<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: nat based on outside source in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413922#M750666</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks fot he answer, you've understood exactly what I need with just a slight variation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip host x.x.x.x 192.168.1.1&amp;nbsp;&amp;nbsp; --&amp;gt; x.x.x.x will be able to access server at 192.168.1.1 using 160.1.1.2&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip ANY 192.168.1.2&amp;nbsp;&amp;nbsp; --&amp;gt; ANY OTHER ADDRESS will be able to access server at 192.168.1.2 using 160.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll test the above later on but from what I gather I won't be able to use ANY as a source address - ie I want only specific addresses to go to 192.168.1.1 and all others to go to 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do you think this will work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 22 Jan 2010 07:04:01 GMT</pubDate>
    <dc:creator>g_mcco</dc:creator>
    <dc:date>2010-01-22T07:04:01Z</dc:date>
    <item>
      <title>nat based on outside source</title>
      <link>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413920#M750626</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have the following situation:&lt;/P&gt;&lt;P&gt; server on inside with 192.168.1.1 address&lt;/P&gt;&lt;P&gt; outside nat address x.x.x.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is currently working correctly with static nat&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;we require to have a policy nat where we can nat outside address x.x.x.1 to a second server 192.168.1.2 based on if the source is a specifc host/network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connections are always initiated from outside (public facing web server for example).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been unable to identify a means of achieving this with policy nat, we can successully nat the inside hosts to different outside addresses based on the policy access lists but we are unable to nat an outside address to multiple inside addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:00:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413920#M750626</guid>
      <dc:creator>g_mcco</dc:creator>
      <dc:date>2019-03-11T17:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: nat based on outside source</title>
      <link>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413921#M750658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you need to MAP one public IP to multiple internal servers depending upon the source (external). You need a policy as follows :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if two different hosts (x.x.x.x and y.y.y.y) on outside world would like to access TWO different servers (192.168.1.1 and 192.168.1.2) on inside using same public IP (160.1.1.2) &lt;STRONG&gt;respectively&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-list policy extended permit ip host x.x.x.x 192.168.1.1&amp;nbsp;&amp;nbsp; --&amp;gt; x.x.x.x will be able to access server at 192.168.1.1 using 160.1.1.2&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip host y.y.y.y 192.168.1.2&amp;nbsp;&amp;nbsp; --&amp;gt; y.y.y.y will be able to access server at 192.168.1.2 using 160.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 160.1.1.2 access-list policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 04:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413921#M750658</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-22T04:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: nat based on outside source</title>
      <link>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413922#M750666</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks fot he answer, you've understood exactly what I need with just a slight variation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip host x.x.x.x 192.168.1.1&amp;nbsp;&amp;nbsp; --&amp;gt; x.x.x.x will be able to access server at 192.168.1.1 using 160.1.1.2&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip ANY 192.168.1.2&amp;nbsp;&amp;nbsp; --&amp;gt; ANY OTHER ADDRESS will be able to access server at 192.168.1.2 using 160.1.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll test the above later on but from what I gather I won't be able to use ANY as a source address - ie I want only specific addresses to go to 192.168.1.1 and all others to go to 192.168.1.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do you think this will work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 07:04:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413922#M750666</guid>
      <dc:creator>g_mcco</dc:creator>
      <dc:date>2010-01-22T07:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: nat based on outside source</title>
      <link>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413923#M750693</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can try :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip host x.x.x.x host 192.168.1.1&lt;/P&gt;&lt;P&gt;access-list policy extended permit ip host y.y.y.y host 192.168.1.1&lt;/P&gt;&lt;P&gt;static (in,out) &lt;PUBLIC ip=""&gt; access-list policy&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (in,out) &lt;PUBLIC ip=""&gt; 192.168.1.2 netmask 255.255.255.255&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, since the POLICY STATIC has higher preference than normal STATIC, so your specific uers (x.x.x.x and y.y.y.y) will go to internal server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at 192.168.1.1 using &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WHILE on the other hand, rest all users will go to&amp;nbsp; internal server at 192.168.1.2 using&amp;nbsp; same &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try this and let me know how it goes..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vijaya&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Jan 2010 18:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-based-on-outside-source/m-p/1413923#M750693</guid>
      <dc:creator>vilaxmi</dc:creator>
      <dc:date>2010-01-22T18:57:29Z</dc:date>
    </item>
  </channel>
</rss>

