<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - Port based NAT'ing of outside source addresses in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185317#M875811</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you described to me can be done with policy NAT something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit ip any host 4.2.2.2&lt;/P&gt;&lt;P&gt;static(outside,dmz) 2.2.2.2 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have a Pix with me to play.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Honestly, I gave up on Cisco regarding complex NAT on the ASA.  It is so convoluted and difficult to implement.  I think your customer is making a mistake in moving from Checkpoint to ASA when they have complex NAT requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you described can be done on a Checkpoint firewall in less than 10 seconds with a junior firewall admin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 25 Feb 2009 01:13:25 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2009-02-25T01:13:25Z</dc:date>
    <item>
      <title>ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185313#M875777</link>
      <description>&lt;P&gt;I am in the process of migrating web services from Checkpoint to ASA.  Can I NAT the source address of incoming packets destined for a web server on port 80?  The intent here is to be able to migrate a webserver at a time.  NAT'ing of the source address would allow me to have the web server return the packet via the ASA by using a static route for that subnet on the Web server.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:56:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185313#M875777</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2019-03-11T14:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185314#M875784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes you can do this on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 0.0.0.0 0.0.0.0 outside&lt;/P&gt;&lt;P&gt;global (dmz) 2 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this assumes that the web server is on the dmz and that you want to PAT all source addresses to the dmz interface address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 22:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185314#M875784</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-02-24T22:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185315#M875792</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats good but what I relly need is the ability to NAT based on the destination port.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have two internet connections (A and B) on different address space (for now).  I have the ASA pointing at connection B as a default.  The checkpoint points at A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a DMZ that both CP and ASA are connected to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Web server is in DMZ.  Heres the packet flow:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A DNS change is made that points webserver name to connection B.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Packet 1.1.1.1 comes to connection B.  ASA translates src to 2.2.2.2 and routes to the webserver in the dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The webserver knows to send the packet back to the ASA because it has been loaded with a static route that points the traffic bound for 2.2.2.2 to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA reverses the translated source (now a destination) to 1.1.1.1 and sends it on its way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without the translated source address I have no way to force the return traffic to the ASA and the legacy default gateway is CP.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm shooting for a phased migration based on service type and this was a potential solution.  I could just migrate the server but because it hosts many services the chance of a misconfig of one or two makes me worry.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eventually both connections (A and B) are going to be on the same network but I dont want to change the subnet and firewall at the same time. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To migrate the web server to the ASA my thought was to first config a static route  on the edge rtr that points to the ASA.  On the ASA I NAT all incoming traffic source addresses that are destined for my web server on port 80 to 172.16.0.1.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the dmz (which is dual homed to both checkpoint and ASA) I configure a static route on the &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Feb 2009 22:50:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185315#M875792</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2009-02-24T22:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185316#M875802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could try policy NAT altho i have never used it from outside to inside ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;assuming web server address is 192.168.5.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list web permit tcp any host 192.168.5.10 eq 80 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 2 access-list web outside&lt;/P&gt;&lt;P&gt;global (dmz) 2  interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 00:43:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185316#M875802</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-02-25T00:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185317#M875811</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What you described to me can be done with policy NAT something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list test permit ip any host 4.2.2.2&lt;/P&gt;&lt;P&gt;static(outside,dmz) 2.2.2.2 access-list test&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have a Pix with me to play.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Honestly, I gave up on Cisco regarding complex NAT on the ASA.  It is so convoluted and difficult to implement.  I think your customer is making a mistake in moving from Checkpoint to ASA when they have complex NAT requirements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you described can be done on a Checkpoint firewall in less than 10 seconds with a junior firewall admin.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 01:13:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185317#M875811</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2009-02-25T01:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - Port based NAT'ing of outside source addresses</title>
      <link>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185318#M875819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;LOL.  You mean the simle ASDM GUI isnt simple?  (kidding)  I hear you.  I build tunnels and then go command line and read them.  What a mess.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Feb 2009 19:23:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-port-based-nat-ing-of-outside-source-addresses/m-p/1185318#M875819</guid>
      <dc:creator>cchughes</dc:creator>
      <dc:date>2009-02-25T19:23:14Z</dc:date>
    </item>
  </channel>
</rss>

