<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Policy Nat in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119186#M895474</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have pix firewall with 7.x version. I have advertised my web/mail servers. &lt;/P&gt;&lt;P&gt;I am doing source base nat, I am translating all Internet traffic that is accessing the web/email server into one source&lt;/P&gt;&lt;P&gt;172.28.29.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i am having problem. IF i do the source nat servers are not able to access Internet, though they are able to access over&lt;/P&gt;&lt;P&gt;the Internet. If I remove the Source NAT, they are able to published as well as can browse the Internet. I dont wana allow&lt;/P&gt;&lt;P&gt;any Internet source to access my server. I want to have only translated source to enter my internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list reverse_nat extended permit ip any host x.x.x.x&lt;/P&gt;&lt;P&gt;nat (outside) 5 access-list reverse_nat outside&lt;/P&gt;&lt;P&gt;global (inside) 5 172.28.29.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 172.1.2.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host x.x.x.x eq www&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host x.x.x.x eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me out how to achieve this and what i m missing.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:53:20 GMT</pubDate>
    <dc:creator>wasiimcisco</dc:creator>
    <dc:date>2019-03-11T13:53:20Z</dc:date>
    <item>
      <title>Policy Nat</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119186#M895474</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have pix firewall with 7.x version. I have advertised my web/mail servers. &lt;/P&gt;&lt;P&gt;I am doing source base nat, I am translating all Internet traffic that is accessing the web/email server into one source&lt;/P&gt;&lt;P&gt;172.28.29.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But i am having problem. IF i do the source nat servers are not able to access Internet, though they are able to access over&lt;/P&gt;&lt;P&gt;the Internet. If I remove the Source NAT, they are able to published as well as can browse the Internet. I dont wana allow&lt;/P&gt;&lt;P&gt;any Internet source to access my server. I want to have only translated source to enter my internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Below is the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list reverse_nat extended permit ip any host x.x.x.x&lt;/P&gt;&lt;P&gt;nat (outside) 5 access-list reverse_nat outside&lt;/P&gt;&lt;P&gt;global (inside) 5 172.28.29.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x 172.1.2.3 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host x.x.x.x eq www&lt;/P&gt;&lt;P&gt;access-list outside_acl extended permit tcp any host x.x.x.x eq http&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me out how to achieve this and what i m missing.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:53:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119186#M895474</guid>
      <dc:creator>wasiimcisco</dc:creator>
      <dc:date>2019-03-11T13:53:20Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Nat</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119187#M895475</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let`s say server 172.1.2.3 wants to access the internet, packet goes out and hit the static translation. IP source is now x.x.x.x and destination is unchanged y.y.y.y . When responce gets back, source is y.y.y.y and destination is x.x.x.x. It hit your policy nat and your static nat. Source is now 178.28.29.1 and destination is x.x.x.x. Wont work that way...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Oct 2008 18:34:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119187#M895475</guid>
      <dc:creator>dominic.caron</dc:creator>
      <dc:date>2008-10-06T18:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Nat</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119188#M895476</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the excellent explaination. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any solution or way out to achieve my goal. Both Server publishing with source nat and Internet Browsing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2008 11:03:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119188#M895476</guid>
      <dc:creator>wasiimcisco</dc:creator>
      <dc:date>2008-10-08T11:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Policy Nat</title>
      <link>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119189#M895477</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At first glance,you could do your reverse nat with a static statement specific to the tcp port 80 and 25. This is now your everyday config and you might have some problem. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you trying to reverse nat incomming connection. What kind of attack are you trying to mitigate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Oct 2008 11:50:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/policy-nat/m-p/1119189#M895477</guid>
      <dc:creator>dominic.caron</dc:creator>
      <dc:date>2008-10-08T11:50:02Z</dc:date>
    </item>
  </channel>
</rss>

