<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: static NAT query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944148#M939402</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks thats excellent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i was certain this was achievable our my old Checkpoint box. By translating the destination...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ah well&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Apr 2008 07:14:49 GMT</pubDate>
    <dc:creator>mikedelafield</dc:creator>
    <dc:date>2008-04-14T07:14:49Z</dc:date>
    <item>
      <title>static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944145#M939399</link>
      <description>&lt;P&gt;i have a query about the static NAT command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if the command static (outside,inside) is entered i believe this is a reverse of the static (inside, outside); in other words the source is changed to whatever is specified in the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on this basis the following commands would be incorrect for port forwarding;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 209.165.202.135 10.100.1.2 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.100.1.2 209.165.202.135 mask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i assume the above would cause an IP conflict as 10.100.1.2 would be both a host on the internal network and a NAT IP address present on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this brings me to my question.... how can you NAT your outbound email out on one address; ie mail server internal address is 10.101.1.1 and should be NAT'ed out to 213.44.32.161, but have any inbound email to 213.44.32.161 forwarding to a different email server on 10.101.1.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am not sure how to do this using static NAT commands on Cisco as it seems the static(inside,outside) command creates a one 2 one mapping only?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please help&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:30:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944145#M939399</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2019-03-11T12:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944146#M939400</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am afraid you can't setup NAT to translate two inside hosts to use the same global address for the same ports. I assume both inside hosts use SMTP, one inbound and one outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Apr 2008 00:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944146#M939400</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2008-04-13T00:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944147#M939401</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) is not a simply reverse of the static (inside,outside). One of the most popular usage is to hide a internal private IP with a public IP from Internet, which is like your first command "static(inside,outside) 209.165.202.135 10.100.1.2 mask 255.255.255.255"&lt;/P&gt;&lt;P&gt;Your second command is used in such a rare scenario:&lt;/P&gt;&lt;P&gt;You want to hide an destination IP 209.165.202.135 from inside users by giving them the IP 10.100.1.2.When traffic leaving outside interface, destination IP will be translated from 10.100.1.2 to 209.165.202.135.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your second question, it can be achieved by policy nat/pat. There could be multiple combinations, I give you 2 examples.The codes not been verified, please test it if you plan to put it in production.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. static PAT + policy PAT&lt;/P&gt;&lt;P&gt;access-list smtp_outbound permit tcp host 10.101.1.1 any eq smtp&lt;/P&gt;&lt;P&gt;nat (inside) 2 access-list smtp_outbound&lt;/P&gt;&lt;P&gt;global (outside) 2 213.44.32.161&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 213.44.32.161 smtp 10.101.1.2 smtp netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. policy static PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list smtp_outbound permit tcp host 10.101.1.1 any eq smtp&lt;/P&gt;&lt;P&gt;access-list smtp_inbound permit tcp host 10.101.1.2 eq smtp any&lt;/P&gt;&lt;P&gt;static (inside,outside) 213.44.32.161 access-list smtp_outbound&lt;/P&gt;&lt;P&gt;staitc (inside,outside) 213.44.32.161 access-list smtp_inbound&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 13 Apr 2008 20:20:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944147#M939401</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-04-13T20:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944148#M939402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks thats excellent.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i was certain this was achievable our my old Checkpoint box. By translating the destination...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ah well&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 07:14:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944148#M939402</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2008-04-14T07:14:49Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944149#M939403</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i have just checked and currently on our firewall (which i did not configure) we have the following 2 sets of static NAT statements&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 27.18.11.139 10.1.1.1 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.1.1.1 27.18.11.139 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this seems incorrect to me as 10.1.1.1 is an internal host which is NAT'ed outbound to 27.18.11.139.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;yet the static (outside,inside) command is also hiding 27.18.11.139 to the internal network as 10.1.1.1 in the NAT translation the other way. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;surely this is incorrect and cannot work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 10:44:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944149#M939403</guid>
      <dc:creator>mikedelafield</dc:creator>
      <dc:date>2008-04-14T10:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: static NAT query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944150#M939404</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi , I believe it was wrong for the second "static", because it doesn't make sense when it come together with the first "static". &lt;/P&gt;&lt;P&gt;Followed is a summary of my understanding for natting behavior of "static":&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (real_ifc,mapped_ifc) mapped_ip real_ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static NAT is a "bi-directional" NAT, which means traffic can be initiated from both sides of firewall with different security levels when NAT occurs.&lt;/P&gt;&lt;P&gt;1. Traffic ingress interface is "real_ifc", egress interface is "mapped_ifc"&lt;/P&gt;&lt;P&gt;Traffic entering "real_ifc" and leaving "mapped_ifc", source IP with "real_ip" will be translated to "mapped_ip"(nat-src); the returned traffic entering "mapped_ifc" and leaving "real_ifc",destination Ip with "mapped_ip" will be translated to "real_ip" (nat-dst).&lt;/P&gt;&lt;P&gt;2. Traffic ingress interface is "mapped_ifc",egress interface is "real_ifc"&lt;/P&gt;&lt;P&gt;Traffic entering "mapped_ifc" and leaving "real_ifc",destination IP with "mapped_ip" will be translated to "real_ip" (nat-dst); the returned traffic entering "real_ifc" and leaving "mapped_ifc",source IP with "real_ip" will be translated to "mapped_ip" (nat-src).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Apr 2008 15:28:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-query/m-p/944150#M939404</guid>
      <dc:creator>pengfang</dc:creator>
      <dc:date>2008-04-14T15:28:47Z</dc:date>
    </item>
  </channel>
</rss>

