<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connect to outside ip from inside network in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772934#M972290</link>
    <description>&lt;P&gt;I just replace a clients PIX with an ASA 5510.  They weren't using static nats and had all their servers set up with dual NICs.  One connected to the internet and one to their inside network.  Now that the ASA is in place, they are using static nats .  However, one of their apps that they use on the internal network connects to an internet IP.  It's hard coded and cannot be changed.  So, now when they try to connect, it does not work.  Is there any way to get this to work with the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
    <pubDate>Tue, 26 Mar 2019 00:38:19 GMT</pubDate>
    <dc:creator>deyster94</dc:creator>
    <dc:date>2019-03-26T00:38:19Z</dc:date>
    <item>
      <title>Connect to outside ip from inside network</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772934#M972290</link>
      <description>&lt;P&gt;I just replace a clients PIX with an ASA 5510.  They weren't using static nats and had all their servers set up with dual NICs.  One connected to the internet and one to their inside network.  Now that the ASA is in place, they are using static nats .  However, one of their apps that they use on the internal network connects to an internet IP.  It's hard coded and cannot be changed.  So, now when they try to connect, it does not work.  Is there any way to get this to work with the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TIA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:38:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772934#M972290</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2019-03-26T00:38:19Z</dc:date>
    </item>
    <item>
      <title>Re: Connect to outside ip from inside network</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772935#M972292</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sure, but where is the destination? If it's on the dmz and the request is coming from the inside you can do destination nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) public.ip private.ip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or if the destination is on the inside along with the source then you have to hairpin.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;static (inside,inside) public.ip private.ip netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0 &lt;/P&gt;&lt;P&gt;global (inside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2007 01:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772935#M972292</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-28T01:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Connect to outside ip from inside network</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772936#M972295</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They want to connect to an IP on the outside of the firewall that is natted back inside.  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for example:&lt;/P&gt;&lt;P&gt;ftp to: 1.1.1.1 which is natted to 2.2.2.2 on the inside and make this connection from the internal network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, for a destination nat, they would do:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (outside,inside) 1.1.1.1 2.2.2.2 netmask 255.255.255.255 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2007 01:46:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772936#M972295</guid>
      <dc:creator>deyster94</dc:creator>
      <dc:date>2007-07-28T01:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Connect to outside ip from inside network</title>
      <link>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772937#M972297</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if you have something like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) x.x.x.x y.y.y.y netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and the connection from inside is to x.x.x.x then you would use the hairpinning method I referenced above.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2007 11:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/connect-to-outside-ip-from-inside-network/m-p/772937#M972297</guid>
      <dc:creator>acomiskey</dc:creator>
      <dc:date>2007-07-30T11:35:24Z</dc:date>
    </item>
  </channel>
</rss>

