<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Natted and Physical IP access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227469#M875529</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find the details of requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside IP : 172.16.0.0/24&lt;/P&gt;&lt;P&gt;Host: 172.16.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nannted IP: 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside IP: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Host: 192.168.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now my requirement is from host 192.168.1.20 can I access 192.168.1.10 and also 172.16.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jon: Its the customers requirement for SAP application and also for your reference this is working in checkpoint now. We are replacing ASA-5580 in the place of checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it possible?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 06 Mar 2009 13:27:37 GMT</pubDate>
    <dc:creator>santoshm_75</dc:creator>
    <dc:date>2009-03-06T13:27:37Z</dc:date>
    <item>
      <title>Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227462#M875522</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using ASA 5580 with software Version 8.1(2). Could it be possible to access the NATTED IP address and also the physical IP address at the same time from the host.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:59:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227462#M875522</guid>
      <dc:creator>santoshm_75</dc:creator>
      <dc:date>2019-03-11T14:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227463#M875523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My requirement is different then what you have mentioned. In the configuration what you have mentioned if i have a host connected to ip add 100.100.100.2 and want to access 100.10.100.1, 20.20.20.1 and other 20.20.20.0/24 hosts. Can it be possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible then send some write up and also any cisco site reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Mar 2009 16:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227463#M875523</guid>
      <dc:creator>santoshm_75</dc:creator>
      <dc:date>2009-03-02T16:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227464#M875524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure you can, depending what is your scenarion , but generally you can use &lt;B&gt;same-security-traffic permit intra-interface&lt;/B&gt; command in conjuction with specific nat statement , and connect to the NAted  address from where you are sourcing the local host . This is also known as hairpining .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Mar 2009 18:15:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227464#M875524</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-04T18:15:46Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227465#M875525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have all the intra interfaces with differenet level of secuity, then also can it be possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If possible Please let me know some write up or any cisco write up details for reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Mar 2009 14:16:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227465#M875525</guid>
      <dc:creator>santoshm_75</dc:creator>
      <dc:date>2009-03-05T14:16:20Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227466#M875526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Typical scenario  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;say :&lt;/P&gt;&lt;P&gt;inside host 20.20.20.1/24   - Its public IP 100.100.100.1 for outside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Typically  you would have one-to-one NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside/outside) 100.100.100.1  20.20.20.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now you want local hosts in the 20.20.20.0/24 subnet  access 100.100.100.1 which is maped to 20.20.20.1   &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;static &lt;B&gt;(inside,inside)&lt;/B&gt; 100.100.100.1 20.20.20.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and allow inbound rules for 100.100.100.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so inside hosts under 20.20.20.0/24 can access 20.20.20.1 localy as well as  100.100.100.1 from inside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is some reference on hairpining &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml#solution2" target="_blank"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968d1.shtml#solution2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;PLS rate any helpful posts if it helps&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Mar 2009 16:54:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227466#M875526</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-05T16:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227467#M875527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Santosh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to clarify what you are asking. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Server = real IP address = 192.168.5.1&lt;/P&gt;&lt;P&gt;         Natted IP address = 172.16.5.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you asking if from a client host you can connect to both 172.16.5.1 and 192.168.5.1 on the same port ? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so no you can't. It's one or the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 12:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227467#M875527</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-06T12:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227468#M875528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;B&gt;if i have a host connected to ip add 100.100.100.2 and want to access 100.10.100.1, 20.20.20.1 and other 20.20.20.0/24 hosts. Can it be possible&lt;/B&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Santosh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im not quite sure I understand your requirements which it seemed to me from your initial post a hairpining requirement. I would like to know what application prompts you to have this type of settings, perhaps if you could provide in detail what this requiremen entails in terms of TCP/UDP services I  could provide better answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 13:26:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227468#M875528</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2009-03-06T13:26:34Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227469#M875529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Find the details of requirement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside IP : 172.16.0.0/24&lt;/P&gt;&lt;P&gt;Host: 172.16.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nannted IP: 192.168.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside IP: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Host: 192.168.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now my requirement is from host 192.168.1.20 can I access 192.168.1.10 and also 172.16.1.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi Jon: Its the customers requirement for SAP application and also for your reference this is working in checkpoint now. We are replacing ASA-5580 in the place of checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could it possible?&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 13:27:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227469#M875529</guid>
      <dc:creator>santoshm_75</dc:creator>
      <dc:date>2009-03-06T13:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Natted and Physical IP access</title>
      <link>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227470#M875530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Santosh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to access the 172.16.1.10 and 192.168.1.10 from outside using the same application port number you cannot do this on the ASA. I understand you can do this with Checkpoint but NAT functionality differs between firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Mar 2009 13:40:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/natted-and-physical-ip-access/m-p/1227470#M875530</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-06T13:40:09Z</dc:date>
    </item>
  </channel>
</rss>

