<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Static Natting in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-natting/m-p/1135288#M893797</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ray, are you configuring asa for backup isp?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with above link you can try for inbound traffic through backup isp via (outside2) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;global (outside2) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;PRIMARY_ISP&gt; 1  &lt;TRACK 1=""&gt; &lt;/TRACK&gt;&lt;/PRIMARY_ISP&gt;&lt;/P&gt;&lt;P&gt;route outside2 0.0.0.0 0.0.0.0 &lt;SECONDARY_ISP&gt; &amp;lt;254&amp;gt;&lt;/SECONDARY_ISP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor 123&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho &lt;IP_ADDRESS_TO_PING&gt; interface outside&lt;/IP_ADDRESS_TO_PING&gt;&lt;/P&gt;&lt;P&gt; num-packets 3&lt;/P&gt;&lt;P&gt; frequency 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor schedule 123 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;track 1 rtr 123 reachability&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then static NAT and  inbound acl to allow traffic to both hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.10.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside2) 2.2.2.2 192.168.10.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.2 eq &lt;TCP_PORT&gt; log&lt;/TCP_PORT&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside2_access_in extended permit tcp any host 2.2.2.2 eq &lt;TCP_PORT&gt; log&lt;/TCP_PORT&gt;&lt;/P&gt;&lt;P&gt;access-group outside2_access_in in interface outside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 08 Nov 2008 17:31:08 GMT</pubDate>
    <dc:creator>JORGE RODRIGUEZ</dc:creator>
    <dc:date>2008-11-08T17:31:08Z</dc:date>
    <item>
      <title>Static Natting</title>
      <link>https://community.cisco.com/t5/network-security/static-natting/m-p/1135287#M893789</link>
      <description>&lt;P&gt;Hi, We have two ISP links following:&lt;/P&gt;&lt;P&gt;1) 1.1.1.0/24-----Outside&lt;/P&gt;&lt;P&gt;2) 2.2.2.0/24-----Outside2&lt;/P&gt;&lt;P&gt;Internal Network : 192.168.10.0/24-Inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using commands for natting and patting i.e &lt;/P&gt;&lt;P&gt;nat (Inside) 1 192.168.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I want to use static natting and allot one static public IP from the range of Ist ISP Provider Pool 1.1.1.2---Map with----192.168.10.2&lt;/P&gt;&lt;P&gt;And second public IP wud use from the 2nd ISP Provider pool 2.2.2.2----map with---192.168.10.3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All Internal Traffic are going out from outside Interface that means first static IP will work but how its possible that the second static natting 2.2.2.2 traffic to be bypass from second outside link (Outside2). Please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:10:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting/m-p/1135287#M893789</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2019-03-11T14:10:20Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting</title>
      <link>https://community.cisco.com/t5/network-security/static-natting/m-p/1135288#M893797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ray, are you configuring asa for backup isp?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00806e880b.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with above link you can try for inbound traffic through backup isp via (outside2) .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface &lt;/P&gt;&lt;P&gt;global (outside2) 1 interface &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 &lt;PRIMARY_ISP&gt; 1  &lt;TRACK 1=""&gt; &lt;/TRACK&gt;&lt;/PRIMARY_ISP&gt;&lt;/P&gt;&lt;P&gt;route outside2 0.0.0.0 0.0.0.0 &lt;SECONDARY_ISP&gt; &amp;lt;254&amp;gt;&lt;/SECONDARY_ISP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor 123&lt;/P&gt;&lt;P&gt; type echo protocol ipIcmpEcho &lt;IP_ADDRESS_TO_PING&gt; interface outside&lt;/IP_ADDRESS_TO_PING&gt;&lt;/P&gt;&lt;P&gt; num-packets 3&lt;/P&gt;&lt;P&gt; frequency 10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor schedule 123 life forever start-time now&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;track 1 rtr 123 reachability&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then static NAT and  inbound acl to allow traffic to both hosts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.10.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside2) 2.2.2.2 192.168.10.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_access_in extended permit tcp any host 1.1.1.2 eq &lt;TCP_PORT&gt; log&lt;/TCP_PORT&gt;&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside2_access_in extended permit tcp any host 2.2.2.2 eq &lt;TCP_PORT&gt; log&lt;/TCP_PORT&gt;&lt;/P&gt;&lt;P&gt;access-group outside2_access_in in interface outside2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;Jorge&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Nov 2008 17:31:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting/m-p/1135288#M893797</guid>
      <dc:creator>JORGE RODRIGUEZ</dc:creator>
      <dc:date>2008-11-08T17:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Static Natting</title>
      <link>https://community.cisco.com/t5/network-security/static-natting/m-p/1135289#M893802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jorge,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. Here I don't want to use ISP outside2 as a backup link, just want to know if i dont use nat and global commands and instead of that i use only static commands like follwoing: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.2 192.168.10.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;static (inside,outside2) 2.2.2.2 192.168.10.3 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will both Internal Servers be accessible from outside network from its own Public Address difined and can i access the internet from Servers as I believe that Nat and PAT are used only other machines which are not using static IP's and what would be the route commands in this case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And what is a use of these commands: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor 123 &lt;/P&gt;&lt;P&gt;type echo protocol ipIcmpEcho &lt;IP_ADDRESS_TO_PING&gt; interface outside &lt;/IP_ADDRESS_TO_PING&gt;&lt;/P&gt;&lt;P&gt;num-packets 3 &lt;/P&gt;&lt;P&gt;frequency 10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sla monitor schedule 123 life forever start-time now &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;track 1 rtr 123 reachability &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Nov 2008 04:17:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-natting/m-p/1135289#M893802</guid>
      <dc:creator>ray_stone</dc:creator>
      <dc:date>2008-11-09T04:17:11Z</dc:date>
    </item>
  </channel>
</rss>

