<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem created Policy NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372230#M713567</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at setting that could be applied and tests we performed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### With this setup worked perfectly applied traffic: #####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NAT_3017_3023 extended permit tcp host 10.2.64.4 eq 3023 172.24.0.0 255.255.240.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3023&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### With this set up NAT also worked perfectly: ####&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp 192.168.8.3 3017 10.2.64.4 3017 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### &lt;SPAN title="Agora, esta regra consegui criada sem problemas, mas o NAT não esta sendo montado."&gt;Now, this rule could set up without problems, but the NAT is not being mounted. &lt;/SPAN&gt;&lt;SPAN title="O que eu percebi, quando se cria o NAT static com policy nat sem informar o protocolo (tcp ou udp) ea porta de acesso, o Firewall não monta o NAT."&gt;What I realized when creating the static NAT with nat policy without informing the protocol (TCP or UDP) and port access, the firewall does not mount the NAT. &lt;/SPAN&gt;&lt;SPAN title="Se for criado o static com o protocolo ea porta tenho um conflito de configuração com a primeira regra criada:"&gt;If the static is created with the protocol and port configuration have a conflict with the first rule created:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NAT_3017_3017 extended permit tcp host 10.2.64.4 eq 3017 any range eq 1 65535&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 192.168.8.4&amp;nbsp; access-list NAT_3017_3017&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN title="Tem alguma sugestão?"&gt;Any suggestions? &lt;/SPAN&gt;&lt;SPAN title="Por acaso você consegue reproduzir esta configuração?"&gt;Actually you can play this setup?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN title="Por acaso você consegue reproduzir esta configuração?"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="A configuração de range de porta criado na ACL, é necessário porque quando a conexão é estabelecida por qualquer origem da outside, o Ip de origem usa porta aleatória."&gt;The setting range of port created in the ACL, it is necessary because when the connection is established by any outside source, the source IP uses random port. &lt;/SPAN&gt;&lt;SPAN title="Por isso houve a necessidade de configurar desta forma."&gt;Therefore it was necessary to set up this way.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Att,&lt;/P&gt;&lt;P&gt;Rubens&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Apr 2010 14:48:46 GMT</pubDate>
    <dc:creator>rubens.palhoni</dc:creator>
    <dc:date>2010-04-16T14:48:46Z</dc:date>
    <item>
      <title>Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372225#M713540</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;I need help on project my client with respect to some NAT rules that need to be created in a context of the FWSM that the client is &lt;/DIV&gt;&lt;DIV&gt;creating. &lt;/DIV&gt;&lt;DIV&gt;According to customer demand, there are two types of connections that need to be released. We conducted some tests using policy NAT but unfortunately we could not create the rules and therefore need your help. &lt;/DIV&gt;&lt;DIV&gt;I'll try to explain what client need according to the e-mail client below:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;- Due to conflicts of IPs, we have customers that address on outside interface, the IP 192.168.8.3 and other IP 192.168.8.4 on port 3017/TCP&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;- The firewall should do static NAT and redirect those connections to the IP address 10.2.64.4 port 3017. configure the following NAT and static NAT policy for this situation without problems:&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV class="im"&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;static (inside,outside) tcp 192.168.8.3 3017 10.2.64.4 3017 netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3017 line 1 remark ### Policy-NAT/Redirect porta 3017 para MF-SYSA:10.2.64.4 porta 3017&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3017 line 2 extended permit tcp host 10.2.64.4 eq 3017 any&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3017&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;- However, we have a situation when the source is the block &lt;A href="http://125.24.0.0/20" target="_blank"&gt;125.24.0.0/20&lt;/A&gt; (client Claro GPRS) and IP address 192.168.8.4 on port 3017. &lt;/DIV&gt;&lt;DIV&gt;- In this case the firewall should do a static NAT / NAT Policy and redirect the connection to the IP 10.2.64.4 on port 3023/TCP.&lt;/DIV&gt;&lt;DIV&gt;To do this try the following, who presented the error below:&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;DIV class="im"&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3023 line 1 remark ### Policy-NAT/Redirect porta 3017 para MF-SYSA:10.2.64.4 porta 3023&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3023 line 2 extended permit tcp host 10.2.64.4 eq 3023 172.24.0.0 255.255.240.0&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3023&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG style="text-decoration: underline; "&gt;Error:&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV class="im"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;FWSM-SYSTEM/CONTEXT(config)# static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3023&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;WARNING: real-address conflict with existing static&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; TCP inside:&lt;A href="http://10.2.64.4/3023" target="_blank"&gt;10.2.64.4/3023&lt;/A&gt; to outside:&lt;A href="http://192.168.8.3/3023" target="_blank"&gt;192.168.8.3/3023&lt;/A&gt; netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;ERROR: mapped-address conflict with existing static&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp; TCP inside:&lt;A href="http://10.2.64.4/3017" target="_blank"&gt;10.2.64.4/3017&lt;/A&gt; to outside:&lt;A href="http://192.168.8.4/3017" target="_blank"&gt;192.168.8.4/3017&lt;/A&gt; netmask 255.255.255.255&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Usage: [no] static [(real_ifc, mapped_ifc)]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&amp;lt;mapped_ip&amp;gt;|interface}&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&amp;lt;real_ip&amp;gt; [netmask &amp;lt;mask&amp;gt;]} | {access-list &amp;lt;acl_name&amp;gt;}&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [dns]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [[tcp] &amp;lt;max_conns&amp;gt; [&amp;lt;emb_lim&amp;gt; [&amp;lt;norandomseq&amp;gt; [nailed]]]]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [udp &amp;lt;max_conns&amp;gt;]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [no] static [(real_ifc, mapped_ifc)] {tcp|udp}&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&amp;lt;mapped_ip&amp;gt;|interface} &amp;lt;mapped_port&amp;gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&amp;lt;real_ip&amp;gt; &amp;lt;real_port&amp;gt; [netmask &amp;lt;mask&amp;gt;]} |&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {access-list &amp;lt;acl_name&amp;gt;}&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [dns]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [[tcp] &amp;lt;max_conns&amp;gt; [&amp;lt;emb_lim&amp;gt; [&amp;lt;norandomseq&amp;gt; [nailed]]]]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; [udp &amp;lt;max_conns&amp;gt;]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; show running-config [all] static [&amp;lt;mapped_ip&amp;gt;]&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; clear configure static&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;- We also try the following configuration. Include in NAT_3017_3017 ACL (applied there in the beginning) to line 2 with the network 172.24.0.0 255.255.240.0 (source) without success:&lt;/DIV&gt;&lt;DIV class="im"&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;access-list NAT_3017_3017 line 1 remark ### Policy-NAT/Redirect porta 3017 para MF-SYSA:10.2.64.4 porta 3017&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3017 line 2 extended permit tcp host 10.2.64.4 eq 3023 172.24.0.0 255.255.240.0&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;access-list NAT_3017_3017 line 3 extended permit tcp host 10.2.64.4 eq 3017 any&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3017&lt;/DIV&gt;&lt;DIV&gt;! &lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&lt;STRONG&gt;Error:&lt;/STRONG&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;FWSM-SYSTEM/AUTOMACAO-COMERCIAL(config)# access-list NAT_3017_3017 line 2 exte$&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;ERROR: access-list used in static pat has different&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ports&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;ERROR: ACL is not valid for static&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;FWSM-SYSTEM/CONTEXT(config)#&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;!&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;This NAT is being migrated from a FreeBSD Firewall which works perfectly. rsssrrs.&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;It could take a look and give suggestions?&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt; &lt;/DIV&gt;&lt;DIV&gt;Thanks!!!&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:33:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372225#M713540</guid>
      <dc:creator>rubens.palhoni</dc:creator>
      <dc:date>2019-03-11T17:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372226#M713542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting. What FWSM code are you running? This should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/configuration/guide/cfgnat_f.html#wp1042553"&gt;http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/configuration/guide/cfgnat_f.html#wp1042553&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="content"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;You can identify overlapping addresses in other &lt;STRONG class="cBold"&gt;nat&lt;/STRONG&gt; commands. For example, you can identify 10.1.1.0 in one command, but 10.1.1.1 in another. The traffic is matched to a policy NAT&lt;STRONG class="cBold"&gt; &lt;/STRONG&gt;command in order, until the first match, or for regular NAT, using the best match.&lt;/P&gt;&lt;A name="wp1043033"&gt;&lt;/A&gt;&lt;P class="pB2_Body2"&gt;See the following description about options for this command:&lt;/P&gt;&lt;A name="wp1043034"&gt;&lt;/A&gt;&lt;P class="pBu2_Bullet2"&gt;–&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="17" /&gt;&lt;STRONG class="cBold"&gt;access-list&lt;/STRONG&gt; &lt;EM class="cEmphasis"&gt;acl_name&lt;/EM&gt;—Identify the real addresses and destination addresses using an extended access list. Create the extended access list using the &lt;STRONG class="cBold"&gt;access-list extended &lt;/STRONG&gt;command (see the &lt;A href="http://www.cisco.com/en/US/docs/security/fwsm/fwsm40/configuration/guide/traffc_f.html#wpxref15405" onclick=""&gt;&lt;SPAN class="cXRef_Color" style="font-weight: normal;"&gt;"Adding an Extended Access List" section on page 12-6&lt;/SPAN&gt;&lt;/A&gt;). This access list should include only &lt;STRONG class="cBold"&gt;permit&lt;/STRONG&gt; ACEs. You can optionally specify the real and destination ports in the access list using the &lt;STRONG class="cBold"&gt;eq&lt;/STRONG&gt; operator. Policy NAT and static NAT consider the &lt;STRONG class="cCN_CmdName"&gt;inactive&lt;/STRONG&gt; or &lt;STRONG class="cCN_CmdName"&gt;time-range&lt;/STRONG&gt; keywords and stop working when an ACE is inactive.&lt;/P&gt;&lt;P class="pBu2_Bullet2"&gt;&lt;/P&gt;&lt;P class="pBu2_Bullet2"&gt;-KS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 11:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372226#M713542</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-16T11:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372227#M713546</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using IOS 4.0.7 in FWSM.&lt;/P&gt;&lt;P&gt;The strange thing is that even creating a NAT policy to match the source IP can not create the rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Att,&lt;/P&gt;&lt;P&gt;Rubens&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 12:48:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372227#M713546</guid>
      <dc:creator>rubens.palhoni</dc:creator>
      <dc:date>2010-04-16T12:48:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372228#M713548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Could you pls. copy and paste the following:&lt;/P&gt;&lt;P&gt;sh run static&lt;/P&gt;&lt;P&gt;sh run access-list &lt;NAME&gt;&lt;/NAME&gt;&lt;/P&gt;&lt;P&gt;that are tied to the static.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 13:38:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372228#M713548</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-16T13:38:45Z</dc:date>
    </item>
    <item>
      <title>Re: Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372229#M713555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alright I have tried this out and this is not supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;static (inside,out) tcp 44.44.44.44 3701 access-list net1&lt;BR /&gt;static (inside,out) tcp 44.44.44.44 3702 access-list net2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list net1 extended permit tcp host 1.1.1.1 eq 3701 host 100.100.100.1 eq 3701&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list net2 extended permit tcp host 1.1.1.2 eq 3702 host 100.100.100.100 eq 3702&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;worked perfectly. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 14:19:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372229#M713555</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-04-16T14:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Problem created Policy NAT</title>
      <link>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372230#M713567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kusankar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look at setting that could be applied and tests we performed:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### With this setup worked perfectly applied traffic: #####&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NAT_3017_3023 extended permit tcp host 10.2.64.4 eq 3023 172.24.0.0 255.255.240.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp 192.168.8.4 3017 access-list NAT_3017_3023&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### With this set up NAT also worked perfectly: ####&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) tcp 192.168.8.3 3017 10.2.64.4 3017 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#### &lt;SPAN title="Agora, esta regra consegui criada sem problemas, mas o NAT não esta sendo montado."&gt;Now, this rule could set up without problems, but the NAT is not being mounted. &lt;/SPAN&gt;&lt;SPAN title="O que eu percebi, quando se cria o NAT static com policy nat sem informar o protocolo (tcp ou udp) ea porta de acesso, o Firewall não monta o NAT."&gt;What I realized when creating the static NAT with nat policy without informing the protocol (TCP or UDP) and port access, the firewall does not mount the NAT. &lt;/SPAN&gt;&lt;SPAN title="Se for criado o static com o protocolo ea porta tenho um conflito de configuração com a primeira regra criada:"&gt;If the static is created with the protocol and port configuration have a conflict with the first rule created:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list NAT_3017_3017 extended permit tcp host 10.2.64.4 eq 3017 any range eq 1 65535&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 192.168.8.4&amp;nbsp; access-list NAT_3017_3017&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN title="Tem alguma sugestão?"&gt;Any suggestions? &lt;/SPAN&gt;&lt;SPAN title="Por acaso você consegue reproduzir esta configuração?"&gt;Actually you can play this setup?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN title="Por acaso você consegue reproduzir esta configuração?"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN title="A configuração de range de porta criado na ACL, é necessário porque quando a conexão é estabelecida por qualquer origem da outside, o Ip de origem usa porta aleatória."&gt;The setting range of port created in the ACL, it is necessary because when the connection is established by any outside source, the source IP uses random port. &lt;/SPAN&gt;&lt;SPAN title="Por isso houve a necessidade de configurar desta forma."&gt;Therefore it was necessary to set up this way.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Att,&lt;/P&gt;&lt;P&gt;Rubens&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Apr 2010 14:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/problem-created-policy-nat/m-p/1372230#M713567</guid>
      <dc:creator>rubens.palhoni</dc:creator>
      <dc:date>2010-04-16T14:48:46Z</dc:date>
    </item>
  </channel>
</rss>

