<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic static nat access issues in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013661#M918755</link>
    <description>&lt;P&gt;In attached configuration on asa5510 traffic will not pass through firewall from computers assigned to static nat. tested from ip 192.168.100.99 with dns,www and cannot ping hosts on dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 12:56:33 GMT</pubDate>
    <dc:creator>dcholl1</dc:creator>
    <dc:date>2019-03-11T12:56:33Z</dc:date>
    <item>
      <title>static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013661#M918755</link>
      <description>&lt;P&gt;In attached configuration on asa5510 traffic will not pass through firewall from computers assigned to static nat. tested from ip 192.168.100.99 with dns,www and cannot ping hosts on dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:56:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013661#M918755</guid>
      <dc:creator>dcholl1</dc:creator>
      <dc:date>2019-03-11T12:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013662#M918756</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry config attached&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jun 2008 10:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013662#M918756</guid>
      <dc:creator>dcholl1</dc:creator>
      <dc:date>2008-06-07T10:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013663#M918757</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dennis,&lt;/P&gt;&lt;P&gt;  Please add the following&lt;/P&gt;&lt;P&gt;access-list LAN_access_in line 2 permit ip 192.168.100.0 255.255.255.0 10.100.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt;  class inspection_default&lt;/P&gt;&lt;P&gt;    inspect icmp&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also strongly recommend to upgrade your IOS to at least 7.2(2)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Jun 2008 12:40:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013663#M918757</guid>
      <dc:creator>Alan Huseyin Kayahan</dc:creator>
      <dc:date>2008-06-07T12:40:39Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013664#M918759</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This did not help&lt;/P&gt;&lt;P&gt;Have upgraded to 7.2 and can now ping to dmz but all access to wan is blocked on any host where a static nat rule applies ex. host 192.168.100.99 cannot access external webpages but host 192.168.100.33 can. Have also tested from WAN side all static rules seem to be working properly I can access https webserver from WAN address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have attached a new copy of running config please HELP!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jun 2008 22:03:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013664#M918759</guid>
      <dc:creator>dcholl1</dc:creator>
      <dc:date>2008-06-10T22:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013665#M918761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You static NAT rules contain 192.168.100.199 192.168.100.133 (One Hundreed and Thirty Three)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yet, you are trying to test using 192.168.100.99  and 192.168.100.33, these will be subject to the PAT (global command) and not the NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even then that should work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 01:33:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013665#M918761</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T01:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013666#M918764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I checked the config I posted and you are correct seems that I must have deleted the static nat rule I was testing with I will have to verify the running config on the firewall then retest. Thank You for the response. I also have a question everything on this config works execpt traffic from hosts with a static route to the WAN interface. On the hosts the firewall is not configured as the primary gateway. The primary gateway is 192.168.100.1 which then routes all traffic not specified by a route statement to the firewall @ 192.168.100.232 could this be the problem If so can I fix this without changing the hosts gateway as they do not communicate well with our internal network that way.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 09:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013666#M918764</guid>
      <dc:creator>dcholl1</dc:creator>
      <dc:date>2008-06-11T09:44:20Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013667#M918766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could enable proxy arp on the primary gateway's interface on which these hosts are connected. But proxy arp is not part of good network design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 09:57:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013667#M918766</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T09:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013668#M918768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will keep that in mind but should this work setup the way it is now??&lt;/P&gt;&lt;P&gt;Should I maybe put all hosts that need static nat on the dmz interface where the firewall is the gateway?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 10:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013668#M918768</guid>
      <dc:creator>dcholl1</dc:creator>
      <dc:date>2008-06-11T10:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: static nat access issues</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013669#M918773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a general rule, hosts that required Outside &amp;gt;&amp;gt; Internal access are placed in DMZ, other hosts that just need Inside &amp;gt;&amp;gt; Internet access, need not be placed in the DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All other hosts not covered by NAT should go out fine using the dynamic NAT nat (inside) statement, as long as they can reach their default gateway properly (or the routing is OK).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Farrukh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Jun 2008 10:42:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-access-issues/m-p/1013669#M918773</guid>
      <dc:creator>Farrukh Haroon</dc:creator>
      <dc:date>2008-06-11T10:42:35Z</dc:date>
    </item>
  </channel>
</rss>

