<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Pix 501 Pat Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115434#M915287</link>
    <description>&lt;P&gt;I have a 501 with PAT configured.  When my exchange server sends SMTP traffic outbound I would like it to advertise to address x.x.x.219 all destops and non-smtp traffic should advertise as x.x.x.218.  I thought when I do my static map it should use that IP address.  I included my ACL, Static, adn NAT statements, any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq www&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.219 eq smtp&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq ftp&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq https&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 90&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 91&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 92&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 93&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 94&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 95&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside X.X.X.218 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NoNat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 www 192.168.1.254 www netmask 255.255.255&lt;/P&gt;&lt;P&gt;.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.219 smtp 192.168.1.254 smtp netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 ftp 192.168.1.254 ftp netmask 255.255.255&lt;/P&gt;&lt;P&gt;.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 https 192.168.1.254 https netmask 255.255&lt;/P&gt;&lt;P&gt;.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 90 192.168.1.254 90 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 91 192.168.1.254 91 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 92 192.168.1.254 92 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 93 192.168.1.254 93 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 94 192.168.1.254 94 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 95 192.168.1.254 95 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 13:25:33 GMT</pubDate>
    <dc:creator>steve.sarrick</dc:creator>
    <dc:date>2019-03-11T13:25:33Z</dc:date>
    <item>
      <title>Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115434#M915287</link>
      <description>&lt;P&gt;I have a 501 with PAT configured.  When my exchange server sends SMTP traffic outbound I would like it to advertise to address x.x.x.219 all destops and non-smtp traffic should advertise as x.x.x.218.  I thought when I do my static map it should use that IP address.  I included my ACL, Static, adn NAT statements, any help is appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq www&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.219 eq smtp&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq ftp&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq https&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 90&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 91&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 92&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 93&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 94&lt;/P&gt;&lt;P&gt;access-list SVCS permit tcp any host X.X.X.218 eq 95&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address outside X.X.X.218 255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list NoNat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 www 192.168.1.254 www netmask 255.255.255&lt;/P&gt;&lt;P&gt;.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.219 smtp 192.168.1.254 smtp netmask 255.255.2&lt;/P&gt;&lt;P&gt;55.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 ftp 192.168.1.254 ftp netmask 255.255.255&lt;/P&gt;&lt;P&gt;.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 https 192.168.1.254 https netmask 255.255&lt;/P&gt;&lt;P&gt;.255.255 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 90 192.168.1.254 90 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 91 192.168.1.254 91 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 92 192.168.1.254 92 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 93 192.168.1.254 93 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 94 192.168.1.254 94 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp X.X.X.218 95 192.168.1.254 95 netmask 255.255.255.2&lt;/P&gt;&lt;P&gt;55 0 0&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 X.X.X.1 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:25:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115434#M915287</guid>
      <dc:creator>steve.sarrick</dc:creator>
      <dc:date>2019-03-11T13:25:33Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115435#M915290</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Your config seems ok.&lt;/P&gt;&lt;P&gt;Except putting the access-list to the interface, which I belive you have already done.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group SVCS in interface Outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Aug 2008 18:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115435#M915290</guid>
      <dc:creator>dhananjoy chowdhury</dc:creator>
      <dc:date>2008-08-04T18:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115436#M915292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, applied and inbound traffic comes inbound on .219 just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The exchange server keeps showing up as .218.  Did a clear xlate, rebooted...does not seem to want to send SMTP traffic as .219&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on another article I tried do an access list for the NAT as well.  I tried putting a deny on the 192.168.1.254 adn permit 192.168.1.0 but didn't seem to have any luck with that as well - same results. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any debugs you can recommend to see the traffic flow from the server?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Aug 2008 18:50:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115436#M915292</guid>
      <dc:creator>steve.sarrick</dc:creator>
      <dc:date>2008-08-04T18:50:19Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115437#M915293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi  ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok first of all   ..  when you use the IP address of the firewall for PAT or static NAT you have to use the interface command instead of the IP address  ..  i.e  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For inbound traffic:&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface www 192.168.1.254 www netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the same with entries for the ACL  ..  i.e  access-list  abc permit tcp any interface eq www &lt;/P&gt;&lt;P&gt;access-group abc in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to outbound smtp traffic I suggest trying the below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 x.x.x.219 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list SMTP-ONLY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list SMTP-ONLY permit tcp host 192.168.1.254 any eq 25&lt;/P&gt;&lt;P&gt;access-list SMTP-ONLY permit tcp host 192.168.1.254 eq 25 any  * You might not need this entry  ..  I can't test it right now ..  it won't hurt to have there anyway &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For any other traffic&lt;/P&gt;&lt;P&gt;global (outside) 2 interface &lt;/P&gt;&lt;P&gt;nat (inside) 2 0.0.0.0 0.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure what you are trying to achieve with your nat (inside) 0 access-list NoNat  command  .. I suggest removing it if you were just testing things out. Also don't forget to do clear xlate after the changes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps   ..  please rate helpful posts &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Aug 2008 23:49:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115437#M915293</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2008-08-04T23:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115438#M915294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Inbound traffic is working fine with the IP address without the interface command.  Being a newbie, if you could provide some insight as to why to use the interface command rather than the IP to help my logic down the line, that would be great.  The Global statements and Access Lists were right on.  I applied them and mail starting flowing with the .219 address immediatly after my clear xlate.  Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2008 11:57:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115438#M915294</guid>
      <dc:creator>steve.sarrick</dc:creator>
      <dc:date>2008-08-05T11:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Pix 501 Pat Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115439#M915296</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi ..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am glad to hear the issue was resolved.  In regards to your question &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"if you could provide some insight as to why to use the interface command rather than the IP to help my logic down the line"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually  ..  interface can be used to refer to the firewall's IP address when for instance it is dynamically assigned by DHCP and therefore constantly changing. So  .. otherwise the use of the IP address is OK. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Aug 2008 10:59:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-501-pat-problem/m-p/1115439#M915296</guid>
      <dc:creator>Fernando_Meza</dc:creator>
      <dc:date>2008-08-06T10:59:40Z</dc:date>
    </item>
  </channel>
</rss>

