<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: question about NAT on Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065769#M896524</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there are two more important things&lt;/P&gt;&lt;P&gt;first u need to make the permit ACL for all in bound traffic going to 1.1.1.1 or 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then after finishing the nat and ACLs config reload ur firewall to let the policy-NAT takes efficts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 13 Sep 2008 12:19:48 GMT</pubDate>
    <dc:creator>Marwan ALshawi</dc:creator>
    <dc:date>2008-09-13T12:19:48Z</dc:date>
    <item>
      <title>question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065761#M896505</link>
      <description>&lt;P&gt;I do not have a Pix firewall to test at the moment so I am going&lt;/P&gt;&lt;P&gt;to ask experts in forum if this is possible:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a host on the "inside" interface with an ip address of 192.168.3.10&lt;/P&gt;&lt;P&gt;Pix firewall "inside" ip address is 192.168.3.1/28&lt;/P&gt;&lt;P&gt;Pix firewall "outside" ip address 1.1.1.1/28&lt;/P&gt;&lt;P&gt;Pix firewall default gateway is 1.1.1.14&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have the following in the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.10 192.168.3.10 netmask 255.255.255.255 dns&lt;/P&gt;&lt;P&gt;access-list External permit ip any any log&lt;/P&gt;&lt;P&gt;access-list Internal permit ip any any log&lt;/P&gt;&lt;P&gt;access-group External in interface outside&lt;/P&gt;&lt;P&gt;access-group Internal in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now here are my requirements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Internet users will get to this host via 1.1.1.10,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- telnet, ssh and smtp traffics originate from host 192.168.3.10 going to&lt;/P&gt;&lt;P&gt;64.100.1.0/24 and 192.95.25.0/24 will be natted to 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- telnet, ssh and smtp traffics originate from host 192.168.3.10 going &lt;/P&gt;&lt;P&gt;to ANY will be NATted to the Pix firewall's external interface (1.1.1.1),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- http and https traffics originate from host 192.168.3.10 going to&lt;/P&gt;&lt;P&gt;72.1.100.0/24 will be NATted to 1.1.1.10,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4- http and https traffics originate from host 192.168.3.10 going to ANY&lt;/P&gt;&lt;P&gt;will be NAT'ed to firewall's external interface (1.1.1.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible?  If so, how?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:43:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065761#M896505</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2019-03-11T13:43:20Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065762#M896508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thats a tough one. Hope I got this right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.3.10 any eq 23&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.3.10 any eq 22&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.3.10 any eq 25&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.3.10 any eq 80&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.3.10 any eq 443&lt;/P&gt;&lt;P&gt;access-list 101 permit ip host 192.168.3.10 any&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.1 access-list 100&lt;/P&gt;&lt;P&gt;static (inside,outside) 1.1.1.10 access-list 101&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2008 17:31:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065762#M896508</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-09-11T17:31:19Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065763#M896511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is my revise requirements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now here are my requirements:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- Internet users will get to this host via 1.1.1.10,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- telnet, ssh and smtp traffics originate from host 192.168.3.10 going to&lt;/P&gt;&lt;P&gt;64.100.1.0/24 and 192.95.25.0/24 will be natted to 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- telnet, ssh and smtp traffics originate from host 192.168.3.10 going&lt;/P&gt;&lt;P&gt;to ANY will be NATted to the Pix firewall's external interface (1.1.1.1),&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3- http and https traffics originate from host 192.168.3.10 going to&lt;/P&gt;&lt;P&gt;72.1.100.0/24 will be NATted to 1.1.1.10,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4- http and https traffics originate from host 192.168.3.10 going to ANY&lt;/P&gt;&lt;P&gt;will be NAT'ed to firewall's external interface (1.1.1.1).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5- Internet users from source 6.7.8.0/24 and &lt;/P&gt;&lt;P&gt;4.3.2.0/24 accessing http and https on IP address 1.1.1.1 will be re-directed to host &lt;/P&gt;&lt;P&gt;192.168.3.10 on http and https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do all this with Checkpoint firewall&lt;/P&gt;&lt;P&gt;in about 5 minutes and it works on the first&lt;/P&gt;&lt;P&gt;attempt.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am struggling to get this to work on Cisco&lt;/P&gt;&lt;P&gt;firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2008 20:04:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065763#M896511</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-11T20:04:58Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065764#M896513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Any takers on this one?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Sep 2008 10:14:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065764#M896513</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-12T10:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065765#M896514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi david&lt;/P&gt;&lt;P&gt;u can solve it by useing policy NAT, Policy NAT/PAT translates the IP address of the packets passing through the security appliance only if those packets match the configured criterion or policy. The policy is defined by using ACLs. The ACL matches traffic against the source and the destination IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so for ur case&lt;/P&gt;&lt;P&gt;u need the following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permite tcp host 192.168.3.10 72.1.100.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;access-list 100 permite tcp host 192.168.3.10 72.1.100.0 255.255.255.0 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permite tcp host 192.168.3.10 any eq telnet&lt;/P&gt;&lt;P&gt;access-list 101 permite tcp host 192.168.3.10 any eq 22&lt;/P&gt;&lt;P&gt;access-list 101 permite tcp host 192.168.3.10 any eq smtp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 101 permite tcp host 192.168.3.10 any eq 80&lt;/P&gt;&lt;P&gt;access-list 101 permite tcp host 192.168.3.10 any eq 443&lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 6.7.8.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 6.7.8.0 255.255.255.0 eq 443&lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 4.3.2.0 255.255.255.0 eq 80&lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 4.3.2.0 255.255.255.0 eq 443&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list 101&lt;/P&gt;&lt;P&gt;globlab (outside) 2 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;satatic (inside, outside) 1.1.1.1 access-list 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 192.168.3.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 09:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065765#M896514</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-13T09:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065766#M896516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marwanshawi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you and others for the suggestion.  However, I have doubts about these&lt;/P&gt;&lt;P&gt;following lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;satatic (inside, outside) 1.1.1.1 access-list 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 192.168.3.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you actually enter these 3 lines into the Pix configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 10:50:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065766#M896516</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-13T10:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065767#M896518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what software version ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 11:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065767#M896518</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-13T11:06:12Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065768#M896522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;an administrator allows the real source IP address (192.168.10.190) to be changed to 209.165.200.227 only if traffic is destined for 209.165.201.10. The same static entry will also change the destination address from 209.165.200.227 to 192.168.10.190 if traffic is sourced from host 209.165.201.10.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example 5-40. Configuration of Static Policy NAT&lt;/P&gt;&lt;P&gt;Chicago(config)# access-list static_NAT extended permit ip host 192.168.10.190 host&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  209.165.201.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chicago(config)# static (inside,outside) 209.165.200.227 access-list static_NAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source is cisco press, Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance, 2005&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if ur pix 7.x this concept applys &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;hope this helpful &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 11:08:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065768#M896522</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-13T11:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065769#M896524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there are two more important things&lt;/P&gt;&lt;P&gt;first u need to make the permit ACL for all in bound traffic going to 1.1.1.1 or 1.1.1.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;then after finishing the nat and ACLs config reload ur firewall to let the policy-NAT takes efficts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 12:19:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065769#M896524</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-13T12:19:48Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065770#M896527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Warwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you explain the following. The poster asked the following.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5- Internet users from source 6.7.8.0/24 and &lt;/P&gt;&lt;P&gt;4.3.2.0/24 accessing http and https on IP address 1.1.1.1 will be re-directed to host &lt;/P&gt;&lt;P&gt;192.168.3.10 on http and https &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Notice he says traffic is originating from 6.7.8.0/24 and 4.3.2.0 to 1.1.1.1. Therefore I don't see how this would work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 6.7.8.0 255.255.255.0 eq 80 &lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 6.7.8.0 255.255.255.0 eq 443 &lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 4.3.2.0 255.255.255.0 eq 80 &lt;/P&gt;&lt;P&gt;access-list 102 permite tcp host 192.168.3.10 4.3.2.0 255.255.255.0 eq 443 &lt;/P&gt;&lt;P&gt;satatic (inside, outside) 1.1.1.1 access-list 102 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Sep 2008 20:21:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065770#M896527</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2008-09-13T20:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065771#M896529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Adam &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good question if u look at the paragraph i have posted above from cisco press which as the following (which is an example from, Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance, 2005)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;an administrator has defined a policy to translate the source IP address to 209.165.200.226 if the packets originate 192.168.10.10 and are destined for 209.165.201.1. Similarly, if the packets are sourced from 192.168.10.10 and destined for 209.165.201.2, the security appliance will change the source IP address to 209.165.200.227&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thus, the ACL will represent two way path in this case if we made the ACL like access-list 102 thats mean it will include hhtp/https traffic from 192.168.10.3 to 6.7.8.0/24, 4.3.2.0/24 and vice versa &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this is the bineffits of ACL with NATing &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if helpful Rate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 00:57:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065771#M896529</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-14T00:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065772#M896531</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Marwanshawi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, you're speculating this.  Have you&lt;/P&gt;&lt;P&gt;tried my requirements in the lab and verified &lt;/P&gt;&lt;P&gt;that it works?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 10:26:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065772#M896531</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-14T10:26:45Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065773#M896532</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;no i havnt but the fact is like this mate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;u can try it &lt;/P&gt;&lt;P&gt;otherwise if u have another way will be great to know&lt;/P&gt;&lt;P&gt;and if u think about it it is very reasonable method because in general ACL with nating on ASA,PIX and FWSM works TWO WAY !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 10:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065773#M896532</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-14T10:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065774#M896535</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Marwan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason I asked is because the following configuration looks very suspicious:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;satatic (inside, outside) 1.1.1.1 access-list 102&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 192.168.3.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you will get errors with this configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to try it out if I have a Pix handy but I do not.  I can't try this on the &lt;/P&gt;&lt;P&gt;Production Pix either.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 12:07:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065774#M896535</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-14T12:07:34Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065775#M896537</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok i think about this u wmay get error&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 192.168.3.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if u get try to do this work around&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as long as u want any traffic coming to 1.1.1.10 go to 192.168.3.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;creat an ACL lets say ACL 103&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny all traffic permit in ACL 101 and 102 then permit any&lt;/P&gt;&lt;P&gt;and make it like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 access-list 103&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this way all other traffic not included on both ACLs going to 1.1.1.10 will be translated to 192.168.3.10 which is ur required point in the internet traffic going to that address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 12:14:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065775#M896537</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-14T12:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065776#M896540</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"as long as u want any traffic coming to 1.1.1.10 go to 192.168.3.10 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;creat an ACL lets say ACL 103 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;deny all traffic permit in ACL 101 and 102 then permit any &lt;/P&gt;&lt;P&gt;and make it like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, outside) 1.1.1.10 access-list 103&lt;/P&gt;&lt;P&gt;I think you're wrong with this one.  I &lt;/P&gt;&lt;P&gt;remembered from my previous experiences that&lt;/P&gt;&lt;P&gt;you can NOT have deny statement in the policy NAT ACL.  If my memory serves me &lt;/P&gt;&lt;P&gt;correctly, it will not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2008 17:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065776#M896540</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-09-14T17:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: question about NAT on Firewall</title>
      <link>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065777#M896542</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;as u like&lt;/P&gt;&lt;P&gt;but i think u need to try it first&lt;/P&gt;&lt;P&gt;no other way to do &lt;/P&gt;&lt;P&gt;only nat with ACLs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2008 00:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/question-about-nat-on-firewall/m-p/1065777#M896542</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-09-15T00:51:41Z</dc:date>
    </item>
  </channel>
</rss>

