<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA 5510 with Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396303#M755039</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Buddy,&lt;/P&gt;&lt;P&gt;Please take care your routing information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 16 Dec 2009 07:20:19 GMT</pubDate>
    <dc:creator>keisikka</dc:creator>
    <dc:date>2009-12-16T07:20:19Z</dc:date>
    <item>
      <title>ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396299#M754975</link>
      <description>&lt;P&gt;Hi friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am saravanan from Bangalore. In one of our customer require to put static IP to access from outside (internet).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside ------------------------&amp;gt; ASA 5510 -----------------&amp;gt; 1800 router&amp;nbsp; ------&amp;gt;&amp;nbsp; outside&lt;/P&gt;&lt;P&gt;192.168.10.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp; .254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.253/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; .254/30&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 218.X.X.177&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually here In router we configured the static nat translation, but i want to configure in ASA 5510, so i tried to configure in static nat but i can't able to configure. Please check the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then i want to allow FTP, Telnet, Remote desktop, http, https also.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 218.X.X.180 192.168.10.200 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;i want to access 192.168.10.200, 201, 202, 203, 204 IP address to access outside 218.X.X.180, 181, 182, 183.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Router config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;BR /&gt; ip address 218.X.X.177 255.255.255.240&lt;BR /&gt; ip access-group 102 in&lt;BR /&gt; ip nat outside&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;interface FastEthernet0/1&lt;BR /&gt; ip address 10.1.1.254 255.255.255.252&lt;BR /&gt; ip nat inside&lt;BR /&gt; duplex auto&lt;BR /&gt; speed auto&lt;BR /&gt;!&lt;BR /&gt;ip classless&lt;BR /&gt;ip route 0.0.0.0 0.0.0.0 218.X.X.178&lt;BR /&gt;ip route 192.168.10.0 255.255.255.0 10.1.1.253&lt;BR /&gt;!&lt;BR /&gt;no ip http server&lt;BR /&gt;ip nat pool INTERNET 218.X.X.180 218.X.X.180 netmask 255.255.255.240&lt;BR /&gt;ip nat inside source list 101 pool INTERNET overload&lt;BR /&gt;ip nat inside source static 192.168.10.114 218.X.X.184&lt;BR /&gt;ip nat inside source static 192.168.10.115 218.X.X.185&lt;BR /&gt;!&lt;BR /&gt;access-list 101 permit ip 192.168.10.0 0.0.0.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 192.168.0.0 0.0.255.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 172.16.0.0 0.15.0.0 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 10.0.0.0 0.255.255.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip host 127.0.0.0 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip host 0.0.0.0 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 169.254.0.0 0.0.255.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 192.0.2.0 0.0.0.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 204.152.64.0 0.0.0.1 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; ip 224.0.0.0 31.255.255.255 any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; icmp any any&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq ident&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 137&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 138&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 447&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 81&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 135&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 444&lt;BR /&gt;access-list 102 deny&amp;nbsp;&amp;nbsp; tcp any any eq 445&lt;BR /&gt;access-list 102 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA Config&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;BR /&gt; nameif OUTSIDE&lt;BR /&gt; security-level 0&lt;BR /&gt; ip address 10.1.1.253 255.255.255.252 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt; nameif inside&lt;BR /&gt; security-level 100&lt;BR /&gt; ip address 192.168.10.254 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;access-list BROWSING extended permit ip 192.168.10.0 255.255.255.0 any &lt;BR /&gt;access-list INTERNET extended permit ip any any &lt;BR /&gt;access-list INTERNET extended permit icmp any any &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging asdm informational&lt;BR /&gt;mtu OUTSIDE 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;icmp permit any inside&lt;BR /&gt;asdm image disk0:/asdm-603.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;static (inside,OUTSIDE) 192.168.10.0 192.168.10.0 netmask 255.255.255.0 &lt;BR /&gt;access-group INTERNET in interface OUTSIDE&lt;BR /&gt;route OUTSIDE 0.0.0.0 0.0.0.0 10.1.1.254 1&lt;BR /&gt;http server enable&lt;BR /&gt;http 192.168.1.0 255.255.255.0 management&lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;telnet 192.168.10.0 255.255.255.0 inside&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh timeout 5&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:48:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396299#M754975</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2019-03-11T16:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396300#M754994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the ASA do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. add nat exemption with an ACL. Deny this one host 192.168.10.200 going any where and permit the rest in the acl.&lt;/P&gt;&lt;P&gt;2. remove the identity static line&lt;/P&gt;&lt;P&gt;static (inside,OUTSIDE) 192.168.10.0 192.168.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;3. add this static line static (inside, outside)&amp;nbsp; 218.X.X.180 192.168.10.200 netmask 255.255.255.255 or as static pat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 218.X.X.180 21 192.168.10.200 21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 218.X.X.180 23 192.168.10.200 23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 218.X.X.180 3389 192.168.10.200 3389 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside, outside) tcp 218.X.X.180 443 192.168.10.200 443 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. On the router remove 218.X.X.180 from the pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Honestly I would either move all the translation onto the ASA or leave it on the Router.&amp;nbsp; You are trying to leave dynamic NAT on the router and move the static NAT onto the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Dec 2009 18:31:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396300#M754994</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-15T18:31:39Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396301#M755016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for your reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already tried to remove the 218.X.X.180 pool from the router, then the internet connection is not reach to my ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then I tried the following command in the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;ip global outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command also not working in the router (not able to connect the internet).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Dec 2009 18:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396301#M755016</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2009-12-15T18:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396302#M755029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Saravanan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. let us know once you complete all the steps that I listed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to overload it to the outside interface IP address if that is the only address in the pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 101 interface FastEthernet0/0 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once done, get the output of "sh xlate debug | i 192.168.1.200 and make sure the ASA is translating the address properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Dec 2009 19:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396302#M755029</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2009-12-15T19:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396303#M755039</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Buddy,&lt;/P&gt;&lt;P&gt;Please take care your routing information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 16 Dec 2009 07:20:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396303#M755039</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2009-12-16T07:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396304#M755045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi frnds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already tried the below configuration, but it's not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i removed the pool, then put fastethernet with overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 101 interface fastethernet 0/1 overload&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permit ip 192.168.10.0 0.0.0.255 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then in ASA 5510 side&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I create static NAT,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(inside,outside) 218.X.X.181 tcp 21 192.168.10.111 tcp 21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static(inside,outside) 218.X.X.181 tcp 23 192.168.10.111 tcp 23 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static(inside,outside) 218.X.X.181 tcp http 192.168.10.111 tcp http netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static(inside,outside) 218.X.X.181 tcp https 192.168.10.111 tcp https netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static(inside,outside) 218.X.X.182 192.168.10.112 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;even though i can't able to connect from outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pls help me ya.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Jan 2010 18:00:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396304#M755045</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2010-01-02T18:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396305#M755050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi frnds,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tell the right solution, i want to enable the particular outside ip to permit in my router, is it ok or not&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jan 2010 11:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396305#M755050</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2010-01-03T11:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396306#M755053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I saw so many ACLs in the&amp;nbsp; 1800 routers, it seems performing the firewall function. and also you have asa. I am thinking is the architecture appropriate ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yang&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jan 2010 17:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396306#M755053</guid>
      <dc:creator>YANGCCIE4</dc:creator>
      <dc:date>2010-01-03T17:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396307#M755056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Saravanan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remember right you were going to remove the IP from the pool on the router and use the interface to PAT and do static translation on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to verify the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. static pat tranlation is working on the ASA. "sh xlate debug | i 192.168.10.200"&lt;/P&gt;&lt;P&gt;2. The router will send packets to the ASA for this particular IP address.&lt;/P&gt;&lt;P&gt;3. Collect captures on the ASA to see if packets are arriving.&lt;/P&gt;&lt;P&gt;4. check the logs on the ASA to see what they may be revealing.&lt;/P&gt;&lt;P&gt;5. most of all the acl applied on the outside interface of the ASA is allowing this traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. remember to verify the following for all flows through the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Route&lt;/P&gt;&lt;P&gt;Translation&lt;/P&gt;&lt;P&gt;Permission&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 03 Jan 2010 23:53:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396307#M755056</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-03T23:53:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396308#M755058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How do you expect the ASA to do statics for the outside IP's when they exists infront of the 1800? No packets will reach the ASA with destination containing those addresses. The traffic will stop in your router because it is doing NAT. Why don't you just put the router and the ASA on the same segment. I don't see any reason to why you're doing it like you're doing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jan 2010 00:33:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396308#M755058</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-01-04T00:33:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396309#M755060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is very much possible to do what Saravanan is trying to accomplish provided he configures the ASA and router properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pls. also make sure that this traffic (static pat) is exempted in the nat overload list that you have added on the router. You need a deny before the permit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jan 2010 13:33:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396309#M755060</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-04T13:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396310#M755063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;saravanan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why dont you simplify your configuration by letting the ASA taking care of destination NAT translations instead. You dont need NAT enable on your internet router when you have a firewall that can handle NAT. By having NAT on both router &amp;amp; ASA you are adding more complexity!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is a simple design that will work for you &lt;A href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#t5"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#t5&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jan 2010 13:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396310#M755063</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2010-01-04T13:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396311#M755066</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly. I had suggested that the first time I responded to his query.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jan 2010 14:11:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396311#M755066</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-01-04T14:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396312#M755070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And doing that requires he changed his ip addressing schema and gets rid of NAT. So basically a completely new setup. &lt;SPAN __jive_emoticon_name="silly" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/silly.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Jan 2010 15:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396312#M755070</guid>
      <dc:creator>Kent Heide</dc:creator>
      <dc:date>2010-01-04T15:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396313#M755073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;SOSo Dear Guys:&lt;/P&gt;&lt;P&gt;I think there will be 2 ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1.Disable NAT control on ASA, and put all NAT on router.&lt;/P&gt;&lt;P&gt;2.Divide public IP to 2 segments. The first on route outside, the second on route inside and ASA outside.So the NAT can reside on ASA and router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jan 2010 03:44:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396313#M755073</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2010-01-05T03:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396314#M755076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;psaravanan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sounds like there is few things you need to take in to consideration based on what others have commented.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question&lt;BR /&gt;=========&lt;BR /&gt;Is your internet router managed by your or ISP?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you plan to have the NAT on the ASA since you are introducing the ASA in to your LAN (option i would go for) then you need to get ISP to allocate you a public IP's for connection between ASA-&amp;gt;Router. This will require a small IP changes on your web tier between the ASA-&amp;gt;Router and remove all NAT entries on the router and enable on ASA (simple config change). Looking at your configs you dont have a lot to change so you might be able to do it all in one go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or we try to get your existing design working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will build your existing config in the lab hopefully tonight test. will get back to you&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Francisco..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Jan 2010 13:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396314#M755076</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2010-01-05T13:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396315#M755078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK I got Psaravanan setup working with Internet Router doing NAT and configured ASA with no nat-control enable. The ASA is only routing with NAT disable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the lab i setup 3 routers 1 ASA as:&lt;/P&gt;&lt;P&gt;ISP Router&amp;nbsp; - &amp;gt; WAN Router - This is ISP to Client router connectivity&lt;/P&gt;&lt;P&gt;WAN Router - &amp;gt; ASA FW- This is Client Internet Router to Client Firewall&lt;/P&gt;&lt;P&gt;ASA FW - Core Router - This is Client Firewall to Private Core switch&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used the Core router as client to test telnet connectivity by enabling NAT on WAN Router and enable ACL and routing on ASA to forward NATed telnet traffic to Core for telnet traffic from ISP Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See attachment for configs inc testing result..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that makes sense...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Psaravanan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get your config going just use the config i have attached as an example to configure your ASA and static source NAT on your router. The config is very simple. If you decided to enable the NAT on the ASA then just follow URL i mentioned above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Francisco&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jan 2010 00:54:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396315#M755078</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2010-01-06T00:54:59Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396316#M755081</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear:&lt;/P&gt;&lt;P&gt;The third way is removing the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;THX&lt;/P&gt;&lt;P&gt;Keisikka&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jan 2010 05:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396316#M755081</guid>
      <dc:creator>keisikka</dc:creator>
      <dc:date>2010-01-06T05:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396317#M755082</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks mr. Francisco,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My exciting setup is like this only, I already used static NAT in Router, but that router has hang after 20 minutes while using from outside. So i want to change the Static NAT in to ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then i configured Static NAT in ASA, but it's not working properly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jan 2010 16:42:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396317#M755082</guid>
      <dc:creator>psaravanan</dc:creator>
      <dc:date>2010-01-06T16:42:36Z</dc:date>
    </item>
    <item>
      <title>Re: ASA 5510 with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396318#M755083</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To enable NAT on the ASA for public connections then you gonna have to change IP's on interface between Your ISP router and ASA and make some changes to remove NAT on router and enable it on ASA.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Before going down that path try the steps below on your current setup and let us know outcome.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On the Router&lt;BR /&gt;#############&lt;/P&gt;&lt;P&gt;ip nat inside source static 192.168.10.114 218.X.X.184&lt;BR /&gt;ip nat inside source static 192.168.10.115 218.X.X.185&lt;/P&gt;&lt;P&gt;interface FastEthernet0/0&lt;BR /&gt;no ip access-group 102 in&amp;nbsp; (No need for this as your ASA is now taking care of this)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ON ASA&lt;BR /&gt;########&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;no Nat-Control&lt;BR /&gt;access-list INTERNET extended permit tcp host 218.X.X.184 host 192.168.10.114 eq [your traffic port] log &lt;BR /&gt;access-list INTERNET extended permit tcp host 218.X.X.185 host 192.168.10.115 eq [your traffic port]&amp;nbsp; log&lt;/P&gt;&lt;P&gt;no static (inside,OUTSIDE) 192.168.10.0 192.168.10.0 netmask 255.255.255.0 &lt;BR /&gt;no access-list INTERNET extended permit ip any any &lt;BR /&gt;no access-list INTERNET extended permit icmp any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example if you server is listening on http&lt;/P&gt;&lt;P&gt;access-list INTERNET extended permit tcp host 218.X.X.184 host 192.168.10.114 eq http log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Testing &lt;BR /&gt;########&lt;/P&gt;&lt;P&gt;Test by connecting to 218.X.X.184 on whatever port you are allowed on ASA (server inside should be listening on port)&lt;/P&gt;&lt;P&gt;Look at "SH ip nat translations" on your router - post the output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And debug flow on ASA and post the output&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Jan 2010 17:26:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-5510-with-static-nat/m-p/1396318#M755083</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2010-01-06T17:26:38Z</dc:date>
    </item>
  </channel>
</rss>

