<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324812#M857811</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this is your traffic flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside (10.1.1.0/25) -&amp;gt; Inside (192.168.212.10)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But Inside sees Outside network as 192.168.1.0. Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, then you can do policy NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;access-list NET10-1-1-0 extended permit ip 10.1.1.0 255.255.255.128 host 192.168.212.10&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.1.0  access-list NET10-1-1-0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the 192.168.1.0 will not be a /24, it will match the source on the ACL to be a /25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 28 Oct 2009 22:42:40 GMT</pubDate>
    <dc:creator>Jerry Ye</dc:creator>
    <dc:date>2009-10-28T22:42:40Z</dc:date>
    <item>
      <title>Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324806#M857802</link>
      <description>&lt;P&gt;I'm trying to do some natting.  My intention is to NAT a public address space (10.1.1.0 /25) subnet to a single address on my private network (192.168.1.10 /32).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the intent is to get the servers in the private subnet (VLAN'd) to respond to ANY server in the public subnet on the natted 192 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm thinking I can do this with the following config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) &amp;lt;10.1.1.0&amp;gt; &amp;lt;192.168.1.10&amp;gt; netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but, i'm not sure that it will NAT ANY address in the 10.1.1.0 /25 subnet..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any insight would be helpful...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bruce&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 16:33:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324806#M857802</guid>
      <dc:creator>Bruce Summers</dc:creator>
      <dc:date>2019-03-11T16:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324807#M857804</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand your requirements correctly, it is not possible. How would the NAT address know what IP to go to on the inside?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324807#M857804</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-28T21:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324808#M857806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the source subnet (VLAN) is direct connect to the firewall as is the destination subnet (VLAN).  I'm thinking, for example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server A 10.1.1.7; executes a packet destined for the 192.168.1.0 network, it gets NAT'd to 192.168.1.10, &lt;/P&gt;&lt;P&gt;a route on the firewall to the 192 subnet (also connected VLAN) routes the traffic to the interface for the 192 address space..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:16:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324808#M857806</guid>
      <dc:creator>Bruce Summers</dc:creator>
      <dc:date>2009-10-28T21:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324809#M857808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So are you looking to not NAT? If 10.1.1.7 sends a message to 192.168.1.10, it does not need to NAT. There is no tranlsation between the subnets. If you wanted to NAT, let's use the subnet of 172.16.1.0/24, the 10.1.1.7 server would message 172.16.1.10, which in turn would be NAT'd to 192.168.1.10. Hope that make sense.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:26:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324809#M857808</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-10-28T21:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324810#M857809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmmm...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the intent is to get the 10.1.1.7 (and any other server in that /25 subnet) to the 192.168.1.0 /24 to give the appearance that all traffic from the 10.1.17 is being sourced as 192.168.1.10...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does that make better sense...maybe i didnt explain it correctly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 21:34:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324810#M857809</guid>
      <dc:creator>Bruce Summers</dc:creator>
      <dc:date>2009-10-28T21:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324811#M857810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sorry, after rereading this, i needed to clarify.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"to give the appearce that all traffic from the 10.1.1.0 /25 is being sourced as host address 192.168.1.10"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not even sure that it can be done...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i want the hosts in the 192.168.1.0 /24 to ALWAYS talk back to 192.168.212.10 which NATs to ANY 10.1.1.0 /25...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does that make sense??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 22:01:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324811#M857810</guid>
      <dc:creator>Bruce Summers</dc:creator>
      <dc:date>2009-10-28T22:01:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324812#M857811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this is your traffic flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside (10.1.1.0/25) -&amp;gt; Inside (192.168.212.10)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But Inside sees Outside network as 192.168.1.0. Am I correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If yes, then you can do policy NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;access-list NET10-1-1-0 extended permit ip 10.1.1.0 255.255.255.128 host 192.168.212.10&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.1.0  access-list NET10-1-1-0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But the 192.168.1.0 will not be a /24, it will match the source on the ACL to be a /25.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;jerry&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 22:42:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324812#M857811</guid>
      <dc:creator>Jerry Ye</dc:creator>
      <dc:date>2009-10-28T22:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall NAT</title>
      <link>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324813#M857812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we got it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we set the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global &lt;INTERFACE in="" which="" we="" want="" the="" source="" to="" be=""&gt; 1 interface&lt;/INTERFACE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat &lt;ACTUAL interface=""&gt; 1 access-list &lt;ACL name=""&gt;&lt;/ACL&gt;&lt;/ACTUAL&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BAM worked like a champ...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for all the responses&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Oct 2009 23:54:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-nat/m-p/1324813#M857812</guid>
      <dc:creator>Bruce Summers</dc:creator>
      <dc:date>2009-10-28T23:54:39Z</dc:date>
    </item>
  </channel>
</rss>

