<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: static natting using virtual ip range on inside network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493263#M613272</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Anil.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our network configuration - the outside network is 10.25.41.x.&amp;nbsp;&amp;nbsp; The inside network does NOT route ANY 10.x.x.x address whatsoever that is why I have the ip route statement on the L3 switch as it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order for the inside network to send the 192.168.191.160 traffic back to the ASA, it is my thinking that the L3 switch just needs to send it to the next hops --- which is the inside interface of the firewall.&amp;nbsp; Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, the outside host (10.25.41.4) is trying to access 192.168.193.x host via RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help and I await your response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Aug 2010 00:25:48 GMT</pubDate>
    <dc:creator>tsrader</dc:creator>
    <dc:date>2010-08-28T00:25:48Z</dc:date>
    <item>
      <title>static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493257#M613257</link>
      <description>&lt;P&gt;ASA 5520&lt;/P&gt;&lt;P&gt;ver 8.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I read that can use a virtual ip range to do static nats between inside and outside network&lt;/P&gt;&lt;P&gt;Can someone assist with a short config on how this is done?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside:&amp;nbsp; 192.168.195.201 /29&lt;/P&gt;&lt;P&gt;outside: 10.25.41.1 /27&lt;/P&gt;&lt;P&gt;virtual ip range:&amp;nbsp; 192.168.191.160 /27&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493257#M613257</guid>
      <dc:creator>tsrader</dc:creator>
      <dc:date>2019-03-11T18:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493258#M613260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can use regular static nat to accomplish this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(inside,outside) &lt;GLOBAL_IP_RANGE&gt; &lt;INSIDE_IP range=""&gt; netmask&lt;/INSIDE_IP&gt;&lt;/GLOBAL_IP_RANGE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However since your outside interface is in different ip range and outbound packets will use source address from the 192.168.191.x so your upstream should have a route pointing to ASA outside interface as the next hop for return packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- AD&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 18:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493258#M613260</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-27T18:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493259#M613263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this a correct config?&amp;nbsp; Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside host (10.25.41.4) needs to access inside host (192.168.195.204)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside:&amp;nbsp; 192.168.195.201 255.255.255.248&lt;/P&gt;&lt;P&gt;outside:&amp;nbsp; 10.25.41.1 255.255.255.224&lt;/P&gt;&lt;P&gt;virtual ip range:&amp;nbsp; 192.168.191.160 255.255.255.224&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 192.168.191.164 192.168.195.204 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp host 192.168.195.204 10.25.41.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static router on internal L3 router:&lt;/P&gt;&lt;P&gt;ip route 192.168.191.160 255.255.255.224 192.168.195.201&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 19:03:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493259#M613263</guid>
      <dc:creator>tsrader</dc:creator>
      <dc:date>2010-08-27T19:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493260#M613265</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Couple of corrections&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;change&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp host 192.168.195.204 10.25.41.4&amp;nbsp; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in permit tcp host 10.25.41.4 host 192.168.195.204&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static router on internal L3 router:&lt;/P&gt;&lt;P&gt;ip route 192.168.191.160&amp;nbsp; 255.255.255.224 192.168.195.201&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.191.160&amp;nbsp; 255.255.255.224 10.25.41.1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 19:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493260#M613265</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-27T19:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493261#M613268</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Anil but unfortunately it didnt work.&amp;nbsp; I've provide clarification and partial config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone tell me what I'm doing wrong and provide configuration guidance???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside network consists of multiple networks:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.191.0&lt;BR /&gt;192.168.192.0&lt;BR /&gt;192.168.193.0&lt;BR /&gt;192.168.194.0&lt;BR /&gt;etc&lt;BR /&gt;etc&lt;BR /&gt;etc&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Host on outside network (10.25.41.10) wants to access host on inside network (192.168.194.10) via RDP (tcp/3389)&lt;BR /&gt;- host on inside network (192.168.193.25) wants to access host on outside network (10.25.41.20) via vnc (tcp/5900)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;As IP range created for inside interface is VERY small (6 hosts), I'm forced to use a routable ip address range from inside network to permit more than &lt;BR /&gt;6 hosts.&amp;nbsp; 192.168.191.160 /27 will be used to create static nats&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;fw inside:&amp;nbsp; 192.168.195.220 /29&lt;BR /&gt;fw outside:&amp;nbsp; 10.25.41.1 /27&lt;BR /&gt;virtual range:&amp;nbsp; 192.168.191.161 - .190 /27&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I'm confused on how to create the static nat using the virtual ip range.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;-----------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA Version 8.2(2) &lt;CONTEXT&gt;&lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/0.515&lt;BR /&gt; nameif outside&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.25.41.1 255.255.255.224 &lt;BR /&gt;!&lt;BR /&gt;interface GigabitEthernet0/1.533&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.195.220 255.255.255.248&lt;BR /&gt;!&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------&amp;nbsp; access-list to permit outside to inside host access&amp;nbsp; --------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 10.25.41.4 host 192.168.194.10 eq 3389&lt;BR /&gt;access-list outside_access_in extended permit icmp any any &lt;BR /&gt;access-list inside_access_in extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------&amp;nbsp; create static nat --------------&lt;BR /&gt;static (inside,outside) 10.25.41.4 192.168.191.164 netmask 255.255.255.255 &lt;BR /&gt;--------------------------------------------------------------------------&lt;BR /&gt;access-group outside_access_in in interface outside&lt;BR /&gt;access-group inside_access_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.0.0 192.168.195.217 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;nbsp;&amp;nbsp; directly connected to L3 switch running HSRP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that ASA is connected to L3 switch and it has the following static route:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.191.160 255.255.255.224 192.168.195.220&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 23:18:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493261#M613268</guid>
      <dc:creator>tsrader</dc:creator>
      <dc:date>2010-08-27T23:18:08Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493262#M613270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm not sure If I understood your problem description correctly. Now after getting your config&lt;/P&gt;&lt;P&gt;I understand your topology is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;outside (10.25.41 network)--------------10.25.41.1--ASA--inside (192.168.195.220)--------L3switch range (192.168.191.0-192.168.194.0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the configure static as below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static&amp;nbsp; (inside,outside) 10.25.41.4 192.168.191.164 netmask&amp;nbsp; 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you trying to access 10.25.41.4 from outside host so when the packet reaches to ASA it will get translated to 192.168.191.164. If this is correct then you should change your outside access-list from&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp host 10.25.41.4 host&amp;nbsp; 192.168.194.10 eq 3389&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp &lt;SRC_HOS&gt; host 10.25.41.4 eq 3389&lt;/SRC_HOS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you should also change your static route on l3 switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.191.160 255.255.255.224 192.168.195.220&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 10.25.41.0 255.255.255.0 192.168.195.220&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Aug 2010 23:49:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493262#M613270</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-27T23:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493263#M613272</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks again Anil.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our network configuration - the outside network is 10.25.41.x.&amp;nbsp;&amp;nbsp; The inside network does NOT route ANY 10.x.x.x address whatsoever that is why I have the ip route statement on the L3 switch as it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order for the inside network to send the 192.168.191.160 traffic back to the ASA, it is my thinking that the L3 switch just needs to send it to the next hops --- which is the inside interface of the firewall.&amp;nbsp; Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In my case, the outside host (10.25.41.4) is trying to access 192.168.193.x host via RDP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again for your help and I await your response.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 00:25:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493263#M613272</guid>
      <dc:creator>tsrader</dc:creator>
      <dc:date>2010-08-28T00:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: static natting using virtual ip range on inside network</title>
      <link>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493264#M613274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please add the following to your network in additon to changes (except the routing statement) I suggested in my previous response&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 10.25.41.0 255.255.255.224 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with the above configuration when 10.25.41 network is trying to access your inside network ASA will translate the source address to inside interface of ASA when sending the traffic to inside network.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 00:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting-using-virtual-ip-range-on-inside-network/m-p/1493264#M613274</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-28T00:33:57Z</dc:date>
    </item>
  </channel>
</rss>

