<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Port Redirection (Forwading) from Inside to Outside in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870625#M969310</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, i think i know the problem. The NAT order of operation for the pix from inside interface to outside is to route first then NAT. I think the problem is that we have used an address out of the same subnet as the pix inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would work fine on the outside interface because it NAT's first then routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used the config i supplied many times but what i never did now i come to think of it is to use an ip address out of the same subnet as the pix internal interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So would it be possible to do this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Use a private address that does not currently exist on your internal network and does not conflict with your remote partner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg 192.168.10.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You now need to ensure that any traffic destined for 192.168.10.1 goes to the pix internal interface. Note that if the default gateway set on on your client 192.168.5.10 is the pix then you will be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Change the static statement to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.10.1 172.16.5.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then make the connection from 192.168.5.10 to 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe this will now work. Apologies for misleading you before, i forgot the NAT order of operation from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know how you get on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 Sep 2007 16:41:45 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2007-09-18T16:41:45Z</dc:date>
    <item>
      <title>Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870612#M969289</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a requirement to configure a PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is a 515E with 6.3(5) software loaded.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are connecting to a 3rd party via the Firewall.&lt;/P&gt;&lt;P&gt;It has 1 inside and 1 outside interface configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The requirement is that our internal hosts connect to a IP/Port combination on a Inside routable address and the PIX re-forwards the traffic to the outside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All documentation mentions configuring Outside (Internet) hosts so they can connect to a Outside IP/Port combination but not the reverse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why am I doing this?&lt;/P&gt;&lt;P&gt;Because the external 3rd party have a IP address range which were are not allowed to route internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any comments gratefully received!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 11:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870612#M969289</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2019-03-11T11:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870613#M969291</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside routable address: 192.168.5.1&lt;/P&gt;&lt;P&gt;Outside address:         172.16.5.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.1 172.16.5.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can add in ports into your static statement if you want to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870613#M969291</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-17T12:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870614#M969292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can I ask,&lt;/P&gt;&lt;P&gt;How would the config line above create the re-direction?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I have the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside host 192.168.5.10&lt;/P&gt;&lt;P&gt;PIX Inside routable address: 192.168.5.1 &lt;/P&gt;&lt;P&gt;PIX Outside address: 172.16.5.1 &lt;/P&gt;&lt;P&gt;External Host of 172.16.5.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But cannot use the 172.16.5.0 network or 0.0.0.0 in my routing tables.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using Port Redirection in PIX you can connect to a pseudo outside address that is configured on the outside interface of the PIX which then (unknowing to the initiating host) reconnects to a internal machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I need this, but in reverse.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:28:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870614#M969292</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-17T12:28:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870615#M969293</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We may be talking about different things here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need an address internally that routes to the pix inside interface. So lets say &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside interface of pix:   192.168.5.1&lt;/P&gt;&lt;P&gt;inside client:             192.168.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need an unused IP address from the 192.168.5.0/24 network eg 192.168.5.20 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;External host = 172.16.5.2 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't have to use 172.16.5.0 or 0.0.0.0 in your routing tables. Your 192.168.5.10 host just communicates with 192.168.5.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the packet arrives at the pix internal interface the pix will translate the destination from 192.168.5.20 to 172.16.5.2 and then forward on to the external host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you don't have a spare address in your 192.168.5.0/24 network then you can use any address internally as long as it routes to the internal interface of the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this make sense ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 12:36:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870615#M969293</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-17T12:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870616#M969294</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, with your assistance I am getting somewhere.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have configured the line as above [substituting for my real addressing ;o) ], and am attempting a Telnet to the 192.168.5.20 address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A show xlate does not display any translation occurring.&lt;/P&gt;&lt;P&gt;I have debug packet inside src 192.168.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see packets being rec'd, as follows;&lt;/P&gt;&lt;P&gt;pixfirewall# --------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;192.168.5.10     ==&amp;gt;     192.168.5.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x2c&lt;/P&gt;&lt;P&gt;        id = 0x40b6     flags = 0x40    frag off=0x0&lt;/P&gt;&lt;P&gt;        ttl = 0x78      proto=0x6       chksum = 0xdf9f&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- TCP --&lt;/P&gt;&lt;P&gt;                source port = 0x1e81    dest port = 0x17syn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                seq = 0xce871757&lt;/P&gt;&lt;P&gt;                ack = 0x0&lt;/P&gt;&lt;P&gt;                hlen = 0x6              window = 0xffff&lt;/P&gt;&lt;P&gt;                checksum = 0xb19d       urg = 0x0&lt;/P&gt;&lt;P&gt;tcp options:&lt;/P&gt;&lt;P&gt;                        0x2     0x4     0x5     0x50    -- DATA --&lt;/P&gt;&lt;P&gt;                00000020:                                     00 00 41     |&lt;/P&gt;&lt;P&gt;          ..A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have also run the command;&lt;/P&gt;&lt;P&gt;debug packet outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I can see no traffic exiting the outside of the PIX.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any other debug commands I can use or tips?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;Craig.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 13:29:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870616#M969294</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-17T13:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870617#M969295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You have a route to the remote network ( the real address )&lt;/P&gt;&lt;P&gt;2) You are allowing the traffic out if you have an access-list applied on the inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 13:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870617#M969295</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-17T13:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870618#M969297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Re: 1)&lt;/P&gt;&lt;P&gt;I have a route outside configured (ping from the PIX is successful confirming IP connectivity OK)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Re 2)&lt;/P&gt;&lt;P&gt;I have a access-list that is current set to permit ip any any (on inside and outside interfaces ) [for initial testing purposes].&lt;/P&gt;&lt;P&gt;Plus packets are reaching the PIX and is confirmed by the previous debug).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see packets arriving on the internal interface as per my last post but the XLATE function is not pickup up the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attempted ;&lt;/P&gt;&lt;P&gt;show xlate&lt;/P&gt;&lt;P&gt;show xlate inside&lt;/P&gt;&lt;P&gt;show xlate outside&lt;/P&gt;&lt;P&gt;show xlate debug&lt;/P&gt;&lt;P&gt;--Which show nothing..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any other suggestions ideas on this one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 15:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870618#M969297</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-17T15:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870619#M969301</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post a sanitised copy of config. I have used this command many times in our environment so i know it should work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 16:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870619#M969301</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-17T16:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870620#M969305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Agree with Jon the static should work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you have the following setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside host: 192.168.1.10&lt;/P&gt;&lt;P&gt;outside host: 172.16.1.2&lt;/P&gt;&lt;P&gt;inside destination to get to the outside host: 192.168.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.1.20 172.16.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any traffic initiated from inside to 192.168.1.20 the PIX will redirect it to the outside host address of 172.16.1.2. Does the outside host know how to route to your inside network?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Sep 2007 23:20:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870620#M969305</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-09-17T23:20:50Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870621#M969306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jon/Sundar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here you go...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(5)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 auto&lt;/P&gt;&lt;P&gt;interface ethernet2 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet3 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet4 auto shutdown&lt;/P&gt;&lt;P&gt;interface ethernet5 auto shutdown&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 faillink security30&lt;/P&gt;&lt;P&gt;nameif ethernet3 intf3 security6&lt;/P&gt;&lt;P&gt;nameif ethernet4 intf4 security8&lt;/P&gt;&lt;P&gt;nameif ethernet5 intf5 security10&lt;/P&gt;&lt;P&gt;enable password xx encrypted&lt;/P&gt;&lt;P&gt;passwd xx encrypted&lt;/P&gt;&lt;P&gt;hostname pixfirewall&lt;/P&gt;&lt;P&gt;domain-name xx.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;fixup protocol skinny 2000&lt;/P&gt;&lt;P&gt;fixup protocol smtp 25&lt;/P&gt;&lt;P&gt;fixup protocol sqlnet 1521&lt;/P&gt;&lt;P&gt;fixup protocol tftp 69&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;access-list 150 permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging timestamp&lt;/P&gt;&lt;P&gt;logging console debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu faillink 1500&lt;/P&gt;&lt;P&gt;mtu intf3 1500&lt;/P&gt;&lt;P&gt;mtu intf4 1500&lt;/P&gt;&lt;P&gt;mtu intf5 1500&lt;/P&gt;&lt;P&gt;ip address outside 172.16.5.2  255.255.255.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.5.1 255.255.255.0&lt;/P&gt;&lt;P&gt;no ip address faillink&lt;/P&gt;&lt;P&gt;no ip address intf3&lt;/P&gt;&lt;P&gt;no ip address intf4&lt;/P&gt;&lt;P&gt;no ip address intf5&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;failover timeout 0:00:00&lt;/P&gt;&lt;P&gt;failover poll 15&lt;/P&gt;&lt;P&gt;no failover ip address outside&lt;/P&gt;&lt;P&gt;no failover ip address inside&lt;/P&gt;&lt;P&gt;no failover ip address faillink&lt;/P&gt;&lt;P&gt;no failover ip address intf3&lt;/P&gt;&lt;P&gt;no failover ip address intf4&lt;/P&gt;&lt;P&gt;no failover ip address intf5&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.2 netmask 255.255.255.255  0 0&lt;/P&gt;&lt;P&gt;access-group 150 in interface outside&lt;/P&gt;&lt;P&gt;access-group 150 in interface inside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 172.16.5.254 1&lt;/P&gt;&lt;P&gt;route inside 192.168.5.0 255.255.255.0 155.30.3.253 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout sip-disconnect 0:02:00 sip-invite 0:03:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server RADIUS max-failed-attempts 3&lt;/P&gt;&lt;P&gt;aaa-server RADIUS deadtime 10&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;ntp server x.x.x.x source inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;telnet 0.0.0.0 0.0.0.0 inside&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;terminal width 80&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;********************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 12:35:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870621#M969306</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-18T12:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870622#M969307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.2 netmask 255.255.255.255 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;172.16.5.2 is the address attached to your outside interface on the pix. You need to change this to be the host you are trying to get to eg if the actual address of the host you are trying to get to is 172.16.5.10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 12:55:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870622#M969307</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-18T12:55:00Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870623#M969308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;DARN!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is how it is configured.&lt;/P&gt;&lt;P&gt;Its my mistake whilst I was sanitizing the config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess we are out of ideas, the config is correct but I cannot seem to get traffic to work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I telnet to 192.168.5.20 I see Syn's from the originating machine sent to the PIX but no replies.&lt;/P&gt;&lt;P&gt;Also 'debug packet inside' shows the syn's arriving on the inside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But, the traffic is not being NAT xlate'd..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stuck...&lt;/P&gt;&lt;P&gt; :o(&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 14:01:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870623#M969308</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-18T14:01:57Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870624#M969309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;pixfirewall# --------- PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-- IP --&lt;/P&gt;&lt;P&gt;192.168.5.10     ==&amp;gt;     192.168.5.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        ver = 0x4       hlen = 0x5      tos = 0x0       tlen = 0x2c&lt;/P&gt;&lt;P&gt;        id = 0xb57c     flags = 0x40    frag off=0x0&lt;/P&gt;&lt;P&gt;        ttl = 0x79      proto=0x6       chksum = 0x69da&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;        -- TCP --&lt;/P&gt;&lt;P&gt;                source port = 0x607d    dest port = 0x17syn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;                seq = 0xbd3d6408&lt;/P&gt;&lt;P&gt;                ack = 0x0&lt;/P&gt;&lt;P&gt;                hlen = 0x6              window = 0xffff&lt;/P&gt;&lt;P&gt;                checksum = 0x343b       urg = 0x0&lt;/P&gt;&lt;P&gt;tcp options:&lt;/P&gt;&lt;P&gt;                        0x2     0x4     0x5     0x50    -- DATA --&lt;/P&gt;&lt;P&gt;                00000020:                                     00 00 41     |&lt;/P&gt;&lt;P&gt;          ..A&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------- END OF PACKET ---------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sho debug&lt;/P&gt;&lt;P&gt;debug access-list all&lt;/P&gt;&lt;P&gt;debug fixup tcp&lt;/P&gt;&lt;P&gt;debug packet outside both&lt;/P&gt;&lt;P&gt;debug packet inside src 192.168.5.10  both&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Adding &lt;/P&gt;&lt;P&gt;debug icmp trace&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then pinging the Inside NAT ip &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Show the following on the console;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ICMP echo-request from inside:192.168.5.10  to 192.168.5.20  ID=512 seq=4608 length=40&lt;/P&gt;&lt;P&gt;ICMP echo-request from inside:192.168.5.10  to 192.168.5.20  ID=512 seq=4864 length=40&lt;/P&gt;&lt;P&gt;ICMP echo-request from inside:192.168.5.10  to 192.168.5.20  ID=512 seq=5120 length=40&lt;/P&gt;&lt;P&gt;ICMP echo-request from inside:192.168.5.10  to 192.168.5.20  ID=512 seq=5376 length=40&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But no XLATE is being created.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfirewall# sho xlate debug&lt;/P&gt;&lt;P&gt;0 in use, 0 most used&lt;/P&gt;&lt;P&gt;Flags: D - DNS, d - dump, I - identity, i - inside, n - no random,&lt;/P&gt;&lt;P&gt;       o - outside, r - portmap, s - static&lt;/P&gt;&lt;P&gt;pixfirewall#&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 14:27:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870624#M969309</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-18T14:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870625#M969310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay, i think i know the problem. The NAT order of operation for the pix from inside interface to outside is to route first then NAT. I think the problem is that we have used an address out of the same subnet as the pix inside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would work fine on the outside interface because it NAT's first then routes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have used the config i supplied many times but what i never did now i come to think of it is to use an ip address out of the same subnet as the pix internal interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So would it be possible to do this &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Use a private address that does not currently exist on your internal network and does not conflict with your remote partner.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eg 192.168.10.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You now need to ensure that any traffic destined for 192.168.10.1 goes to the pix internal interface. Note that if the default gateway set on on your client 192.168.5.10 is the pix then you will be fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) Change the static statement to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.10.1 172.16.5.10 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then make the connection from 192.168.5.10 to 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe this will now work. Apologies for misleading you before, i forgot the NAT order of operation from inside to outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know how you get on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 16:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870625#M969310</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-18T16:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870626#M969311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It just works fine in my lab with the same setup that Craig has. It's a PIX515E running 7.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Existing Configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX515E(config)# show run static&lt;/P&gt;&lt;P&gt;static (outside,inside) 192.168.5.20 172.16.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;PIX515E(config)# show xlate1 in use, 1 most used&lt;/P&gt;&lt;P&gt;Global 192.168.5.20 Local 172.16.5.10&lt;/P&gt;&lt;P&gt;PIX515E(config)# show access-list acl_outside&lt;/P&gt;&lt;P&gt;access-list acl_outside; 1 elements&lt;/P&gt;&lt;P&gt;access-list acl_outside line 1 extended permit icmp host 172.16.5.10 host 192.168.5.10 echo-reply (hitcnt=0) 0x9c61191a&lt;/P&gt;&lt;P&gt;PIX515E(config)# show run access-group&lt;/P&gt;&lt;P&gt;access-group acl_outside in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pinged 192.168.5.20 from inside host 192.168.5.10 and echo replies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX515E(config)# show access-list acl_outside&lt;/P&gt;&lt;P&gt;access-list acl_outside; 1 elements&lt;/P&gt;&lt;P&gt;access-list acl_outside line 1 extended permit icmp host 172.16.5.10 host 192.168.5.10 echo-reply (hitcnt=1) 0x9c61191a --&amp;gt; Return traffic matches.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Craig,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify the outside host (172.16.5.10) routes the traffic destined to 192.168.5.10 to the PIX outside interface (172.16.5.2).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 20:03:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870626#M969311</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-09-18T20:03:51Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870627#M969312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sundar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Didn't have access to a firewall to test so wasn't sure why it was not working for Craig. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you confirm that the inside IP address of the pix is in the 192.168.5.x range ? If so then it looks like it should work after all. As i say i have always used a separate subnet for this sort of thing from inside to outside. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for testing this out Sundar. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 20:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870627#M969312</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-18T20:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870628#M969313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not a problem Jon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside host address is 192.168.5.10 and that's the same subnet as inside interface of the PIX itself. Actually, I configured two routers to be inside/outside host and enabled ICMP debugs on the outside router to make sure it wasn't the PIX that was sending proxy ARP replies to the inside host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am starting to wonder whether Craig may have to enable proxy ARP on the inside interface for this to work. I guess it wouldn't be a bad idea to try configuring 'no sysopt noproxyarp inside' and test. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sundar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Sep 2007 21:29:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870628#M969313</guid>
      <dc:creator>sundar.palaniappan</dc:creator>
      <dc:date>2007-09-18T21:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870629#M969314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sundar / Jon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once again, a big thank-you for your continued support - it is most appreciated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running a 515e but with 6.3(5) software - so your lab is not using the same code.&lt;/P&gt;&lt;P&gt;Could there be a difference in NAT Order of Operation between 6.x and 7.x?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As this is in a remote site (in Africa) sadly there is no Infrastructure to create another VLAN &amp;amp; IP address range.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to disable IP routing?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the packets are arriving at the PIX and displayed by debug packet then I assume Proxy ARP is working correctly.?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 10:35:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870629#M969314</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-19T10:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870630#M969315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Fixed!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following lines were required;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 16:19:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870630#M969315</guid>
      <dc:creator>packet_loss</dc:creator>
      <dc:date>2007-09-19T16:19:22Z</dc:date>
    </item>
    <item>
      <title>Re: Port Redirection (Forwading) from Inside to Outside</title>
      <link>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870631#M969318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh for crying out loud &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well done Craig, we were all so busy worrying about how to NAT a destination address that we completely overlooked the NAT on the source IP addresses !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I should have spotted that and altho i don't want to speak for Sundar i think he will feel the same &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for letting us know Craig&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Sep 2007 16:29:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-redirection-forwading-from-inside-to-outside/m-p/870631#M969318</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-09-19T16:29:10Z</dc:date>
    </item>
  </channel>
</rss>

