<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485313#M658962</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like this can be done with policy nat which can have 2 global addresses pointing to a single local address. So for example if your server has an ip address of 192.168.1.1 which is moving to DMZ interface with new address of 192.168.2.1 so you want users can still reach the other older address and also the new address. Here is the sample config to achieve this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;access-list policy_nat_web1 extended permit ip host 192.168.2.1 any&lt;BR /&gt;access-list policy_nat_web2 extended permit ip host 192.168.2.1 any&lt;BR /&gt;&lt;BR /&gt;static (dmz,outside) 192.168.1.1&amp;nbsp; access-list policy_nat_web1&lt;BR /&gt;static (&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;dmz,outside&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;) 192.168.2.1&amp;nbsp; access-list policy_nat_web2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;So when users access 192.168.2.1 it will be sent to the real address 192.168.2.1 and when they access 192.168.1.1 older legacy address, it will be redirected to the new address.&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 26 Aug 2010 17:37:41 GMT</pubDate>
    <dc:creator>andhingr</dc:creator>
    <dc:date>2010-08-26T17:37:41Z</dc:date>
    <item>
      <title>Using NAT to Direct Traffic Destined to Old IP Address to New Addresses</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485311#M658946</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple of servers i'm moving to a DMZ.&amp;nbsp; They currently exist on an inside network behind a pix 535 (6.3(5)) with public addresses that are well known.&amp;nbsp; They are on a /24 with numerous other hosts that need to keep their existing addresses.&amp;nbsp; I need to readdress the servers into a new /28 range that is also public but as the old addresses are well known have to maintain the old addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both the DMZ and Border firewalls are connected to the same Cisco router.&amp;nbsp; The DMZ firewall a pix 525 running 7.X.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I static route the /32 of the old addresses to the external interface of the DMZ firewall on the router then configure a NAT on the DMZ firewall to map the old addresses to the new will outside hosts be able to access the servers in the DMZ using the new addresses?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External hosts connecting to the servers on the legacy addresses to be natted to the new addresses and the responses natted showing the replies coming from the legacy addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External hosts connecting to the servers on the new addresses to connect directly to the servers and the responses to originate from the new addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is an ugly hack and I'll have to do some routing and arp voodo on my inside network to minimize black holes but this is what happens when people hard code IP addresses into appliances.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485311#M658946</guid>
      <dc:creator>GrumpyBear</dc:creator>
      <dc:date>2019-03-11T18:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485312#M658954</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This doesn't seem too bad, let me create an example scenario and see if it matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Say that my inside is 192.168.1.0/24 and my clients need to get to a server that is currently 192.168.1.5, but will be moved to the DMZ and readdressed as 10.0.0.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I would do then is a static to produce a destination NAT change, basically when the packet hits the firewall it will NAT the destination address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the static I would create&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.1.5 10.0.0.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This way whenever a packet hits the firewall destined for 192.168.1.5 it should be routed to the DMZ and be changed so that the new destination address is 10.0.0.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The firewall should ARP for this address once the static is created, so hopefully you won't need to configure any static arp entries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this kind of what you were looking for?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 17:07:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485312#M658954</guid>
      <dc:creator>August Ritchie</dc:creator>
      <dc:date>2010-08-26T17:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485313#M658962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like this can be done with policy nat which can have 2 global addresses pointing to a single local address. So for example if your server has an ip address of 192.168.1.1 which is moving to DMZ interface with new address of 192.168.2.1 so you want users can still reach the other older address and also the new address. Here is the sample config to achieve this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;access-list policy_nat_web1 extended permit ip host 192.168.2.1 any&lt;BR /&gt;access-list policy_nat_web2 extended permit ip host 192.168.2.1 any&lt;BR /&gt;&lt;BR /&gt;static (dmz,outside) 192.168.1.1&amp;nbsp; access-list policy_nat_web1&lt;BR /&gt;static (&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; "&gt;dmz,outside&lt;/SPAN&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;) 192.168.2.1&amp;nbsp; access-list policy_nat_web2&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;So when users access 192.168.2.1 it will be sent to the real address 192.168.2.1 and when they access 192.168.1.1 older legacy address, it will be redirected to the new address.&lt;BR /&gt;&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 17:37:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485313#M658962</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-26T17:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485314#M658973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your explanation, it looks like your setting is as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet -- RTR ---DMZ---Firewall ---- Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, you would like to change the IP of the servers to a new range and you want the firewall to host the old IP addresses and translate those old addresses to new address. I am assuming that you would also like the servers to be accessed with their new addresses. You could use policy NAT for this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list pnat1 permit ip host &lt;SERVERS ip=""&gt; any access-list pnat2 permit ip host &lt;SERVERS ip=""&gt; any&lt;/SERVERS&gt;&lt;/SERVERS&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) &lt;OLD ip=""&gt; access-list pnat1 static (inside,outside) &lt;SERVERS ip=""&gt; access-list pnat2&lt;/SERVERS&gt;&lt;/OLD&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Make sure that you are using proper access-lists to allow all the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Nagaraja Thanthry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 26 Aug 2010 18:28:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485314#M658973</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-26T18:28:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485315#M658985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for all the fast responses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for the delays in my responding back but I'm actually on vacation up at my parent's summer home (what we, here in Canada, refer to as a "cottage" irrespective of the fact it is a huge chalet with sattelite TV, 3 bathrooms and DSL).&amp;nbsp; I made the mistake of reporting the telephone line as being noisy to the phone company.&amp;nbsp; The next day a technician arrived and fixed the noise on the line by swapping pairs between us and the CO.&amp;nbsp; The only problem appeared to be that the DSL connection was dead which the technician informed might take a couple of days to fix as someone would have to actually play with the DSLAM at the CO.&amp;nbsp; So the next day I got the DSL back but noticed that long distance dialling no longer worked.&amp;nbsp; Upon phoning repair I was told that they would fix it on Monday, 4 days later.&amp;nbsp; Luckily I had the technician's cell phone number from the original visit and he was able to get it working after being on hold for 20 minutes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THANK GOODNESS FOR FRIENDS IN LOW PLACES&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No long distance might not be a problem in most places but the only local calls I han make here are into a town of 1200 people where I know no one so long distance calling is essential.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with my layer 0 &amp;amp; 1 problems fixed ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is some bad ASCII Art:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Internet &amp;lt;-&amp;gt; Router &amp;lt;-&amp;gt; Border Firewall &amp;lt;-&amp;gt; Soft Chewy Inside Networks &amp;lt;-&amp;gt; 172.16.168.1/24 &amp;lt;-&amp;gt; 172.16.168.164&lt;/P&gt;&lt;P&gt;Internet &amp;lt;-&amp;gt; Router &amp;lt;-&amp;gt; DMZ Firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After&lt;/P&gt;&lt;P&gt;Internet &amp;lt;-&amp;gt; Router &amp;lt;-&amp;gt; Border Firewall &amp;lt;-&amp;gt; Soft&amp;nbsp; Chewy Inside Networks &amp;lt;-&amp;gt; 172.16.168.1/24 &amp;lt;-&amp;gt; OtherExisting 172.16.168.0/24 Hosts&lt;/P&gt;&lt;P&gt;Internet&amp;nbsp; &amp;lt;-&amp;gt; Router &amp;lt;-&amp;gt; DMZ Firewall &amp;lt;-&amp;gt; 172.16.10.1/28 &amp;lt;-&amp;gt; 172.16.10.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.168.164 - Old IP Address of Server&lt;/P&gt;&lt;P&gt;172.16.10.5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - New IP Address of Server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Router" has a static route thus: ip route 172.16.168.164 255.255.255.255 &lt;IP of=""&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT - you are suggesting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list pnat1 permit ip host 172.16.10.5 any&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; pnat2 permit ip host 172.16.10.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.168.164 access-list pnat1&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.10.5&amp;nbsp; access-list pnat2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This seems a little counter intuitive to me (which probably means it will work &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping that I could just NAT from the old IP to the New:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list pnat permit ip host 172.16.10.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.168.164 access-list pnat1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and host accessing the new IP directly (172.16.10.5) would be able to connect to it un translated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 14:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485315#M658985</guid>
      <dc:creator>GrumpyBear</dc:creator>
      <dc:date>2010-08-28T14:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485316#M659001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No you will need to create both static policy nat to make this work. With just one the current xlate will point to 172.16.168.164 and traffic coming directly to new IP 172.16.10.5 will get dropped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Aug 2010 21:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485316#M659001</guid>
      <dc:creator>andhingr</dc:creator>
      <dc:date>2010-08-28T21:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485317#M659012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I doubt if the following will work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list pnat1 permit ip host 172.16.10.5 any&lt;/P&gt;&lt;P&gt;access-list&amp;nbsp; pnat2 permit ip host 172.16.10.5 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.168.164 access-list pnat1&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.10.5&amp;nbsp; access-list pnat2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the same as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.168.164 172.16.10.5&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.10.5 172.16.10.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which is not allowed.&amp;nbsp; Same reason with the above policy nat as well.&amp;nbsp; Which ever line gets in the table first will work and the other may not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Aug 2010 12:26:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485317#M659012</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-29T12:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485318#M659021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello KS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is the normal policy NAT configuration outlined by Cisco to map&lt;/P&gt;&lt;P&gt;multiple public IP to one single internal IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example091&lt;/P&gt;&lt;P&gt;86a00807d2874.shtml&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, in this case, one of the public IP will be the identity address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Aug 2010 14:46:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485318#M659021</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-08-29T14:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: Using NAT to Direct Traffic Destined to Old IP Address to Ne</title>
      <link>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485319#M659029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;NT,&lt;/P&gt;&lt;P&gt;Thanks for testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anil,&lt;/P&gt;&lt;P&gt;Thanks for confirming that this trick does work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I stand corrected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess this policy nat will perfectly solve Grumpybear's (probably grumpier in Canada) problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Aug 2010 01:35:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-nat-to-direct-traffic-destined-to-old-ip-address-to-new/m-p/1485319#M659029</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-31T01:35:29Z</dc:date>
    </item>
  </channel>
</rss>

