<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Brain Fart in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027176#M916224</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess because you are using the host address mask it doesn't matter where the host exists.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jul 2008 22:13:12 GMT</pubDate>
    <dc:creator>patrick.hurley</dc:creator>
    <dc:date>2008-07-22T22:13:12Z</dc:date>
    <item>
      <title>Brain Fart</title>
      <link>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027174#M916218</link>
      <description>&lt;P&gt;Can I assign any ip address from the pool that I have been assigned to any host off any interface such as inside, DMZ1 and DMZ2 as long as I map them to a private subnet?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027174#M916218</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2019-03-11T13:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Brain Fart</title>
      <link>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027175#M916220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Patrick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me make sure I understand your scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have a pool of public IP addresses assigned by your ISP. You want to map one of these addresses to a host behind your DMZ interface. Is this correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If so, you can simply configure a static translation, such as this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) &lt;PUBLIC_IP&gt; &lt;PRIVATE_IP&gt; netmask 255.255.255.255&lt;/PRIVATE_IP&gt;&lt;/PUBLIC_IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the host behind the DMZ interface was, for example, a web server and you wanted users on the Internet to access it, you would also need to edit the ACL on your outside interface to allow the initial traffic to come in to your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2008 22:08:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027175#M916220</guid>
      <dc:creator>robertson.michael</dc:creator>
      <dc:date>2008-07-22T22:08:36Z</dc:date>
    </item>
    <item>
      <title>Re: Brain Fart</title>
      <link>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027176#M916224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess because you are using the host address mask it doesn't matter where the host exists.  &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jul 2008 22:13:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/brain-fart/m-p/1027176#M916224</guid>
      <dc:creator>patrick.hurley</dc:creator>
      <dc:date>2008-07-22T22:13:12Z</dc:date>
    </item>
  </channel>
</rss>

