<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Nat a pool of ip's in cisco asa - Help in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335928#M785486</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question. What is the point of the static command doesn't this do the natting? How does it differ to your suggested solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Nov 2009 15:49:58 GMT</pubDate>
    <dc:creator>dan_track</dc:creator>
    <dc:date>2009-11-20T15:49:58Z</dc:date>
    <item>
      <title>How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335922#M785480</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a problem where I'd like to nat a pool of ip's in my dmz to a single or pool of ip's on my inside network. I have a vpn device that is going to hand out a range of ip to vpn clients, the range is 172.15.16.0/24. The dmz is on the range 10.45.96.0/24. I'd like to nat these vpn pool of ip's 172.15.16.0/24 to a single or pool of ip addresses on my inside interface (10.45.60.0) on my cisco asa. Can someone please help me with the configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also how can I restrict this range of ip's i.e the VPN pool or the natted inside pool to accessing a few pre-determined ip's and port numbers, i.e where can I place the acl before or after nat?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:41:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335922#M785480</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2019-03-11T16:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335923#M785481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To a single IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 172.16.5.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 &lt;SINGLE ip=""&gt;&lt;/SINGLE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to a pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 1 172.16.5.0 255.255.255.0 outside&lt;/P&gt;&lt;P&gt;global (inside) 1 &lt;POOL ip=""&gt; &lt;SUBNET mask=""&gt;&lt;/SUBNET&gt;&lt;/POOL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to restrict access use an outbound acl on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 13:41:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335923#M785481</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-20T13:41:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335924#M785482</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Many thanks for that. Can I just ask is there a benfit of using either single or multiple ip's for the inside ip's?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 13:58:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335924#M785482</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-20T13:58:05Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335925#M785483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Depends on a couple of things&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) If you use a single address then it will have to do PAT (port address translation). This is fine as long as it doesn't break the application which it can do.&lt;/P&gt;&lt;P&gt;2) More importantly if you use a single address it is a lot harder to tie that to the real IP address. If you want to log what the VPN clients are doing then it is easier to do a one-to-one translation, log this translation and then track down what that Natted IP address did.&lt;/P&gt;&lt;P&gt;3) The other one is obviously a shortage of addresses which is often why PAT is used going from inside to the Internet. But that doesn't apply in this case as you can use any private addressing you like.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 15:24:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335925#M785483</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-20T15:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335926#M785484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You're a star Jon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 15:31:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335926#M785484</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-20T15:31:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335927#M785485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem, glad to have helped.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 15:46:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335927#M785485</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-20T15:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335928#M785486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question. What is the point of the static command doesn't this do the natting? How does it differ to your suggested solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 15:49:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335928#M785486</guid>
      <dc:creator>dan_track</dc:creator>
      <dc:date>2009-11-20T15:49:58Z</dc:date>
    </item>
    <item>
      <title>Re: How to Nat a pool of ip's in cisco asa - Help</title>
      <link>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335929#M785487</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dan&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static command creates a permanent NAT translation and is bi-directional ie. connections can be initiated from both ways.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But all you want to do is NAT incoming VPN connections so you can do this dynamically because connections will only ever be initiated from the VPN client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Nov 2009 16:00:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-nat-a-pool-of-ip-s-in-cisco-asa-help/m-p/1335929#M785487</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-11-20T16:00:33Z</dc:date>
    </item>
  </channel>
</rss>

