<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can you 'no nat' a static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457101#M701862</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is on&amp;nbsp; a Cisco ASA 5520 ver 7.2(4)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 29 Apr 2010 11:15:47 GMT</pubDate>
    <dc:creator>i.harvey</dc:creator>
    <dc:date>2010-04-29T11:15:47Z</dc:date>
    <item>
      <title>Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457100#M701859</link>
      <description>&lt;P&gt;Hi - I have this question because I need to log the IP addresses of requests to a web-proxy server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current web-proxy server is in a DMZ, traffic is in the identity NAT rules and the source IP is passed through the firewall to the server and logged.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have set up a test web-proxy server which is in another DMZ, but I need to access this with an 'inside' IP address, rather than the true 'DMZ' IP address. I have tested this using a policy Static NAT (so that VPNs can access it too - please refer to &lt;/SPAN&gt;&lt;A class="jive-link-thread-small" href="https://community.cisco.com/thread/2013181" target="_blank"&gt;https://supportforums.cisco.com/thread/2013181&lt;/A&gt;&lt;SPAN&gt;) and I have everything working except the logging; all requests now log with the firewalls DMZ interface rather than the true source IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any way round this?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:38:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457100#M701859</guid>
      <dc:creator>i.harvey</dc:creator>
      <dc:date>2019-03-11T17:38:57Z</dc:date>
    </item>
    <item>
      <title>Re: Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457101#M701862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is on&amp;nbsp; a Cisco ASA 5520 ver 7.2(4)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 11:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457101#M701862</guid>
      <dc:creator>i.harvey</dc:creator>
      <dc:date>2010-04-29T11:15:47Z</dc:date>
    </item>
    <item>
      <title>Re: Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457102#M701865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good to see you again &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, you have:&lt;/P&gt;&lt;P&gt;LAN 172.16.0.1&lt;BR /&gt;DMZ 192.168.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 172.16.0.1 192.168.0.1 netmask 255.255.255.255&lt;BR /&gt;This command is to get to the server on the DMZ with the LAN address from the inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,out) 172.16.0.1 192.168.0.1&lt;BR /&gt;This command is to get to the server on the DMZ with the LAN address from the outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, you want to log the requests to these server with the LAN IP? &lt;BR /&gt;Out which interface is the logging server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 14:37:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457102#M701865</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T14:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457103#M701870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good to see you again too, Federico&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The logging server is also on the DMZ 192.168.0.1 server (Web Proxy).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I set my web browser PROXY to be 172.16.0.1, my web request gets translated to 192.168.0.1. The server (192.168.0.1) actions my web request and then returns the web page to me - it also logs that I have visited this web sitem but instead of registering my own IP address (e.g.172.16.0.100), it is registering the IP address of the DMZ interface of the Firewall (192.168.0.254).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I use another PC (with different IP address - 172.16.0.101) with the same web browser PROXY setting, then it also is also registered on the DMZ server 192.168.0.1 with the IP address of the DMZ interface of the Firewall (192.168.0.254).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ server is not able to log the different source IPs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 15:11:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457103#M701870</guid>
      <dc:creator>i.harvey</dc:creator>
      <dc:date>2010-04-29T15:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457104#M701872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason for this is that the logging server is on the DMZ 192.168.0.1 (Web Proxy)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;You setup your web browser proxy to 172.16.0.1 on the inside LAN.&lt;/P&gt;&lt;P&gt;When the packets get to the web proxy, they get to the real IP of the proxy (192.168.0.1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the LAN machines (192.168.0.x) are getting translated to the DMZ IP when going to the DMZ. &lt;BR /&gt;This is whay the proxy ''see'' the requests coming from the ASA's DMZ IP instead than coming from the LAN real IPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you for example, set up a NAT rule like this:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 172.16.0.5 172.16.0.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this way, when host 172.16.0.5 contacts the proxy, the proxy&amp;nbsp; will see the request from the real IP 172.16.0.5 and &lt;BR /&gt;not from the DMZ interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also use a nat0 rule or subnets in the static command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Apr 2010 15:21:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457104#M701872</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-29T15:21:56Z</dc:date>
    </item>
    <item>
      <title>Re: Can you 'no nat' a static NAT</title>
      <link>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457105#M701879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I have stripped out a lot of my config and ended up with the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list TESTextended permit ip host 192.168.0.1 172.16.0.0 255.255.0.0&lt;BR /&gt;access-list TESTextended permit ip host 192.168.0.1 192.168.0.0 255.255.0.0&lt;BR /&gt;static (dmz,outside) 172.16.0.1&amp;nbsp; access-list TESTPROXY&lt;BR /&gt;static (dmz,inside) 172.16.0.1&amp;nbsp; access-list TESTPROXY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and it all seems to be working as I hoped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 May 2010 15:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-you-no-nat-a-static-nat/m-p/1457105#M701879</guid>
      <dc:creator>i.harvey</dc:creator>
      <dc:date>2010-05-04T15:40:59Z</dc:date>
    </item>
  </channel>
</rss>

