<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: static nats and dmz access to the internet in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453101#M654274</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to access your servers from internet? If that is working, then there should not be any issues from the NAT side. I am thinking the issue is with your DNS settings. Are you using DNS server on the inside interface for address resolution? If yes, do you have rules to allow that communication? Can you try to configure 4.2.2.2 as your DNS server and see if you can browse internet? Also, if you have any access-list on the DMZ interface, make sure that internet traffic is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: When you go to internet from DMZ servers, they will take their static translationa addresses. If you do not have a static translation, then they will go with dynamic pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 15 Jul 2010 20:48:15 GMT</pubDate>
    <dc:creator>Nagaraja Thanthry</dc:creator>
    <dc:date>2010-07-15T20:48:15Z</dc:date>
    <item>
      <title>static nats and dmz access to the internet</title>
      <link>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453099#M654244</link>
      <description>&lt;P&gt;Using an ASA5500, I have the following allowing the outside to access servers on the dmz:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 9.9.9.2 192.168.1.2 netmask 255.255.255.255&lt;BR /&gt;static (dmz,outside) 9.9.9.3 192.168.1.3 netmask 255.255.255.255&lt;BR /&gt;static (dmz,outside) 9.9.9.4 192.168.1.4 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-list incoming_outside extended permit tcp any host 9.9.9.2 eq www&lt;/P&gt;&lt;P&gt;access-list incoming_outside extended permit tcp any host 9.9.9.3 eq https&lt;/P&gt;&lt;P&gt;access-list incoming_outside extended permit tcp any host 9.9.9.4 eq www&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group incoming_outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So the outside can access the public address on the respective ports, and that works ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, we also want to allow DMZ servers to access the Internet, so we have the following:&lt;/P&gt;&lt;P&gt;nat (dmz) 2 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 2 9.9.9.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the question is, when dmz servers access the internet should they be pat'ed to their static translation IP address or to global 2?&lt;/P&gt;&lt;P&gt;For example, if 192.168.1.2 is to access the internet, should it be pat'ed to 9.9.9.2 or 9.9.9.100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the issue we are facing is that it goes out as one public IP and comes back as another public IP which could be the reason dmz cannot get to the internet.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:12:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453099#M654244</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2019-03-11T18:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: static nats and dmz access to the internet</title>
      <link>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453100#M654258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ron,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The order-of-operations of NAT is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.) nat 0 access-list (nat-exempt)&lt;/P&gt;&lt;P&gt;2.) existing translations&lt;/P&gt;&lt;P&gt;3.) match static commands (first match)&lt;/P&gt;&lt;P&gt; - static NAT with and without access-list&lt;/P&gt;&lt;P&gt; - static PAT with and without access-list&lt;/P&gt;&lt;P&gt;4.) Match NAT commands&lt;/P&gt;&lt;P&gt; - nat &lt;ID&gt; access-list (first match)&lt;/ID&gt;&lt;/P&gt;&lt;P&gt; - nat &lt;ID&gt; &lt;ADDRESS&gt; &lt;MASK&gt; (best match)&lt;/MASK&gt;&lt;/ADDRESS&gt;&lt;/ID&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With that being said, if a DMZ host 192.168.1.2 does NOT belong to the nat-exempt access-list rule or have an existing translation, it will go out as the 9.9.9.2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any syslogs that you can provide (at the debug level) with the error that you are getting are greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Kevin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 20:32:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453100#M654258</guid>
      <dc:creator>Kevin Redmon</dc:creator>
      <dc:date>2010-07-15T20:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: static nats and dmz access to the internet</title>
      <link>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453101#M654274</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you able to access your servers from internet? If that is working, then there should not be any issues from the NAT side. I am thinking the issue is with your DNS settings. Are you using DNS server on the inside interface for address resolution? If yes, do you have rules to allow that communication? Can you try to configure 4.2.2.2 as your DNS server and see if you can browse internet? Also, if you have any access-list on the DMZ interface, make sure that internet traffic is allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: When you go to internet from DMZ servers, they will take their static translationa addresses. If you do not have a static translation, then they will go with dynamic pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Jul 2010 20:48:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nats-and-dmz-access-to-the-internet/m-p/1453101#M654274</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-15T20:48:15Z</dc:date>
    </item>
  </channel>
</rss>

