<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Reverse NAT on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878192#M956729</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you give me a little bit more information.&lt;/P&gt;&lt;P&gt;I checked policy NAT example on Cisco webpage but I don't see how will it solve my problem. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;Ruzsi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Jan 2008 18:23:03 GMT</pubDate>
    <dc:creator>aruzsinszky</dc:creator>
    <dc:date>2008-01-22T18:23:03Z</dc:date>
    <item>
      <title>Reverse NAT on PIX</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878190#M956727</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My outside network is: 10.x.y.0/24&lt;/P&gt;&lt;P&gt;My inside network is: 192.168.a.0/24.&lt;/P&gt;&lt;P&gt;The packet comes from: 172.30.b.192/29&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need port forwarding or redirecting to my inside ssh machine and I don't like seeing host route to 172.30.b.ccc over inside if. of PIX.&lt;/P&gt;&lt;P&gt;I tried one-to-one NAT from outside to inside but my ssh machine doesn't know anything about the MAC of NATed interface of PIX (arp who &amp;lt;192.168.a.d&amp;gt; tell ...)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the solution? PIX hate "static (outside,inside) &amp;lt;internal_IP&amp;gt; &amp;lt;my_subnet&amp;gt; netmask 255.255.255.240" command which is acceptable. It isn't a one-to-one relation, of course.&lt;/P&gt;&lt;P&gt;So what is the solution?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Ruzsi&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:50:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878190#M956727</guid>
      <dc:creator>aruzsinszky</dc:creator>
      <dc:date>2019-03-11T11:50:40Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on PIX</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878191#M956728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;solution is policy nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 20 Jan 2008 03:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878191#M956728</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-01-20T03:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on PIX</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878192#M956729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you give me a little bit more information.&lt;/P&gt;&lt;P&gt;I checked policy NAT example on Cisco webpage but I don't see how will it solve my problem. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;Ruzsi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2008 18:23:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878192#M956729</guid>
      <dc:creator>aruzsinszky</dc:creator>
      <dc:date>2008-01-22T18:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on PIX</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878193#M956730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt; To permit access to internal server on the inside network from outside machines, you need to define : &lt;/P&gt;&lt;P&gt;1- access list&lt;/P&gt;&lt;P&gt;2- static nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for the access list, permit trafic from the externel host to the outside interface, and speify the port number, for this case ssh port =22&lt;/P&gt;&lt;P&gt;for the static nat, permit traffic from outside interface to the inside server, on the specified port number.&lt;/P&gt;&lt;P&gt;for your case, the access list will be &lt;/P&gt;&lt;P&gt;access-list out_in permit tcp 172.30.b.192 255.255.255.248 interface outside eq 22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the static nat will be &lt;/P&gt;&lt;P&gt;static(inside,outside) tcp interface 22 192.168.1.1 22&lt;/P&gt;&lt;P&gt;where 192.168.1.1 is the inside ssh server.&lt;/P&gt;&lt;P&gt;regards &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 14:19:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878193#M956730</guid>
      <dc:creator>alanajjar</dc:creator>
      <dc:date>2008-01-23T14:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Reverse NAT on PIX</title>
      <link>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878194#M956731</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I solved my problem (it seems good with one IP translate now and I'll extend for the whole IP subnet what we use):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list acl_out remark Default rule - From Internet to Linux_ssh_server SSH port&lt;/P&gt;&lt;P&gt;access-list acl_out permit tcp OUTSIDE_VPN_Inet 255.255.255.240 interface outside eq ssh log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_outbound_nat0_acl&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp interface ssh &lt;LINUX_SSH_SERVER_IP&gt; ssh netmask 255.255.255.255 0 0&lt;/LINUX_SSH_SERVER_IP&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) &lt;INTERNAL_VIRTUAL_IP&gt; &lt;EXTERNAL_VPN_IP&gt; netmask 255.255.255.255 0 0&lt;/EXTERNAL_VPN_IP&gt;&lt;/INTERNAL_VIRTUAL_IP&gt;&lt;/P&gt;&lt;P&gt;access-group acl_out in interface outside&lt;/P&gt;&lt;P&gt;access-group acl_in in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and proxyarp is switched on!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What's your opinion?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA,&lt;/P&gt;&lt;P&gt;Ruzsi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2008 16:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/reverse-nat-on-pix/m-p/878194#M956731</guid>
      <dc:creator>aruzsinszky</dc:creator>
      <dc:date>2008-01-23T16:35:42Z</dc:date>
    </item>
  </channel>
</rss>

