<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic to different wan ip's in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482610#M691509</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok i understand the global rule now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the port 25 to the same ip address - how do we fix it then?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have like 12 wan ip's where email (port 25) is comming to. All mail should be sent to internal ip 192.168.10.34 regardless of originating wan ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What to do ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 17 May 2010 12:28:29 GMT</pubDate>
    <dc:creator>m1kkel1984</dc:creator>
    <dc:date>2010-05-17T12:28:29Z</dc:date>
    <item>
      <title>Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482595#M691376</link>
      <description>&lt;P&gt;Hello guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have asa5510 sec plus.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im new to cisco.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WAN IP: 77.68.136.96 - 77.68.136.102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to send traffic from internal host like: 192.168.10.31 out through another WAN ip than the one bound to interface "outside" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried it with this command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 2 192.168.10.31 255.255.255.255&lt;BR /&gt;global (outside) 2 77.68.136.97 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 3 192.168.10.40 255.255.255.255&lt;BR /&gt;nat (dmz) 3 192.168.10.41 255.255.255.255&lt;BR /&gt;global (outside) 3 77.68.136.98 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and so on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it doesnt seem to work.. actually the hosts cannot acces the internet at all.. outside interface level 0, dmz interface level 90, so theres n o need to make accesslist from DMZ to outside, right?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482595#M691376</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2019-03-11T17:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482596#M691397</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Definitely can. What you have configured is correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just have to make sure that proxy arp is enabled on the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just check: "sh run sysopt" output, if you don't see "sysopt noproxyarp outside" command, that means proxy arp is enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also perform "clear xlate" after you configure the NAT/Global pair statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have no access-list assigned to DMZ interface, traffic from DMZ to outside will be allow by default. If you have configured an access-list on DMZ interface, you would need to explicitly allow traffic from DMZ to outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 09:59:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482596#M691397</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T09:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482597#M691422</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, so why should proxy arp be enabled ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 10:06:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482597#M691422</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-04T10:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482598#M691437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Because those are virtual ip addresses that are not assigned to any interfaces, therefore it needs to have ARP resolution, and it would resolve to the ASA outside interface mac address when proxy arp is enabled so the router in front of the ASA can reach it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 10:11:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482598#M691437</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T10:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482599#M691453</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok i see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you maybe have a look at my config file, and see if any other things are wrong ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have attached it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 10:34:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482599#M691453</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-04T10:34:59Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482600#M691465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, first of all, you can use overlapping public ip address for both static statement and global statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per config for example: 77.68.136.97 has been used on static port address redirection statement, so you can't use 77.68.136.97 for your global statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;---&amp;gt; so use a unique public ip address for your global statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Secondly, from the config, it seems that you have a lot of NAT statements. Traffic matches the NAT statement from top to bottom, not the longest ip address/subnet matches. If you do "sh run nat", you would see the list of NAT statement, and the order of how you configure it on the ASA would be the first match.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 10:41:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482600#M691465</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T10:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482601#M691471</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why i have a lot of nat statements is because i have a lot of servers on the DMZ wich have different wan ip's applied to them, and therefore port 25 traffic to ip .98 is forwarded to the host that the .98 ip is attached to, the same with .99 ip and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe there is a better way to handle this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are a small hosting provider and we host terminalservers and exchangeservers, and each customer have it own virtual server, and wan ip. You get the point...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 10:51:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482601#M691471</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-04T10:51:23Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482602#M691473</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I understand what you are trying to achieve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, on ASA, public ip that has been assigned to static statement, can not be assigned to the global statement. They can't overlap.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And in regards to the NAT statements, as mentioned earlier, it works top to bottom. So if you have the following list for example ("sh run nat" order - order as you configured the nat statements):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 100 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (dmz) 2 192.168.10.31 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (dmz) 3 192.168.10.40 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If traffic is sourced from 192.168.10.31 for example, it will match the first nat statement instead of the second nat statement because nat is matched from top to bottom, ie: it will match line 1 first - "nat (dmz) 100 192.168.10.0 255.255.255.0".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like traffic to match the second nat statement for traffic sourcing from 192.168.10.31, then you would need to remove the first line and reapply the first line, because when you remove the nat and reapply the line, it will be added to the bottom of the NAT list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example: if you remove "nat (dmz) 100 192.168.10.0 255.255.255.0", and reapply the same statement, the order from the above list will be as follows:&lt;/P&gt;&lt;P&gt;nat (dmz) 2 192.168.10.31 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (dmz) 3&amp;nbsp; 192.168.10.40 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (dmz) 100 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then traffic sourcing from 192.168.10.31 will now match the first line "nat (dmz) 2 192.168.10.31 255.255.255.255"&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 11:13:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482602#M691473</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T11:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482603#M691478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok i see.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May i return when i have fixed my conf? So you can read it before i apply, and take down out old router?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 12:13:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482603#M691478</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-04T12:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482604#M691485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 12:20:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482604#M691485</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-04T12:20:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482605#M691487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I fixed up my conf, can you verify that everything is correct, or do you need more info from me ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 14:09:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482605#M691487</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-04T14:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482606#M691489</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey - did you have the time to verify my conf is correct ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Mikkel&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 07:42:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482606#M691489</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-07T07:42:50Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482607#M691491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To start with, you don't need these 2 route statements:&lt;/P&gt;&lt;P&gt;route inside 192.168.0.0 255.255.255.0 192.168.0.1&lt;BR /&gt;route dmz 192.168.10.0 255.255.255.0 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the NAT statements, please send the output of the following:&lt;/P&gt;&lt;P&gt;sh run nat&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;sh run global&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As mentioned, the order needs to be as how you enter the NAT line into the configuration, therefore the output of the above will show.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And please also confirm that you are trying to achieve the following as per your original post:&lt;/P&gt;&lt;P&gt;nat (dmz) 2 192.168.10.31 255.255.255.255&lt;BR /&gt;global (outside) 2&amp;nbsp; 77.68.136.97 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 3 192.168.10.40 255.255.255.255&lt;BR /&gt;nat&amp;nbsp; (dmz) 3 192.168.10.41 255.255.255.255&lt;BR /&gt;global (outside) 3&amp;nbsp; 77.68.136.98 netmask 255.255.255.255&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 09:16:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482607#M691491</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-07T09:16:47Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482608#M691493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Allright im back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im trying to apply my config, but it fails different places.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First:&lt;/P&gt;&lt;P&gt;(trying to send everything else that does not match rules out through wan interface)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 100 192.168.10.0 255.255.255.0&lt;BR /&gt;global (outside) 100 interface&lt;BR /&gt;ERROR: global for this range already exists&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Second:&lt;/P&gt;&lt;P&gt;ciscoasa(config)# static (dmz,outside) tcp 77.68.136.32 25 192.168.10.34 25 ne$&lt;BR /&gt;ciscoasa(config)# static (dmz,outside) tcp 77.68.136.33 25 192.168.10.34 25 ne$&lt;BR /&gt;ERROR: duplicate of existing static&lt;BR /&gt;&amp;nbsp; TCP DMZ:192.168.10.34/25 to outside:77.68.136.32/25 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why am i reciving that error ? It occours after first static rule is applied. Im trying to send traffic from different wan ip's (port 25) into out spamgateway..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards Mikkel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 12:00:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482608#M691493</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-17T12:00:07Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482609#M691504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you already have "global (outside) 1 interface", so you can't configure two global statements to use the same ip address (interface). Hence you are getting the error when applying "global (outside) 100 interface"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the static statements, you can't configure static port address redirection for the same port (TCP/25) and same internal/private ip address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 12:21:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482609#M691504</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-17T12:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482610#M691509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok i understand the global rule now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the port 25 to the same ip address - how do we fix it then?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have like 12 wan ip's where email (port 25) is comming to. All mail should be sent to internal ip 192.168.10.34 regardless of originating wan ip.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What to do ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 12:28:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482610#M691509</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-17T12:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482611#M691510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello once again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think i know how to send all smtp traffic to one internal ip.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;static (dmz,outside) tcp interface 25 192.168.10.34 25 netmask 255.255.255.255&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i fixed my conf a little, fixed the rules that were failing, and the global rules. Please check again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also ran the commands just suggested, and here's the output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# sh run nat&lt;BR /&gt;nat (inside) 0 access-list NCT-DMZ&lt;BR /&gt;nat (inside) 1 192.168.0.0 255.255.255.0&lt;BR /&gt;nat (DMZ) 2 192.168.10.31 255.255.255.255&lt;BR /&gt;nat (DMZ) 4 192.168.10.34 255.255.255.255&lt;BR /&gt;nat (DMZ) 3 192.168.10.40 255.255.255.255&lt;BR /&gt;nat (DMZ) 3 192.168.10.41 255.255.255.255&lt;BR /&gt;nat (DMZ) 5 192.168.10.42 255.255.255.255&lt;BR /&gt;nat (DMZ) 6 192.168.10.43 255.255.255.255&lt;BR /&gt;nat (DMZ) 7 192.168.10.45 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.46 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.47 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.50 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.51 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.52 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.53 255.255.255.255&lt;BR /&gt;nat (DMZ) 8 192.168.10.54 255.255.255.255&lt;BR /&gt;nat (DMZ) 1 192.168.10.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# sh run static&lt;BR /&gt;static (inside,outside) tcp interface www 192.168.0.2 www netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface https 192.168.0.2 https netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 1433 192.168.0.2 1433 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) tcp interface 3389 192.168.0.5 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.97 www 192.168.10.31 www netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.97 https 192.168.10.31 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.97 3389 192.168.10.31 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.98 www 192.168.10.40 www netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.98 https 192.168.10.40 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.98 3389 192.168.10.41 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp interface smtp 192.168.10.34 smtp netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.100 3389 192.168.10.42 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.101 www 192.168.10.43 www netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.101 https 192.168.10.43 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.101 3389 192.168.10.43 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.32 www 192.168.10.45 www netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.32 https 192.168.10.45 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.32 3389 192.168.10.45 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.33 www 192.168.10.47 www netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.33 https 192.168.10.47 https netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.33 3389 192.168.10.50 3389 netmask 255.255.255.255&lt;BR /&gt;static (DMZ,outside) tcp 77.68.136.33 8093 192.168.10.51 8093 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hmm should the first 4 static come ind the end ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ciscoasa(config)# sh run global&lt;BR /&gt;global (outside) 2 77.68.136.97 netmask 255.255.255.255&lt;BR /&gt;global (outside) 3 77.68.136.98 netmask 255.255.255.255&lt;BR /&gt;global (outside) 4 77.68.136.99 netmask 255.255.255.255&lt;BR /&gt;global (outside) 5 77.68.136.100 netmask 255.255.255.255&lt;BR /&gt;global (outside) 6 77.68.136.101 netmask 255.255.255.255&lt;BR /&gt;global (outside) 7 77.68.136.32 netmask 255.255.255.255&lt;BR /&gt;global (outside) 8 77.68.136.33 netmask 255.255.255.255&lt;BR /&gt;global (outside) 1 interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does this look?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ive attached my new and refined config.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 13:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482611#M691510</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-17T13:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482612#M691511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The NAT statements definitely look perfect, where the more specific ones are at the top, with the most general one right at the bottom.&lt;/P&gt;&lt;P&gt;With the static translation, the first 4 lines do not need to be moved anywhere. It's been correctly configured.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 13:42:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482612#M691511</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-17T13:42:55Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482613#M691512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is just amazing!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you very much.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now lets say that my spamgateway (192.168.10.34) needs to be able to communicate with 192.168.0.2 (on inside) interface, ive just created this rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!######################ACCESS TIL NCT FRA PROOFPOINT################&lt;BR /&gt;&lt;EM&gt;access-list DMZ-NCT extended permit ip 192.168.10.34 255.255.255.255 192.168.0.2 255.255.255.255&lt;BR /&gt;access-group DMZ-NCT in interface inside&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this also correctly configured?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 May 2010 13:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482613#M691512</guid>
      <dc:creator>m1kkel1984</dc:creator>
      <dc:date>2010-05-17T13:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic to different wan ip's</title>
      <link>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482614#M691514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, since the traffic originates from DMZ, you would need to add the ACL on your current DMZ access-list which is called DMZ-PING as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;access-list DMZ-PING extended permit ip host 192.168.10.34 host&amp;nbsp; 192.168.0.2&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Plus you also need to have the following static statement:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 09:50:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-to-different-wan-ip-s/m-p/1482614#M691514</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-18T09:50:58Z</dc:date>
    </item>
  </channel>
</rss>

