<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: open translated IP from the inside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472382#M766182</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What went wrong? Can you please check the logs (informational level)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Jul 2010 15:47:44 GMT</pubDate>
    <dc:creator>Marcin Latosiewicz</dc:creator>
    <dc:date>2010-07-06T15:47:44Z</dc:date>
    <item>
      <title>open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472375#M766079</link>
      <description>&lt;P&gt;we have a ASA5500 with 3 interfaces : outside, dmz, inside&lt;/P&gt;&lt;P&gt;we have a number of static nats translating a given public IP to a dmz servers and that all works fine.&amp;nbsp; However for testing purposes, we need to be able to access the public IP from the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the following but that did not work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,inside) &amp;lt;public_IP&amp;gt; &amp;lt;dmz_IP&amp;gt; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;what translation is missing to allow users from the inside to access the public ip address?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:08:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472375#M766079</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2019-03-11T18:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472376#M766088</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would start with&lt;/P&gt;&lt;P&gt;static (dmz,inside) &lt;PUBLIC_IP&gt; &lt;DMZ_IP&gt; netmask&amp;nbsp; 255.255.255.255&lt;/DMZ_IP&gt;&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;enable logging on informational level from and test.&lt;/P&gt;&lt;P&gt;After test do "show logg | i IP.address"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 13:53:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472376#M766088</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T13:53:57Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472377#M766106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As Marcin said, you need to configure the static with "static (DMZ,inside) &lt;PUBLIC ip=""&gt; &lt;PRIVATE ip=""&gt;" format. Also, ensure that there is NAT translation between the inside and the DMZ. It could be identity NAT or dynamic PAT.&lt;/PRIVATE&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,DMZ) &lt;INSIDE ip="" range=""&gt; &lt;INSIDE ip="" range=""&gt; netmask &lt;INSIDE netmask=""&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip &lt;INSIDE ip="" range=""&gt; &lt;MASK&gt; &lt;DMZ ip="" range=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/DMZ&gt;&lt;/MASK&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (dmz) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will ensure that all traffic from inside (higher security) is going to DMZ with proper NAT translations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 14:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472377#M766106</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-06T14:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472378#M766117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So which one is it?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Marcin says:&lt;/P&gt;&lt;P&gt;static (dmz,inside) &lt;PUBLIC_IP&gt; &lt;DMZ_IP&gt; netmask&amp;nbsp; 255.255.255.255&lt;/DMZ_IP&gt;&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nagaraja says:&lt;/P&gt;&lt;P&gt;static (inside,DMZ) &lt;INSIDE ip="" range=""&gt; &lt;INSIDE ip="" range=""&gt; netmask &lt;INSIDE netmask=""&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/INSIDE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and what is the logic behind this?&lt;/P&gt;&lt;INPUT id="gwProxy" type="hidden" /&gt;&lt;P&gt;&lt;!--Session data--&gt;&lt;/P&gt;&lt;INPUT id="jsProxy" onclick="" type="hidden" /&gt;&lt;DIV id="refHTML"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 14:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472378#M766117</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2010-07-06T14:32:01Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472379#M766138</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We're not contadicting each other. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to make sure that servers from DMZ to inside are translated (what I was going for).&lt;/P&gt;&lt;P&gt;But at the same time, it's&amp;nbsp; best to NAT inside users to somethin on DMZ. Be it identity or PAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 14:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472379#M766138</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T14:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472380#M766147</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need both of them for proper communication between the interfaces i.e. inside and DMZ. As Marcin said, one will ensure that when your inside hosts try to access the public IP of the DMZ server, it gets translated to corresponding DMZ IP. Other one is needed to satisfy the firewall requirement i.e. NAT rules are needed when you go from higher security interface (inside) to a lower security interface (DMZ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 15:11:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472380#M766147</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-06T15:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472381#M766173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have added the following 2 lines to the firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) &lt;PUBLIC_IP&gt; 192.168.1.15 netmask&amp;nbsp; 255.255.255.255&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;The users on the inside are 172.0.0.0\8&lt;/P&gt;&lt;P&gt;static (inside,dmz) 172.0.0.0 172.0.0.0 netmask 255.0.0.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the translation from the outside...it was there before&lt;/P&gt;&lt;P&gt;static (dmz,outside) &lt;PUBLIC_IP&gt;192.168.1.15 netmask 255.255.255.255&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am still unable to access the public address from the inside or from the dmz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 15:43:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472381#M766173</guid>
      <dc:creator>ronshuster</dc:creator>
      <dc:date>2010-07-06T15:43:44Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472382#M766182</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What went wrong? Can you please check the logs (informational level)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 15:47:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472382#M766182</guid>
      <dc:creator>Marcin Latosiewicz</dc:creator>
      <dc:date>2010-07-06T15:47:44Z</dc:date>
    </item>
    <item>
      <title>Re: open translated IP from the inside</title>
      <link>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472383#M766196</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have any nonat or identity NAT configurations from DMZ to inside? It would look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 access-list &lt;ACCESS-LIST name=""&gt;&lt;/ACCESS-LIST&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,inside) 192.168.1.x 192.168.1.x netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have these, that could be the reason you are not able to access. Please modify the configuration so that there is no identity nat from DMZ to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Jul 2010 15:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/open-translated-ip-from-the-inside/m-p/1472383#M766196</guid>
      <dc:creator>Nagaraja Thanthry</dc:creator>
      <dc:date>2010-07-06T15:49:35Z</dc:date>
    </item>
  </channel>
</rss>

