<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing inside clients access to a static NAT translation d in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361965#M704182</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this type of problem before... I tricked the clients inside thru the DNS that pointed to the inside network and they never had to come out the outside interface to come back around. lol worked but was a pain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Apr 2010 23:10:00 GMT</pubDate>
    <dc:creator>Rodrigo Gurriti</dc:creator>
    <dc:date>2010-04-02T23:10:00Z</dc:date>
    <item>
      <title>Allowing inside clients access to a static NAT translation device via the public IP</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361956#M704173</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a cable ISP connection with a dynamically provided public ip address. From outside the devices are reachable but from inside i cannot reach the external ip. I have an PIX 501 running 6.3.5 and PDM 3.0(4). How can i configure the PIX to let internal clients reach the external ip address and associated ports from inside? Also I am doing all of this via CLI because I can not get PDM to load past the second browser screen it opens detailing versions of OS, IE, Jave, etc.&amp;nbsp; I can SSH or telnet via the inside IP network.&amp;nbsp;&amp;nbsp; Below is my current configuration THANKS IN ADVANCE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;: Written by enable_15 at 11:09:45.577 pst Thu Apr 1 2010&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 100full&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;enable password ???????????? encrypted&lt;/P&gt;&lt;P&gt;passwd ???????????? encrypted&lt;/P&gt;&lt;P&gt;hostname ZZZZ-CA-FW&lt;/P&gt;&lt;P&gt;domain-name XXXXX.com&lt;/P&gt;&lt;P&gt;clock timezone pst -8&lt;/P&gt;&lt;P&gt;clock summer-time PDT recurring&lt;/P&gt;&lt;P&gt;fixup protocol dns&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;no fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;no fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;no fixup protocol http 80&lt;/P&gt;&lt;P&gt;no fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;no fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;no fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;no fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;object-group service allowed_ports tcp&lt;/P&gt;&lt;P&gt;port-object range 7770 7782&lt;/P&gt;&lt;P&gt;access-list out2in permit icmp any any echo-reply&lt;/P&gt;&lt;P&gt;access-list out2in permit icmp any any time-exceeded&lt;/P&gt;&lt;P&gt;access-list out2in permit tcp any any object-group allowed_ports&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console warnings&lt;/P&gt;&lt;P&gt;logging monitor warnings&lt;/P&gt;&lt;P&gt;logging buffered warnings&lt;/P&gt;&lt;P&gt;logging history warnings&lt;/P&gt;&lt;P&gt;logging facility 18&lt;/P&gt;&lt;P&gt;icmp deny any echo outside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside dhcp setroute&lt;/P&gt;&lt;P&gt;ip address inside 192.168.128.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;pdm location 192.168.128.1 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm logging warnings 100&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.128.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7781 192.168.128.21 7781 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7782 192.168.128.22 7782 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7779 192.168.128.19 7779 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7778 192.168.128.18 7778 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7776 192.168.128.16 7776 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7775 192.168.128.15 7775 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7774 192.168.128.14 7774 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7773 192.168.128.13 7773 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7772 192.168.128.12 7772 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7770 192.168.128.10 7770 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface 7780 192.168.128.20 7780 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;access-group out2in in interface outside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;ntp server 209.81.9.7 source outside&lt;/P&gt;&lt;P&gt;ntp server 204.152.184.72 source outside&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.128.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;snmp-server location garage&lt;/P&gt;&lt;P&gt;snmp-server contact hounds&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 192.168.128.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh 192.168.128.0 255.255.255.0 inside&lt;/P&gt;&lt;P&gt;ssh timeout 60&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcpd address 192.168.128.100-192.168.128.150 inside&lt;/P&gt;&lt;P&gt;dhcpd dns 208.67.222.222&lt;/P&gt;&lt;P&gt;dhcpd lease 3600&lt;/P&gt;&lt;P&gt;dhcpd ping_timeout 750&lt;/P&gt;&lt;P&gt;dhcpd enable inside&lt;/P&gt;&lt;P&gt;username admin password ??????????? encrypted privilege 15&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;banner exec UNAUTHORIZED ACCESS WILL BE PROSECUTED&lt;/P&gt;&lt;P&gt;banner login UNAUTHORIZED ACCESS WILL BE PROSECUTED&lt;/P&gt;&lt;P&gt;banner motd UNAUTHORIZED ACCESS WILL BE PROSECUTED&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:28:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361956#M704173</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2019-03-11T17:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361957#M704174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How can I configure the PIX to let internal clients reach the external ip address and associated ports from inside?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if I understand the above question.&lt;/P&gt;&lt;P&gt;The config looks correct.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable buffered logging and see what the log says&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt;loggging buffered 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh logg | i x.x.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where x.x.x.x is the IP address of the client where you are testing the flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 01:02:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361957#M704174</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-02T01:02:59Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361958#M704175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the log @ level 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address 76.166.107.141 is my current dynamic IP address provided by my ISP. Below is the output of sh log.&amp;nbsp; Please enlighten me as to what I am missing.&amp;nbsp; Also any help getting PDM to work would be appreciated as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Syslog logging: enabled&lt;/P&gt;&lt;P&gt;Facility: 18&lt;/P&gt;&lt;P&gt;Timestamp logging: enabled&lt;/P&gt;&lt;P&gt;Standby logging: disabled&lt;/P&gt;&lt;P&gt;Console logging: level warnings, 344 messages logged&lt;/P&gt;&lt;P&gt;Monitor logging: level warnings, 0 messages logged&lt;/P&gt;&lt;P&gt;Buffer logging: level debugging, 459 messages logged&lt;/P&gt;&lt;P&gt;Trap logging: disabled&lt;/P&gt;&lt;P&gt;History logging: level warnings, 344 messages logged&lt;/P&gt;&lt;P&gt;Device ID: disabled&lt;/P&gt;&lt;P&gt;168.128.113/49653 (76.166.107.141/6276)&lt;/P&gt;&lt;P&gt;302016: Teardown UDP connection 22071 for outside:208.67.222.222/53 to inside:192.168.128.113/49653 duration 0:00:01 bytes 112&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3120 to outside:76.166.107.141/16661&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22072 for outside:76.166.107.141/7781 (76.166.107.141/7781) to inside:192.168.128.113/3120 (76.166.107.141/16661)&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 192.168.128.25/2190 to inside:192.168.128.255/2190&lt;/P&gt;&lt;P&gt;111009: User 'enable_15' executed cmd: show logging&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 192.168.128.113/138 to inside:192.168.128.255/netbios-dgm&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 192.168.128.113/137 to inside:192.168.128.255/netbios-ns&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 192.168.128.113/137 to inside:192.168.128.255/netbios-ns&lt;/P&gt;&lt;P&gt;305012: Teardown dynamic UDP translation from inside:192.168.128.14/2588 to outside:76.166.107.141/6275 duration 0:00:31&lt;/P&gt;&lt;P&gt;305012: Teardown dynamic TCP translation from inside:192.168.128.14/2587 to outside:76.166.107.141/16660 duration 0:00:31&lt;/P&gt;&lt;P&gt;710005: UDP request discarded from 192.168.128.113/137 to inside:192.168.128.255/netbios-ns&lt;/P&gt;&lt;P&gt;302016: Teardown UDP connection 22049 for outside:208.54.4.1/500 to inside:192.168.128.112/500 duration 0:02:01 bytes 1457&lt;/P&gt;&lt;P&gt;305011: Built dynamic UDP translation from inside:192.168.128.113/63651 to outside:76.166.107.14 1/6277&lt;/P&gt;&lt;P&gt;302015: Built outbound UDP connection 22073 for outside:208.67.222.222/53 (208.67.222.222/53) to inside:192.168.128.113/63651 (76.166.107.141/6277)&lt;/P&gt;&lt;P&gt;302016: Teardown UDP connection 22073 for outside:208.67.222.222/53 to inside:192.168.128.113/63651 duration 0:00:01 bytes 96&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3121 to outside:76.166.107.141/16662&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22074 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3121 (76.166.107.141/16662)&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3122 to outside:76.166.107.141/16663&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22075 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3122 (76.166.107.141/16663)&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3123 to outside:76.166.107.141/16664&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22076 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3123 (76.166.107.141/16664)&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3124 to outside:76.166.107.141/16665&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22077 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3124 (76.166.107.141/16665)&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3125 to outside:76.166.107.141/16666&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22078 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3125 (76.166.107.141/16666)&lt;/P&gt;&lt;P&gt;305011: Built dynamic TCP translation from inside:192.168.128.113/3126 to outside:76.166.107.141/16667&lt;/P&gt;&lt;P&gt;302013: Built outbound TCP connection 22079 for outside:83.167.233.50/80 (83.167.233.50/80) to inside:192.168.128.113/3126 (76.166.107.141/16667)&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22074 for outside:83.167.233.50/80 to inside:192.168.128.113/3121 duration 0:00:01 bytes 19263 TCP FINs&lt;/P&gt;&lt;P&gt;305012: Teardown dynamic UDP translation from inside:192.168.128.112/500 to outside:76.166.107.141/29 duration 0:02:06&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22075 for outside:83.167.233.50/80 to inside:192.168.128.113/3122 duration 0:00:01 bytes 1759 TCP FINs&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22078 for outside:83.167.233.50/80 to inside:192.168.128.113/3125 duration 0:00:01 bytes 2271 TCP FINs&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22077 for outside:83.167.233.50/80 to inside:192.168.128.113/3124 duration 0:00:01 bytes 1982 TCP FINs&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22076 for outside:83.167.233.50/80 to inside:192.168.128.113/3123 duration 0:00:01 bytes 3819 TCP FINs&lt;/P&gt;&lt;P&gt;302014: Teardown TCP connection 22079 for outside:83.167.233.50/80 to inside:192.168.128.113/3126 duration 0:00:01 bytes 3861 TCP FINs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 01:58:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361958#M704175</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-02T01:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361959#M704176</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is breaking or not working? Inside hosts are unable to go out to the internet? What flow did you test?&lt;/P&gt;&lt;P&gt;What is the source IP address? Is it this &lt;SPAN style="font-size: 10pt;"&gt;192.168.128.113?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What is the destination address that you tried to reach on the internet? Is it this &lt;SPAN style="font-size: 10pt;"&gt;83.167.233.50?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The inside host 128.113 was translated to 76.166.107.141 as expected correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 02:37:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361959#M704176</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-02T02:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361960#M704177</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inside hosts can can browse the internet no problem. The problem is when inside host 192.168.128.113 trys to access &lt;A href="http://76.166.107.141"&gt;http://76.166.107.141&lt;/A&gt;:7781 which is actually a device on the inside network that is NAT'd to the outside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 03:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361960#M704177</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-02T03:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361961#M704178</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inside hosts should access the inside hosts only using the inside IP addresses and not the translated addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is not possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 03:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361961#M704178</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-02T03:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361962#M704179</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is this not possible due to a limitation in the PIX?&amp;nbsp; This used to work when I was using a linksys RV016 as my firewall / switch via port forwarding.&amp;nbsp; Am I not forwarding correctly in the PIX?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 03:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361962#M704179</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-02T03:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361963#M704180</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct. If you were running 7.x code or above may be we can do some destination NAT and same security intra interface and make this work but, not with the code that you are running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides, the right way is to access the inside hosts by the inside IP addresses and not using the translated addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 03:55:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361963#M704180</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-02T03:55:48Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361964#M704181</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a webmaster who likes to check and confirm that the devices translated work via the outside interface. Thank you for the effort and responses&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 04:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361964#M704181</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-02T04:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361965#M704182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this type of problem before... I tricked the clients inside thru the DNS that pointed to the inside network and they never had to come out the outside interface to come back around. lol worked but was a pain&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Apr 2010 23:10:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361965#M704182</guid>
      <dc:creator>Rodrigo Gurriti</dc:creator>
      <dc:date>2010-04-02T23:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361966#M704183</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you but tried this method.&amp;nbsp; Our webmaster actually uses the public IP address to check on the sites.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Apr 2010 03:08:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361966#M704183</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-03T03:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361967#M704184</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To access PDM on PIX 501 you must install Java 1.3.x&lt;/P&gt;&lt;P&gt;I think it's available now on Sun website in archive wersions (It was NOT for a long time... and I was always keeping that old JRE 1.3 on my memory stick:-)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm glad that ASA can be accessed with latest Java.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 21:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361967#M704184</guid>
      <dc:creator>adam</dc:creator>
      <dc:date>2010-04-06T21:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361968#M704185</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can do it in 6.x code with DNS Doctoring-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In 7.x code you do it with bi-directional NAT-&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://blogs.interfacett.com/mike-storm/2006/6/29/bidirectional-nat-on-a-cisco-pix-or-asa.html"&gt;http://blogs.interfacett.com/mike-storm/2006/6/29/bidirectional-nat-on-a-cisco-pix-or-asa.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 21:24:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361968#M704185</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2010-04-06T21:24:17Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361969#M704186</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Collin;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for DNS doctoring thought.&amp;nbsp; I thought of this as well but my webadmin tests via the public facing IP address so this is out of the question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 21:30:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361969#M704186</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-06T21:30:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing inside clients access to a static NAT translation d</title>
      <link>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361970#M704187</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alan;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the insight. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Apr 2010 21:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-inside-clients-access-to-a-static-nat-translation/m-p/1361970#M704187</guid>
      <dc:creator>rm760</dc:creator>
      <dc:date>2010-04-06T21:31:40Z</dc:date>
    </item>
  </channel>
</rss>

