<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439490#M667844</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, my intention is to ensure that this second global IP is not being used&amp;nbsp; by other ip's except for 192.168.100.1 to 192.168.100.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat ( inside ) 1 0.0.0.0 0.0.0.0 - this nat is using another global ip address for general overload. I want to ensure ip's from this range doesnt try to use&lt;/P&gt;&lt;P&gt;the second global ip for nat.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Would it be possible without any additional config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 14 Jul 2010 02:30:32 GMT</pubDate>
    <dc:creator>suthomas1</dc:creator>
    <dc:date>2010-07-14T02:30:32Z</dc:date>
    <item>
      <title>nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439486#M667827</link>
      <description>&lt;P&gt;My ASA has an existing overloaded nat in place for all the connections going out.&lt;BR /&gt;like nat ( inside ) 1 0.0.0.0 0.0.0.0 &lt;BR /&gt;i need to configure a seperate nat for outgoing translation with a set of ip's.&lt;BR /&gt;local ip's are 192.168.100.1 to 192.168.100.3 &amp;amp; it is to be natted with 202.88.116.27. Please help on how to configure this for use by these ip's only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:11:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439486#M667827</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T18:11:36Z</dc:date>
    </item>
    <item>
      <title>Re: nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439487#M667831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can specify another NAT pool and specify specific source addresses that will be using that pool. In dynamic NAT, the firewall uses specific translation first before using the generic pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Global (outside) 2 202.88.116.27&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nat (inside) 2 192.168.100.0 255.255.255.252&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above configuration enables all the hosts between 192.168.100.0 to 100.3 to use the 202.88.116.27 address (since 100.0 is the network address, you will not see any traffic from that address).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 00:50:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439487#M667831</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-14T00:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439488#M667835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply. wouldnt i need to deny this pool being used by other internal ip's for nat.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 01:06:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439488#M667835</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-07-14T01:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439489#M667841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once the firewall picks one pool, it will not look for the second pool. The firewall always picks the longest (best) match for every source address (sometimes it will also check the destination address if you have configured policy nat). So, you do not need to explicitly deny an address from using a pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 01:13:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439489#M667841</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-14T01:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439490#M667844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, my intention is to ensure that this second global IP is not being used&amp;nbsp; by other ip's except for 192.168.100.1 to 192.168.100.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat ( inside ) 1 0.0.0.0 0.0.0.0 - this nat is using another global ip address for general overload. I want to ensure ip's from this range doesnt try to use&lt;/P&gt;&lt;P&gt;the second global ip for nat.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Would it be possible without any additional config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 02:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439490#M667844</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2010-07-14T02:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: nat configuration</title>
      <link>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439491#M667848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you configure "nat (inside) 2 192.168.100.0 255.255.255.252" only addresses covered in the range can use the nat pool identified by number 2. You do not need any other configuration to block other IP addresses from using the range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 02:40:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-configuration/m-p/1439491#M667848</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-14T02:40:28Z</dc:date>
    </item>
  </channel>
</rss>

