517865#M609139</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1st I configured the static as you said and I counld'nt not ping from SVRGRP_1 host to SVRGRP_2 host&lt;/P&gt;&lt;P&gt;2nd I removed the nat-control and I still counld'nt ping from SVRGRP_1 host to SVRGRP_2 host&lt;/P&gt;&lt;P&gt;3rd I removed the static which I configued 1st and ping from SVRGRP_1 host to SVRGRP_2 host, I was able to successfully BUT only on there real IPs and not the mapped IPs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;how can I be able to ping from SVRGRP_1 host to SVRGRP_2 host on mapped IP , whereas SVRGRP_1 has higher security-level.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 10:24:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517865#M609139</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2010-10-16T10:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517866#M609141</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1st I configured the static as you said and I counld'nt not ping from SVRGRP_1 host to SVRGRP_2 host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;gt;By using what IP address? The mapped IP right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. make it a habit to ping and address hosts within your network only by their real IPs as best as possible.&amp;nbsp; The mapped IP is for people in the internet to reach your servers hosting web or e-mail or other services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static that I gave you is correct.&amp;nbsp; You should be able to ping between vlan 3 and vlan 4 using the real ip address of the servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still insist on reaching the servers using their mapped IP from the inside then you need to look into what is called DNS re-write.&amp;nbsp; There are some preq. for that - which is to enable dns inspection and dns request from the client pc should go through this FWSM and all that stuff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My suggestion would be to try to access the servers using their real ip. This is best practice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 12:55:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517866#M609141</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-16T12:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517867#M609143</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I configured the static, I was not able to ping or either IPs real or mapped. I was only able to ping when was without your static and I removed the nat-control but this ping was only happening on real IPs .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree with your comment that it is best practise to ping on real IPs rather then mapped IPs but we have some limitation due to which I am asked to achieve this objective that not only LAN users be able to ping hosts in SVRGRP_1 and SVRGRP_2 to their mapped IPs but also between they are able to do so to each on mapped rather then real IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am positive that their should be a way to achieve it , it's just I can't make it possible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 15:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517867#M609143</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2010-10-16T15:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517868#M609145</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Was the access-list allowing icmp from source to dest? I think so or you wouldn't have been able to ping without nat-control and no statics.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. is icmp inspection enabled? - with this you don't have to allow replies with an acl applied on the interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Now, when it breaks with identity static going from high to low security interface what do the logs say?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging bufffered 7&lt;/P&gt;&lt;P&gt;exit&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where x.x.x.x is either the source or dest. of the pings.&amp;nbsp; Try to see tcp flow would work. Try RDC or http.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Now, trying to access the mapped IP from the inside, you need to add destination NAT for that.&amp;nbsp; It is a little tricky to get this to work. We almost have to be on the box configuring the lines and watching the logs.&amp;nbsp; It may take a long time getting this accomplished via the support forum.&amp;nbsp; I suggest you open a TAC case so, we can look at this for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a sample if you want to give it a shot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside host (10.1.1.1) ---FWSM---router--Interter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ (webserver 192.168.1.1 translation to 1.1.1.1 on the internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the inside host 10.1.1.1 to access the DMZ server using his private address 1921.68.1.1 you just need the following:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.1.0 10.1.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the inside host 10.1.1.1 to access the DMZ server using the address 1.1.1.1 you need the following in addition to the above.&lt;/P&gt;&lt;P&gt;static (dmz,inside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, my suggestion would be to open a TAC case if this doesn't work for you as these kind of issues may take a lot longer to solve via e-mail or posts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 16 Oct 2010 16:15:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517868#M609145</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-16T16:15:39Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517869#M609147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;"&lt;/P&gt;&lt;P&gt;inside host (10.1.1.1) ---FWSM---router--Interter&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DMZ (webserver 192.168.1.1 translation to 1.1.1.1 on the internet)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the inside host 10.1.1.1 to access the DMZ server using his private address 1921.68.1.1 you just need the following:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.1.1.0 10.1.1.0 net 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the inside host 10.1.1.1 to access the DMZ server using the address 1.1.1.1 you need the following in addition to the above.&lt;/P&gt;&lt;P&gt;static (dmz,inside) 1.1.1.1 192.168.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;The above I am very comfortable working in and have already achived, if you read my first post, what I have been asking is if I want DMZ_1 host accessing DMZ_2 host using the address 1.1.1.1 as example 2 , knowning DMZ_1 has higher or equal security-level configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will open a TAC case also; but it will be some time as my PICA access has some problem and I need to contact our local support in order to grant me once again the requested access for opening TAC on my ID. &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; untill then if you can help me I would appercaite. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Oct 2010 07:41:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517869#M609147</guid>
      <dc:creator>zulqurnain</dc:creator>
      <dc:date>2010-10-17T07:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configuring FWSM on 6509</title>
      <link>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517870#M609149</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Follow this forumla:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source identity nat goes from high to low:&lt;/P&gt;&lt;P&gt;static (high,low) high_security_net high_security_net netmask 255.255.x.x&lt;/P&gt;&lt;P&gt;This will provide source address translation for all hosts on the high security subnet e when they go to a lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;destination nat goes low to high:&lt;/P&gt;&lt;P&gt;static (low,high) mapped_ip real_ip_in_low net 255.255.255.255&lt;/P&gt;&lt;P&gt;This dest nat will receive packets on the high security interface destined to the mapped_ip and send it to the real ip in the lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can fill in the interface names and IP addresses in the above static lines.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you have all diff. interfaces wanting to do this to all other interfaces this could get ugly. This is the reason for mentioning best practice.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 17 Oct 2010 13:19:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/configuring-fwsm-on-6509/m-p/1517870#M609149</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-10-17T13:19:46Z</dc:date>
    </item>
  </channel>
</rss>

