<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple NAT Pool/ Static NAT for diffenet Subnets. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441286#M812495</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All switches are Cisco 3550 with EMI/ layer 3 image on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Jun 2010 18:06:45 GMT</pubDate>
    <dc:creator>s.nasheet</dc:creator>
    <dc:date>2010-06-04T18:06:45Z</dc:date>
    <item>
      <title>Multiple NAT statements for multiple Subnets on PIX</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441280#M812489</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to configure a&amp;nbsp; PIX&amp;nbsp; to do NATing for the&amp;nbsp; multiple subnets. In my private network I am runnning 172.16.X.X network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have many vlans within our network&amp;nbsp; and each vlan is a seperate office which doesn't require to talk to other vlan/office.only internet access is required.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is can I configure CIsco PIX to do NATing for each vlan seperately with the multiple NAT statments and overload each vlan traffic to the different public IP adddress.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have many public IP addresses available for this&amp;nbsp; purpose.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I am trying to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN 10&lt;/P&gt;&lt;P&gt;Subnet&amp;nbsp; range = 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;WAN IP = 91.34.54.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN 11&lt;/P&gt;&lt;P&gt;Subnet&amp;nbsp; range - 172.16.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;WAN IP = 91.34.54.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN 12&lt;/P&gt;&lt;P&gt;Subnet&amp;nbsp; range - 172.16.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;WAN IP = 91.34.54.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want PIX to do NAT but use different public IP address based on the source traffic of&amp;nbsp; VLAN/sunbet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will create loopback interface on PIX with&amp;nbsp; /32 mask.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Interface loopback10&lt;/P&gt;&lt;P&gt;ip address 91.34.54.10 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Interface loopback11&lt;/P&gt;&lt;P&gt;ip address 91.34.54.11 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Interface loopback12&lt;/P&gt;&lt;P&gt;ip address 91.34.54.12 255.255.255.255&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;Then NAT statment for each VLAN. ( I am not sure how nat statment looks in PIX but below are just&amp;nbsp; example)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip nat inside source list 10 interface loopback 10 overload&lt;/P&gt;&lt;P&gt;ip nat inside source list 11 interface loopback 11 overload&lt;/P&gt;&lt;P&gt;ip nat inside source list 12 interface loopback 12 overload&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;Then use access-list to identify&amp;nbsp; each vlan traffic to be translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;acccess-list 10 permit 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;acccess-list 11 permit 172.16.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;acccess-list 12 permit 172.16.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The whole idea is to make sure PIX uses different public ip address for translation based on the vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So whenever users from vlan10 go to internet, they will be translated to&amp;nbsp; 91.34.54.10., and whenever users from vlan11 go to internet they will be translated to 91.34.54.11 and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that possible to configure PIX to have multiple NAT statements based on vlan/subnet and overload on unique public ip addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441280#M812489</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2019-03-11T17:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnbets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441281#M812490</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You cannot create loopbacks on the PIX.&lt;/P&gt;&lt;P&gt;If you have this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VLAN 10&lt;BR /&gt;Subnet&amp;nbsp; range = 172.16.10.0 255.255.255.0&lt;BR /&gt;WAN IP = 91.34.54.10&lt;BR /&gt; &lt;BR /&gt;VLAN 11&lt;BR /&gt;Subnet&amp;nbsp; range - 172.16.11.0 255.255.255.0&lt;BR /&gt;WAN IP = 91.34.54.11&lt;BR /&gt; &lt;BR /&gt;VLAN 12&lt;BR /&gt;Subnet&amp;nbsp; range - 172.16.12.0 255.255.255.0&lt;BR /&gt;WAN IP = 91.34.54.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can do the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 10 172.16.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 10 91.34.54.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 11 172.16.11.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 11 91.34.54.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 12 172.16.12.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 12 91.34.54.12&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Jun 2010 22:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441281#M812490</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-03T22:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnbets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441282#M812491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I also configure PIX to have a pool of public ip addresses ( 2 public IP per pool) and then use the same pool to translate LAN traffic to internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT Pool 10 =&amp;nbsp; IP's in pool are 91.34.54.10 And 91.34.54.11 ----------&amp;gt;2 public IP's per pool&lt;/P&gt;&lt;P&gt;NAT Pool 11 =&amp;nbsp; IP's in pool are 91.34.54.12 And 91.34.54.13 ----------&amp;gt;2 public IP's per pool&lt;/P&gt;&lt;P&gt;NAT Pool 12 =&amp;nbsp; IP's in pool are 91.34.54.14 And 91.34.54.15 ----------&amp;gt;2 public IP's per pool&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is just to make sure that each vlan has minimum of 2 public IP addresses to go on internet ,which can be useful if vlan users are running multiple servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do we need to specify the network mask when configure the NAT pool in PIX?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do I need to confiure routing between switches and PIX&amp;nbsp; to allow all Vlan/ subnet to reach&amp;nbsp; firewall ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Subnet on LAN are 172.16.&lt;STRONG&gt;10&lt;/STRONG&gt;.0/24, 172.16.&lt;STRONG&gt;11&lt;/STRONG&gt;.0/24, 172.16.&lt;STRONG&gt;12&lt;/STRONG&gt;.0/24 etc , what is the best mask to configure on PIX INSIDE interface /24 or /16 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks for your advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 10:06:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441282#M812491</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-04T10:06:42Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnbets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441283#M812492</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Salman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes you can have multiple pools. &lt;BR /&gt;If you don't specify the network mask it will assume the default class mask, so if you intend to use a different mask you should specify it. &lt;BR /&gt;If the VLANs are not directly connected to the Firewall, then you will need some sort of routing (either static or dynamic routing protocols) &lt;BR /&gt;If you have three subnets: &lt;BR /&gt;172.16.10.0/24 &lt;BR /&gt;172.16.11.0/24 &lt;BR /&gt;172.16.12.0/24 &lt;BR /&gt;You can summarize them with 172.16.8.0/21 for example, but you need to make sure it won't overlap with anything else on your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 15:34:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441283#M812492</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T15:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441284#M812493</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only one Switch ( swtich-01) with be directly connected to firewall while other switches will be inter-connected with each other but not to firewall directly. Does this switch&amp;nbsp; need to have routing enabled ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I configure switch-01 as a VTP server and create all vlans &amp;amp; vlan interfaces on that switch, then would I still I need to configure routing between PIX and the switch-01 ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Do&amp;nbsp; all other switches have to point to switch-01 as default-gateway or they have to point&amp;nbsp; PIX inside interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 17:33:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441284#M812493</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-04T17:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441285#M812494</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Salman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't need any routing at all internally, if the switches you're referring are layer 2 switches.&lt;/P&gt;&lt;P&gt;If the switches are layer 3, then you will need routing as if they were actual routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know what kind of switches do you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 18:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441285#M812494</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T18:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441286#M812495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All switches are Cisco 3550 with EMI/ layer 3 image on them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 18:06:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441286#M812495</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-04T18:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441287#M812496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I should have been more specific.&lt;/P&gt;&lt;P&gt;Are the 3550s working as layer 3 or layer 2 switches?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 18:44:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441287#M812496</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T18:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441288#M812498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats what need to be decided.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this time, they not the part of&amp;nbsp; live network , but need to decide weather to use them as a L2 or L3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 18:47:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441288#M812498</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-04T18:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441289#M812501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to decide that.&lt;/P&gt;&lt;P&gt;If using the switches as L2, they will all be in the same broadcast domain (unless using VLANs).&lt;/P&gt;&lt;P&gt;There's a need to a L3 device somewhere to do the InterVLAN routing (could be the firewall itself).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If using the switches as L3, they will serve as routers in that they will have their own IPs to route traffic. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Generally speaking I'll recommend Layer 3 switches if necessary or L2 switches if not having a complicated environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is very general and you need to take technical/budget/business considerations into account for this decision.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 18:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441289#M812501</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-04T18:57:35Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441290#M812502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will go for L3 switches and will enable IP rounting on all switces and may possibilly cofigure a static on firewall to learn all&amp;nbsp; subnets on LAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will post further if I have any problems during the configuration &amp;amp; installation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the advise.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Jun 2010 19:06:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441290#M812502</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-04T19:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441291#M812504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico.,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;I have enabled the routing on the switches to allow PIX to learn all subnets that are available on the LAN. but due to this inter-vlan routing is also enabled and now all vlans can talk/ping/communicate to each other which is not a desired solution as each vlan is a separate office and doesn't require to speak to other vlan.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Can we avoid this situation some how ? Is the VACL is the good option ?&amp;nbsp; I have not tried VACL before but not sure how hard it is to configure.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Any other options available to keep each vlan separated while still allow PIX to&amp;nbsp; have reachability to all subnet/vlan on LAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; color: #333333; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;"&gt;Salman&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jun 2010 16:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441291#M812504</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-06T16:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441292#M812507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you have configured the 3550s as layer 3 switches and they are routing and doing inter-VLAN routing, you can restrict traffic with regular ACLs.&lt;/P&gt;&lt;P&gt;There's no need for VACLs. VACLs are normally used when you want to restrict traffic between ports that belong to the same VLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case you're trying to restrict traffic between VLANs (this is between IP subnets), so you can use regular extended ACLs.&lt;/P&gt;&lt;P&gt;Take a look:&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.2_44_se/configuration/guide/swacl.html"&gt;http://www.cisco.com/en/US/docs/switches/lan/catalyst3550/software/release/12.2_44_se/configuration/guide/swacl.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jun 2010 16:29:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441292#M812507</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-06-06T16:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple NAT Pool/ Static NAT for diffenet Subnets.</title>
      <link>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441293#M812509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers mate.Thanks for the links. I will use ACL&amp;nbsp; to block inter-vlan routing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Salman&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jun 2010 21:56:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/multiple-nat-statements-for-multiple-subnets-on-pix/m-p/1441293#M812509</guid>
      <dc:creator>s.nasheet</dc:creator>
      <dc:date>2010-06-06T21:56:14Z</dc:date>
    </item>
  </channel>
</rss>

