<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Changing to NAT on my PIX firewall (currently in drop-in mod in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218750#M611862</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appology for the not getting back, I was not checking the forum recently. I think bf has already answered you properly, if you still need further assistance, feel free to send me email at &lt;A href="mailto:nkhawaja@cisco.com"&gt;nkhawaja@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 15 Nov 2003 08:05:54 GMT</pubDate>
    <dc:creator>nkhawaja</dc:creator>
    <dc:date>2003-11-15T08:05:54Z</dc:date>
    <item>
      <title>Changing to NAT on my PIX firewall (currently in drop-in mode w/real IP's)</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218743#M611853</link>
      <description>&lt;P&gt;I do not know much about PIX firewalls so I'm looking for some help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP's have been changed for the purpose of this posting and security concerns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PIX firewall with the below configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX Version 6.1(2)&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password xxxxxx encrypted&lt;/P&gt;&lt;P&gt;passwd xxxxxx encrypted&lt;/P&gt;&lt;P&gt;hostname BlahBlah&lt;/P&gt;&lt;P&gt;domain-name someone.com&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol h323 1720&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 204.43.93.235 macky&lt;/P&gt;&lt;P&gt;name 204.43.93.234 macky2&lt;/P&gt;&lt;P&gt;name 206.16.32.239 webmack&lt;/P&gt;&lt;P&gt;name 206.16.32.240 joeblow&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 206.16.32.128 255.255.255.128 any &lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;interface ethernet0 10baset&lt;/P&gt;&lt;P&gt;interface ethernet1 10baset&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside x.x.x.x 255.255.255.252&lt;/P&gt;&lt;P&gt;ip address inside x.x.x.129 255.255.255.128&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location x.x.x.x 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;pdm location x.x.x.224 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;conduit permit icmp any any &lt;/P&gt;&lt;P&gt;conduit permit ip any x.x.x.0 255.255.255.0 &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.251 eq smtp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.251 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.251 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.251 eq ident any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.250 eq 1494 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.249 eq 1494 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host webmack eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host webmack eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host joeblow eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host joeblow eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.220 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.221 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.222 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.223 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.230 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.231 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.232 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.233 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.234 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.235 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.236 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.237 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.238 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.241 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.242 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.243 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.244 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.245 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.246 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.247 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.254 eq www any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.220 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.221 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.222 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.223 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.230 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.231 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.232 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.233 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.234 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.235 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.236 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.237 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.238 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.241 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.242 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.243 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.244 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.245 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.246 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.247 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.254 eq ftp any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.220 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.221 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.222 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.223 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.230 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.231 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.232 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.233 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.234 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.235 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.236 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.237 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.238 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.241 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.242 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.243 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.244 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.245 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.246 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.247 eq 443 any &lt;/P&gt;&lt;P&gt;conduit permit tcp host 206.16.32.254 eq 443 any &lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 206.16.32.5 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h323 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+ &lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius &lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http x.x.x.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;http x.x.x.128 255.255.255.128 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;no sysopt route dnat&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh x.x.x.x 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;ssh x.x.x.x 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;Cryptochecksum:xxxxxx&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;[OK]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I need is a configuration change to NAT inside my network using the following IP's.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.32.0/22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.32.1-254 servers&lt;/P&gt;&lt;P&gt;192.168.33.1-254 printers&lt;/P&gt;&lt;P&gt;192.168.34.1-254 workstations&lt;/P&gt;&lt;P&gt;192.168.35.1-254 testing/wireless/ip phones/etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help I'll be tasked to give up the real IP's this coming weekend.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:05:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218743#M611853</guid>
      <dc:creator>rezo247</dc:creator>
      <dc:date>2020-02-21T07:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218744#M611854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have not speficied what translated address you will be using for these IPs. Lets assume you want all these ips to be translated to one address that is of your interface 206.16.32.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so you will need to following lines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.32.0 255.255.252.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also you dont have any route for this 192 network. I am assuming it is on the inside&lt;/P&gt;&lt;P&gt;so you need the following statement as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.32.0 255.255.252.0 &lt;YOUR next="" hop=""&gt;&lt;/YOUR&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2003 00:01:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218744#M611854</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2003-11-13T00:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218745#M611855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Nadeem,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry I ddin't specify.  The IP's I'm looking to translate for are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;206.16.32.230 - .254 (They all need to be statically mapped)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the command is something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 192.168.35.240 206.16.32.240 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;They should only map the following services:&lt;/P&gt;&lt;P&gt;ftp,www,443 (They are websites that do not use host headers)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have never worked with PIX firewalls before so this is completely new for me.  Hopefully I can add new static mappings in the future with very little effort.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2003 14:51:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218745#M611855</guid>
      <dc:creator>rezo247</dc:creator>
      <dc:date>2003-11-13T14:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218746#M611856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Help. I have to do this tommorrow and I'm no closer to getting this done.  I'm a stated above that they all need to be static mappings, but is there anything else I need to consider? Can I send you my real config Nadeem? I work for a non-profit company so they won't foot the ticket for me to call Cisco and walk me through it.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I figure I just need to remove:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and add&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 X.X.X.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remove all the conduit permit entries and replace with static entries like so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (server,outside) tcp interface smtp X.X.X.X smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (server,outside) tcp interface ftp X.X.X.X smtp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (server,outside) tcp interface www X.X.X.X smtp netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I even remotely close?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HELP!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2003 22:17:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218746#M611856</guid>
      <dc:creator>rezo247</dc:creator>
      <dc:date>2003-11-14T22:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218747#M611857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can email me your config file (even with fake addresses) and a very detailed explanation of what you want and I will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;email: &lt;A href="mailto:bobrob_6@hotmail.com"&gt;bobrob_6@hotmail.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2003 01:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218747#M611857</guid>
      <dc:creator>bfl1</dc:creator>
      <dc:date>2003-11-15T01:02:39Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218748#M611858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (server,outside) tcp interface smtp X.X.X.X smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (server,outside) tcp interface ftp X.X.X.X smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;static (server,outside) tcp interface www X.X.X.X smtp netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These commands will not permit the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The first one will map any smtp traffic destined for "interface" to the smtp services on x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second will map all FTP traffic destined for interface to the smtp service on x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to figure out how you want your statics to look and then you'll need access control lists to actually permit the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 1 192.168.1.0 255.255.255.255&lt;/P&gt;&lt;P&gt;global(outside) 1 208.209.3.7 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would map all traffic originating from the inside with the IP address 192.168.1.x to 208.209.3.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have a server say 208.209.3.15 and you want it to host www, ftp, and ssl, you could do this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(inside,outside) 208.209.3.15 192.168.1.5&lt;/P&gt;&lt;P&gt;access-list outside-in permit tcp any host 208.209.3.15 eq www&lt;/P&gt;&lt;P&gt;access-list outside-in permit tcp any host 208.209.3.15 eq ftp&lt;/P&gt;&lt;P&gt;access-list outside-in permit tcp any host 208.209.3.15 eq ssl&lt;/P&gt;&lt;P&gt;access-group outside-in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Send me your config and a detailed explanation of everything and I'll help you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2003 01:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218748#M611858</guid>
      <dc:creator>bfl1</dc:creator>
      <dc:date>2003-11-15T01:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218749#M611860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That should have been:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global(outside) 1 208.209.3.7 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2003 01:45:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218749#M611860</guid>
      <dc:creator>bfl1</dc:creator>
      <dc:date>2003-11-15T01:45:08Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218750#M611862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appology for the not getting back, I was not checking the forum recently. I think bf has already answered you properly, if you still need further assistance, feel free to send me email at &lt;A href="mailto:nkhawaja@cisco.com"&gt;nkhawaja@cisco.com&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Nadeem&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Nov 2003 08:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218750#M611862</guid>
      <dc:creator>nkhawaja</dc:creator>
      <dc:date>2003-11-15T08:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Changing to NAT on my PIX firewall (currently in drop-in mod</title>
      <link>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218751#M611863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What's your email John Mayo.  I am pretty desperate.  I'll have to revert back today if I don't get this fixed this a.m.  You can AIM me at NetResJC or email is &lt;A href="mailto:j.c@comcast.net"&gt;j.c@comcast.net&lt;/A&gt; or &lt;A href="mailto:rezo247@yahoo.com"&gt;rezo247@yahoo.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 16 Nov 2003 13:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/changing-to-nat-on-my-pix-firewall-currently-in-drop-in-mode-w/m-p/218751#M611863</guid>
      <dc:creator>rezo247</dc:creator>
      <dc:date>2003-11-16T13:01:57Z</dc:date>
    </item>
  </channel>
</rss>

