<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799280#M973127</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have an outbound ACL you should make sure that PPTP control traffic is allowed out (TCP port 1723).  The inspection engine dynamically creates the GRE connections and translations necessary to permit PPTP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Jul 2007 07:32:13 GMT</pubDate>
    <dc:creator>mattiaseriksson</dc:creator>
    <dc:date>2007-07-17T07:32:13Z</dc:date>
    <item>
      <title>NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799271#M973118</link>
      <description>&lt;P&gt;We have many users that connect to a remote VPN.  They use a local client on Windows XP, but the only way we can get them to connect is by giving each user a public external IP address and NAT it to their private internal address and use the GRE IP protocal, we have no more public address left now.  Is there a way where we can allow all users to just use one external IP or a pool of IP's to NAT?  We only have one or two users (max) that connect to this VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:45:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799271#M973118</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2019-03-11T10:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799272#M973119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand you correct, you want to let outbound PPTP traffic pass through your firewall without using 1:1 NAT as you are currently doing, but rather use a single public IP (PAT)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really depends on what firewall you are using, but if you have a PIX firewall running OS 6.3 or later, you can use the command 'fixup protocol pptp 1723'. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will let PPTP traffic traverse the PIX when configured for PAT, performing stateful PPTP packet inspection in the process.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:09:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799272#M973119</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T14:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799273#M973120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's a Pix with that version, how can I do this in the ADSM?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:42:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799273#M973120</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-16T14:42:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799274#M973121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try Service Policy Rule Wizard &amp;gt; Rule Actions &amp;gt; Protocol Inspection Tab and enable PPTP inspection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799274#M973121</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T14:50:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799275#M973122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's it?  i wish I knew about this earlier &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;   So what public address will all users use?  plus and downtime on the Pix when I enable this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:51:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799275#M973122</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-16T14:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799276#M973123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What address they will use depends on your NAT/PAT configurations. You can let them use the outside interface address with PAT if you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There should not be any downtime (unless you also change NAT configuration and clear the translation table).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 14:58:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799276#M973123</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T14:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799277#M973124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok, once I tick that "PPTP" box what should I do for the NAT/PAT config, explained in an idiots guide please &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; as this is new to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks inadvance for you help&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 20:32:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799277#M973124</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-16T20:32:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799278#M973125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You said you are using static NAT for computers that connect through vpn, and I guess that other computers are accessing internet through the same firewall using dynamic NAT?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you only have to remove the statics, and all computers should have the same NAT policy applied. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To configure dynamic NAT the easiest way is to use the interface address:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Replace 10.0.0.0 with whatever network you are using internally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will translate all internal source addresses to the outside interface address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look here for some ideas of how to control NAT with ASDM:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008046f31a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a008046f31a.shtml&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 Jul 2007 20:52:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799278#M973125</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-16T20:52:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799279#M973126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would I have to still create a security policy for example allow 10.0.0.0 255.0.0.0 on PPTP and GRE?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 06:15:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799279#M973126</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-17T06:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799280#M973127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have an outbound ACL you should make sure that PPTP control traffic is allowed out (TCP port 1723).  The inspection engine dynamically creates the GRE connections and translations necessary to permit PPTP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 07:32:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799280#M973127</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-17T07:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799281#M973128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I noticed that there is no NAT rules on the Outside interface do I need to do this for all our VLAN/Subnets?  of leabe this all blank?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 09:41:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799281#M973128</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-17T09:41:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799282#M973129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The source network is on your inside interface, and you can specify every subnet that you use, or just use 0.0.0.0 mask 0.0.0.0 to translate every subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you need to add a dynamic pool on the outside interface. It can be a range of addresses or the ouside interface address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easiest way to do it is, of course, to just enter these two lines:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 09:52:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799282#M973129</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-17T09:52:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799283#M973130</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will there be any downtime when I apply this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 09:55:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799283#M973130</guid>
      <dc:creator>whiteford</dc:creator>
      <dc:date>2007-07-17T09:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/799284#M973131</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It depends on your existing NAT configuration. Can you attach the configuration?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Jul 2007 09:57:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/799284#M973131</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-07-17T09:57:35Z</dc:date>
    </item>
  </channel>
</rss>

