<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 8.3 policy nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451768#M654953</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How does the ASA know how to nat the public IP to the real address, 10.21.5.13, of the AXA-Citrix-A10 host?&amp;nbsp; Wouldn't I have to create the object and add the real IP somewhere?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Jul 2010 13:55:53 GMT</pubDate>
    <dc:creator>WILLIAM STEGMAN</dc:creator>
    <dc:date>2010-07-02T13:55:53Z</dc:date>
    <item>
      <title>8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451766#M654951</link>
      <description>&lt;P&gt;Hi, I'm trying to convert a policy nat entry from 8.0.x to 8.3&lt;/P&gt;&lt;P&gt; and am hoping someone can check my config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My old config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list PNAT-A10 remark any Internet hosts to DMZ A10 hosted servers&lt;BR /&gt;access-list PNAT-A10 extended permit ip any host 23.23.25.25 (Public IP)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list PNAT-A10 outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (CustDMZ_1) 2 10.21.5.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network AXA-Citrix-A10_10.21.5.13&lt;/P&gt;&lt;P&gt; host 10.21.5.13&lt;BR /&gt; nat (CustDMZ_1,outside) static 23.23.25.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network obj-10.21.5.5 &lt;BR /&gt; host 10.21.5.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (CustDMZ_1,outside) source dynamic any obj-10.21.5.5 destination static AXA-Citrix-A10_10.21.5.13 AXA-Citrix-A10_10.21.5.13&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this right?&amp;nbsp; I want to make Internet clients appear as 10.21.5.5 when they hit the public address 23.23.25.25. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bill&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:06:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451766#M654951</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2019-03-11T18:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451767#M654952</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are almost right, the interfaces on the NAT statement is the other way round and the destination should be the public ip address instead of the real ip address. It should be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network AXA-Citrix-A10_23.23.25.25&lt;/P&gt;&lt;P&gt;host 23.23.25.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,CustDMZ_1) source dynamic any obj-10.21.5.5 destination&amp;nbsp; static AXA-Citrix-A10_23.23.25.25 AXA-Citrix-A10_23.23.25.25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 23:35:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451767#M654952</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-07-01T23:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451768#M654953</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How does the ASA know how to nat the public IP to the real address, 10.21.5.13, of the AXA-Citrix-A10 host?&amp;nbsp; Wouldn't I have to create the object and add the real IP somewhere?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 13:55:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451768#M654953</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-07-02T13:55:53Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451769#M654955</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could I also ask how disabled split tunneling traffic is now handled so VPN users use the Corporate Internet link?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Old config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;New config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network RAVPN_192.168.1.0&lt;/P&gt;&lt;P&gt;subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (outside,outside) dynamic interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks again&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 15:26:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451769#M654955</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-07-02T15:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451770#M654957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you already have the configuration to statically translate the server to a public ip address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network AXA-Citrix-A10_10.21.5.13&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 10.21.5.13&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (CustDMZ_1,outside) static 23.23.25.25&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 23:08:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451770#M654957</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-07-02T23:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451771#M654958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, the following config posted is correct:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network RAVPN_192.168.1.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; subnet 192.168.1.0&amp;nbsp; 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (outside,outside) dynamic interface&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jul 2010 23:09:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451771#M654958</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-07-02T23:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451772#M654959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you for your help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Jul 2010 01:39:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451772#M654959</guid>
      <dc:creator>WILLIAM STEGMAN</dc:creator>
      <dc:date>2010-07-03T01:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: 8.3 policy nat</title>
      <link>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451773#M654960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also you can check this document as a reference:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2 class="title-page"&gt;Cisco ASA 5500 Migration Guide for Version 8.3&lt;/H2&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Jul 2010 04:23:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/8-3-policy-nat/m-p/1451773#M654960</guid>
      <dc:creator>Jorge Salas</dc:creator>
      <dc:date>2010-07-03T04:23:51Z</dc:date>
    </item>
  </channel>
</rss>

