<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT on ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3811151#M6731</link>
    <description>&lt;P&gt;object network SERVER&lt;BR /&gt;host 172.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object network PUBLIC&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;object service CUSTOM80&lt;BR /&gt;service tcp source eq 80&lt;BR /&gt;!&lt;BR /&gt;object service CUSTOM300&lt;BR /&gt;service tcp source eq 300&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) source static SERVER PUBLIC service CUSTOM80 CUSTOM300&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object SERVER eq 80&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;BR /&gt;!&lt;/P&gt;</description>
    <pubDate>Wed, 27 Feb 2019 19:56:38 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2019-02-27T19:56:38Z</dc:date>
    <item>
      <title>NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810219#M6714</link>
      <description>&lt;DIV class="_3xX726aBn29LDbsDtzr_6E hxthbq-6 hEEidA" style="max-width: 800px;" data-click-id="text"&gt;
&lt;DIV class="fo16tt-0 bJBAtI"&gt;
&lt;P class="s90z9tc-10 fHRkcP"&gt;I need to create NAT where lets say a source from an outside IP is &lt;A class="s90z9tc-27 fvqGYz" href="https://33.33.33.33" target="_blank" rel="noopener"&gt;33.33.33.33&lt;/A&gt; to coming inside to lets say my public IP 1.1.1.1.1 which is mapped to &lt;A class="s90z9tc-27 fvqGYz" href="https://172.10.10.1" target="_blank" rel="noopener"&gt;172.10.10.1&lt;/A&gt; port 300.&lt;/P&gt;
&lt;P class="s90z9tc-10 fHRkcP"&gt;So question is, how do I create nat rule saying if source IP is coming from &lt;A class="s90z9tc-27 fvqGYz" href="https://33.33.33.33" target="_blank" rel="noopener"&gt;33.33.33.33&lt;/A&gt; to map it to &lt;A class="s90z9tc-27 fvqGYz" href="https://1.1.1.1" target="_blank" rel="noopener"&gt;1.1.1.1&lt;/A&gt; (which will map it to my internal &lt;A class="s90z9tc-27 fvqGYz" href="https://172.10.10.1" target="_blank" rel="noopener"&gt;172.10.10.1&lt;/A&gt; on port 300.)&lt;/P&gt;
&lt;P class="s90z9tc-10 fHRkcP"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="s90z9tc-10 fHRkcP"&gt;&lt;A class="s90z9tc-27 fvqGYz" href="https://33.33.33.33" target="_blank" rel="noopener"&gt;33.33.33.33&lt;/A&gt; ----&amp;gt; http/https -----&amp;gt; &lt;A class="s90z9tc-27 fvqGYz" href="https://1.1.1.1" target="_blank" rel="noopener"&gt;1.1.1.1&lt;/A&gt; ------&amp;gt; &lt;A class="s90z9tc-27 fvqGYz" href="https://172.10.10.1" target="_blank" rel="noopener"&gt;172.10.10.1&lt;/A&gt; port 300&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810219#M6714</guid>
      <dc:creator>Hulk8647</dc:creator>
      <dc:date>2020-02-21T16:52:14Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810274#M6719</link>
      <description>&lt;P&gt;If I'm understanding you correctly, you're saying if traffic sourced from 33.33.33.33 destined to 1.1.1.1 on port 443, then translate 1.1.1.1 to 172.10.10.1 and 443 to 300&lt;/P&gt;
&lt;PRE&gt;      object network 33.33.33.33-obj
        host 33.33.33.33
      object network 1.1.1.1-obj
        host 1.1.1.1
      object network 172.10.10.1-obj
        host 172.10.10.1
      object service tcp-443
        service tcp destination eq https
      object service tcp-300
        service tcp destination eq 300
      nat (Outside,Inside) 1 source static 33.33.33.33-obj 33.33.33.33-obj destination static 1.1.1.1-obj 172.10.10.1-obj service tcp-443 tcp-300
&lt;/PRE&gt;</description>
      <pubDate>Tue, 26 Feb 2019 19:27:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810274#M6719</guid>
      <dc:creator>mclaughlinm9</dc:creator>
      <dc:date>2019-02-26T19:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810297#M6724</link>
      <description>&lt;P&gt;thank you! I'll give it a try and let you know!&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 19:51:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810297#M6724</guid>
      <dc:creator>Hulk8647</dc:creator>
      <dc:date>2019-02-26T19:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810351#M6725</link>
      <description>&lt;P&gt;as you never mentioned what port you coming in. so assuming the coming port could be any number. and other thing do have a spare public ip address on outside interface or you want to land your outside traffic on your public facing asa interface and than doing the mapping?&lt;/P&gt;&lt;P&gt;here is the config if you have a public ip address as you mentioned in your post.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network SERVER&lt;BR /&gt;host 172.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object network PUBLIC&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) source static SERVER PUBLIC&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object SERVER eq 300&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;/P&gt;</description>
      <pubDate>Tue, 26 Feb 2019 21:16:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3810351#M6725</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-02-26T21:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3811059#M6727</link>
      <description>&lt;P&gt;I'll be coming on on 443 and 80 which should then transalate to port 333. I have a spare IP on outside, lets say its 1.1.1.1&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 16:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3811059#M6727</guid>
      <dc:creator>Hulk8647</dc:creator>
      <dc:date>2019-02-27T16:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: NAT on ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3811151#M6731</link>
      <description>&lt;P&gt;object network SERVER&lt;BR /&gt;host 172.10.10.1&lt;BR /&gt;!&lt;BR /&gt;object network PUBLIC&lt;BR /&gt;host 1.1.1.1&lt;BR /&gt;!&lt;BR /&gt;object service CUSTOM80&lt;BR /&gt;service tcp source eq 80&lt;BR /&gt;!&lt;BR /&gt;object service CUSTOM300&lt;BR /&gt;service tcp source eq 300&lt;BR /&gt;!&lt;BR /&gt;nat (inside,outside) source static SERVER PUBLIC service CUSTOM80 CUSTOM300&lt;BR /&gt;!&lt;BR /&gt;access-list OUTSIDE_IN extended permit tcp any object SERVER eq 80&lt;BR /&gt;access-group OUTSIDE_IN in interface outside&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 19:56:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-on-asa/m-p/3811151#M6731</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-02-27T19:56:38Z</dc:date>
    </item>
  </channel>
</rss>

