<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Need rules to foward HTTPS traffic based on source IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434347#M645461</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCso79009&amp;nbsp;&amp;nbsp;&amp;nbsp; ENH: Policy static nat should check inbound source IP address w/ACL&lt;BR /&gt;This defect is not resolved yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may not work for you if configured. This is how you would configure it though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 443 access-list from-server-A&lt;/P&gt;&lt;P&gt;access-list from-server-A per tcp 10.10.1.1 eq 443 A.A.A.A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above line will make the firewall receive all 443 traffic destined to 1.1.1.1 from the internet address A.A.A.A to the server on the inside 10.10.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 2.2.2.2 443 access-list from-all-other-ips&lt;/P&gt;&lt;P&gt;access-list from-all-outher-ips per tcp 10.10.2.2 eq 443 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above lines will make the firewall receive all 443 traffic destined to 2.2.2.2 from all other internet addresses to the server on the inside 10.10.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately due to the defect this may not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Aug 2010 19:01:07 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-08-06T19:01:07Z</dc:date>
    <item>
      <title>Need rules to foward HTTPS traffic based on source IP</title>
      <link>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434346#M645460</link>
      <description>&lt;P&gt;I have a Cisco ASA 5505, and I'm trying to forward HTTPS traffic to one internal server if it comes from either of two external networks (i.e. X.Y.0.0/16 and C.0.0.0/8), and to a different server if it comes from anywhere else. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide me with the Policy Static PAT (?) or whatever commands to accomplish this?&amp;nbsp; Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:22:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434346#M645460</guid>
      <dc:creator>mattkl3com</dc:creator>
      <dc:date>2019-03-11T18:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Need rules to foward HTTPS traffic based on source IP</title>
      <link>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434347#M645461</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;CSCso79009&amp;nbsp;&amp;nbsp;&amp;nbsp; ENH: Policy static nat should check inbound source IP address w/ACL&lt;BR /&gt;This defect is not resolved yet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may not work for you if configured. This is how you would configure it though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 1.1.1.1 443 access-list from-server-A&lt;/P&gt;&lt;P&gt;access-list from-server-A per tcp 10.10.1.1 eq 443 A.A.A.A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above line will make the firewall receive all 443 traffic destined to 1.1.1.1 from the internet address A.A.A.A to the server on the inside 10.10.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 2.2.2.2 443 access-list from-all-other-ips&lt;/P&gt;&lt;P&gt;access-list from-all-outher-ips per tcp 10.10.2.2 eq 443 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above lines will make the firewall receive all 443 traffic destined to 2.2.2.2 from all other internet addresses to the server on the inside 10.10.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately due to the defect this may not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 19:01:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434347#M645461</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-06T19:01:07Z</dc:date>
    </item>
    <item>
      <title>Re: Need rules to foward HTTPS traffic based on source IP</title>
      <link>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434348#M645462</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;mattkl3com wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a Cisco ASA 5505, and I'm trying to forward HTTPS traffic to one internal server if it comes from either of two external networks (i.e. X.Y.0.0/16 and C.0.0.0/8), and to a different server if it comes from anywhere else. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone provide me with the Policy Static PAT (?) or whatever commands to accomplish this?&amp;nbsp; Thanks!&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Matt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can't do this on an ASA. What you need is PBR (Policy Based Routing) which is the ability to forward traffic based on something other than just the destination IP address, in your case the source IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the ASA does not support PBR although believe me a lot of people wish it did. For PBR you need a router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 19:03:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/need-rules-to-foward-https-traffic-based-on-source-ip/m-p/1434348#M645462</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-08-06T19:03:06Z</dc:date>
    </item>
  </channel>
</rss>

