<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT - Inside to DMZ via Public IP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187125#M877125</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your config is good enough, it must work without any issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Jan 2009 06:00:52 GMT</pubDate>
    <dc:creator>victor_87</dc:creator>
    <dc:date>2009-01-30T06:00:52Z</dc:date>
    <item>
      <title>NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187119#M877110</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;	Another DMZ question I'm afraid.  I'm trying to achieve the following and any assistance would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want my Inside to PAT'd to the Outside and DMZ, I also need my Inside to able to access the DMZ via external (212*.*.0) as well as the internal (10.0.0.0) addresses.  I can get the Inside connected to the DMZ / Outside via PAT and the static map works for Outside connections.  When I add the line (bellow), it not only fails to work but it stops the Inside accessing the DMZ on 10.0.0.2 (via PAT).  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;static (DMZ,Inside) 212.*.*.2 10.0.0.2 netmaskâ&amp;#128;&amp;#157; 255.255.255.255â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ACL's on all interfaces are set Permit IP any to any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA 5510 (8.0)&lt;/P&gt;&lt;P&gt;Inside		192.168.1.0/24&lt;/P&gt;&lt;P&gt;DMZ		10.0.0.0/16&lt;/P&gt;&lt;P&gt;Outside	212.*.*.*/26&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (Outside) 101 interface&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 1 access-list Inside_nat_outbound&lt;/P&gt;&lt;P&gt;nat (Inside) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 101 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;static (DMZ,Outside) 212.*.*.2 10.0.0.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 212.*.*.2 10.0.0.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:43:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187119#M877110</guid>
      <dc:creator>spetersmmc</dc:creator>
      <dc:date>2019-03-11T14:43:07Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187120#M877112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the first command you say the outside interface is assouciated with the 212.***** ip address, in the next command you say that it is associated to the inside interface, A single subnet cannot be associated to two differnet interfaces, Thats my logic&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else could explain better ??&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2009 16:48:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187120#M877112</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-01-28T16:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187121#M877114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Victor,&lt;/P&gt;&lt;P&gt;	Thanks for your response.  My understanding from the documentation was that traffic can't traverse between interfaces without a NAT.  So every interface (Outside and Inside) which needs to have visibility of the address (212.*.*.2) needs a static NAT connecting them to the source IP.  I think your correct in that you couldn't associate a subnet with more than one interface but these static NAT's have a host mask.  I believe this is a form of hair pinning. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Jan 2009 17:06:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187121#M877114</guid>
      <dc:creator>spetersmmc</dc:creator>
      <dc:date>2009-01-28T17:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187122#M877115</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You must have misinterpreted the documenttion u read, NAT is not mandatory for traffic to traverse interfaces. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic can traverse interfaces using mere routing on a PIX or ASA. You only require appropriate access-lists allowing traffic into the higher security interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2009 02:03:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187122#M877115</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-01-29T02:03:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187123#M877116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, i was driving  to work and suddenly i realised that i screwed up the  last reply completely, u indeed read the documentation right and NAT is mandatory to traverse interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but instead of using a different Ip to NAT &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can use something like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, DMZ)10.0.0.2 10.0.0.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will do the job without changing anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry Again for wrong replies&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2009 04:49:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187123#M877116</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-01-29T04:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187124#M877121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Victor,&lt;/P&gt;&lt;P&gt;	No problem, any feed back is very much appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From what I can see, the line bellowâ&amp;#128;¦&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;static (inside, DMZ)10.0.0.2 10.0.0.2 netmask 255.255.255.255  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;¦would present the Inside address of 10.0.0.2 to the DMZ as 10.0.0.2.  I would have transposed the interfaces but I guess static NAT's are bi-directional so it doesn't make any difference.  I would have thought that the NAT to DMZ PAT would have taken care of this though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (DMZ) 1 interface&lt;/P&gt;&lt;P&gt;nat (Inside) 1 access-list Inside_nat_outbound&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should I remove my PAT and replace it with your suggested static NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 29 Jan 2009 10:19:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187124#M877121</guid>
      <dc:creator>spetersmmc</dc:creator>
      <dc:date>2009-01-29T10:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Inside to DMZ via Public IP</title>
      <link>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187125#M877125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;your config is good enough, it must work without any issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Jan 2009 06:00:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-inside-to-dmz-via-public-ip/m-p/1187125#M877125</guid>
      <dc:creator>victor_87</dc:creator>
      <dc:date>2009-01-30T06:00:52Z</dc:date>
    </item>
  </channel>
</rss>

