<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic inside to outside interface IP NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009233#M934223</link>
    <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;LAN (inside) network - 192.168.10.0/24&lt;/P&gt;&lt;P&gt;WAN (outside)network - for eg 137.14.191.12/28&lt;/P&gt;&lt;P&gt;Device: Cisco Firepower 2100 series managed by vFMC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have around 15 servers residing inside the campus that needs to be opened for public. Each server has different outside ISP IP. For eg server one has&amp;nbsp;137.14.191.15 DNAT to 10.11 , server two&amp;nbsp;137.14.191.16 DNAT to 10.12 etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did DNAT for servers from outside to inside. It is working perfect. When someone from outside public network access 137.14.191.15 they gets connected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue is;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When a LAN user (for eg 192.168.10.14) access&amp;nbsp;137.14.191.15 it does not work. Any idea how to get both DNAT scenarios work ?&lt;/P&gt;&lt;P&gt;1. outside to&amp;nbsp;137.14.191.15&lt;/P&gt;&lt;P&gt;2. inside to&amp;nbsp;137.14.191.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i add inside zone to source objects in DNAT, it works, but the server 10.11 looses internet connection.&lt;/P&gt;&lt;P&gt;NB: some might get confused why 192.168.10.xx not accessing servers using local IP. It is a specific requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help appreciated please.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:49:30 GMT</pubDate>
    <dc:creator>manvik</dc:creator>
    <dc:date>2020-02-21T17:49:30Z</dc:date>
    <item>
      <title>inside to outside interface IP NAT</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009233#M934223</link>
      <description>&lt;P&gt;Hi Guys&lt;/P&gt;&lt;P&gt;LAN (inside) network - 192.168.10.0/24&lt;/P&gt;&lt;P&gt;WAN (outside)network - for eg 137.14.191.12/28&lt;/P&gt;&lt;P&gt;Device: Cisco Firepower 2100 series managed by vFMC&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have around 15 servers residing inside the campus that needs to be opened for public. Each server has different outside ISP IP. For eg server one has&amp;nbsp;137.14.191.15 DNAT to 10.11 , server two&amp;nbsp;137.14.191.16 DNAT to 10.12 etc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did DNAT for servers from outside to inside. It is working perfect. When someone from outside public network access 137.14.191.15 they gets connected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue is;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;When a LAN user (for eg 192.168.10.14) access&amp;nbsp;137.14.191.15 it does not work. Any idea how to get both DNAT scenarios work ?&lt;/P&gt;&lt;P&gt;1. outside to&amp;nbsp;137.14.191.15&lt;/P&gt;&lt;P&gt;2. inside to&amp;nbsp;137.14.191.15&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when i add inside zone to source objects in DNAT, it works, but the server 10.11 looses internet connection.&lt;/P&gt;&lt;P&gt;NB: some might get confused why 192.168.10.xx not accessing servers using local IP. It is a specific requirement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help appreciated please.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:49:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009233#M934223</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2020-02-21T17:49:30Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside interface IP NAT</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009235#M934332</link>
      <description>&lt;P&gt;You cannot make the traffic hairpin through the FTD appliance in the way you ask. Traffic would have to actually leave the egress interface (outside) and come back in for the NAT translation to be applied to the flow.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 05:53:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009235#M934332</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-01-10T05:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: inside to outside interface IP NAT</title>
      <link>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009263#M934333</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;&lt;P&gt;I was expecting this reply. The scenario you mentioned will work and i got it worked. Issue was NATed local IP will not get internet in this case.&lt;/P&gt;&lt;P&gt;137.14.191.15 DNAT to 10.11&lt;/P&gt;&lt;P&gt;192.168.10.14 access 137.14.191.15. It works, but no internet for 10.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is a very common scenario and can easily be done in other OEM firewalls.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jan 2020 07:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/inside-to-outside-interface-ip-nat/m-p/4009263#M934333</guid>
      <dc:creator>manvik</dc:creator>
      <dc:date>2020-01-10T07:19:33Z</dc:date>
    </item>
  </channel>
</rss>

