<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: server  ip translation with asa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532094#M616207</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Apologize if my question was not clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taking the eg. that you have stated, our policy needs me to use the same public IP for this server host 1.1.1.1 when going out to internet &amp;amp; use the same public IP&amp;nbsp; for inbound connections to this server initiated by any source from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Nov 2010 14:24:32 GMT</pubDate>
    <dc:creator>suthomas1</dc:creator>
    <dc:date>2010-11-17T14:24:32Z</dc:date>
    <item>
      <title>server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532092#M616203</link>
      <description>&lt;P&gt;One of the server host uses the same internet ip to get on to internet and also receive the request from internet to itself. this was done for address space restraint. But a recent security audit has forced to seperate the communication for this server using a single internet registered ip both ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i.e server host 10.19.2.2 will use internet IP X.X.X.X for internet bound data from itself &amp;amp; the same X.X.X.X internet IP will be used to reach this host when any other host on internet needs to start a new connection to 10.19.2.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Insights into how best,this can be achieved, will be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:10:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532092#M616203</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T19:10:32Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532093#M616205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to do this on ASA you can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) tcp 2.2.2.2 80 1.1.1.1 80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 1.1.1.1 255.255.255.255&lt;/P&gt;&lt;P&gt;global (outside) 1 2.2.2.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above example assumes the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound connections to the server (1.1.1.1) will use the NAT IP (2.2.2.2) when the requests comes on port 80.&lt;/P&gt;&lt;P&gt;Outbound traffic from the server will use (2.2.2.3) to get to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:07:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532093#M616205</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-17T14:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532094#M616207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks. Apologize if my question was not clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Taking the eg. that you have stated, our policy needs me to use the same public IP for this server host 1.1.1.1 when going out to internet &amp;amp; use the same public IP&amp;nbsp; for inbound connections to this server initiated by any source from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:24:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532094#M616207</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-11-17T14:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532095#M616208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case you can modify the configuration to this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) 2.2.2.2 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above command will always translate 1.1.1.1 to 2.2.2.2 for inbound or outbound trafffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532095#M616208</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-17T14:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532096#M616209</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;so the static line will accomplish the task for both inbound &amp;amp; outbound using same ip.&lt;/P&gt;&lt;P&gt;and i would say there needs to be an acl on the outside interface for the incoming new request. would this static and rule hold true for both tcp &amp;amp; udp connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your help. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:35:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532096#M616209</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-11-17T14:35:50Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532097#M616210</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;The static will hold true for TCP and UDP connections.&lt;/P&gt;&lt;P&gt;Also, to allow incoming traffic you require the ACL as you mentioned. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:37:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532097#M616210</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-17T14:37:31Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532098#M616211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, last query , to check these connections when in use , would sh conn and sh xlate be appropriate commands . Or any other command for this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:47:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532098#M616211</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-11-17T14:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: server  ip translation with asa</title>
      <link>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532099#M616212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct.&lt;/P&gt;&lt;P&gt;To check the translations (layer 3) you use sh xlate&lt;/P&gt;&lt;P&gt;To check the connections (layer 4) you use sh conn (sh conn state/sh conn det)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since you have a static one-to-one NAT, there's going to be a single XLATE with multiple connections for that particular host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Nov 2010 14:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/server-ip-translation-with-asa/m-p/1532099#M616212</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-11-17T14:49:56Z</dc:date>
    </item>
  </channel>
</rss>

