<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Having trouble nat'ing outside addresses to inside network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894693#M958723</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you need to go from an unsecure interface to a more secure interface, you need a NAT translation. Since you would like to 'route' between these two, you'll really be NATing all addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.100.3.0 10.100.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the PIX sees a packet destined for 10.100.3.x on the outside interface, it will  forward it to the inside interface with the same IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH and please rate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Dec 2007 18:55:45 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2007-12-13T18:55:45Z</dc:date>
    <item>
      <title>Having trouble nat'ing outside addresses to inside network</title>
      <link>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894692#M958722</link>
      <description>&lt;P&gt;Using a pix501, have servers on the outside interface that need to be able to access servers on the inside interface.  I can ping from the inside out, but when attempting to ping from the outside in, getting a 305005: No translation group found for icmp src server2 dst inside:server1 (type 8, code0) message in the log.  The inside network is 10.100.3.x and the outside is 10.25.143.x.  I would really just like the pix to function more like a router with an acl in this situation since I need each side to see the real IP address of the other server.  The translation rule nat (inside) 0 10.0.0.0 255.0.0.0 0 0 is working to allow traffic inside out, but any other rules I try adding result in a configuration error.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 00:50:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894692#M958722</guid>
      <dc:creator>JJost</dc:creator>
      <dc:date>2019-03-13T00:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble nat'ing outside addresses to inside network</title>
      <link>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894693#M958723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you need to go from an unsecure interface to a more secure interface, you need a NAT translation. Since you would like to 'route' between these two, you'll really be NATing all addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.100.3.0 10.100.3.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the PIX sees a packet destined for 10.100.3.x on the outside interface, it will  forward it to the inside interface with the same IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH and please rate.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 18:55:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894693#M958723</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2007-12-13T18:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble nat'ing outside addresses to inside network</title>
      <link>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894694#M958724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;dont forget to allow inbound traffic using an ACL.&lt;/P&gt;&lt;P&gt;access-list outside_acl permit icmp any any &lt;/P&gt;&lt;P&gt;access-group outside_acl in interface outside&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Dec 2007 20:44:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894694#M958724</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-12-13T20:44:33Z</dc:date>
    </item>
    <item>
      <title>Re: Having trouble nat'ing outside addresses to inside network</title>
      <link>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894695#M958726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe I already have both the necessary translation rule and acl's applied.  What I just found out was once I ping from the inside server to the outside server, the outside server can then ping and communicate fine with the inside server.  However, this only seems to last for so long before the outside to inside ping stops working, and then I have to ping from the inside out to jumpstart the connection.  Is there a time out somewhere that can be adjusted so this doesn't happen?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Dec 2007 12:59:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/having-trouble-nat-ing-outside-addresses-to-inside-network/m-p/894695#M958726</guid>
      <dc:creator>JJost</dc:creator>
      <dc:date>2007-12-14T12:59:53Z</dc:date>
    </item>
  </channel>
</rss>

