<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT rule in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377240#M974687</link>
    <description>&lt;P&gt;nat (outside,inside) source static group-of-public-iplist destination static Public_NAT router-ip(internal) service ssh ssh no-proxy-arp&lt;BR /&gt;nat (inside,outside) source dynamic internal network Public_Nat dns&lt;BR /&gt;nat (outside,inside) source static&amp;nbsp;group-of-public-iplist destination static Public_Nat group-of-public-iplist&amp;nbsp; service any no-proxy-arp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this is the configuration we applied.But no hits comming with this configuration.&lt;/P&gt;</description>
    <pubDate>Thu, 03 May 2018 10:50:08 GMT</pubDate>
    <dc:creator>vishnuvichu36601</dc:creator>
    <dc:date>2018-05-03T10:50:08Z</dc:date>
    <item>
      <title>NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3376537#M974684</link>
      <description>&lt;P&gt;Our issue is that, outside 3 public IPs need to communicate with one of our internal IP &lt;SPAN class="correction  alternate"&gt;addresses&lt;/SPAN&gt;. So it is actually a group of host public &lt;SPAN class="correction  alternate"&gt;IP&lt;/SPAN&gt; address&lt;SPAN class="correction  alternate"&gt;. &lt;/SPAN&gt;Which type of NAT we need to write?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:41:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule/m-p/3376537#M974684</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2020-02-21T15:41:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377207#M974685</link>
      <description>A concise question always receives a straight answer: when you say outside public IP you mean an external host that reaches your firewall through outside interface?&lt;BR /&gt;Next: on what port from the internal host you need access?</description>
      <pubDate>Thu, 03 May 2018 09:03:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377207#M974685</guid>
      <dc:creator>Florin Barhala</dc:creator>
      <dc:date>2018-05-03T09:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377234#M974686</link>
      <description>&lt;P&gt;When an outside system needs to reach an internal system, then you always need a static NAT for the internal system:&lt;/P&gt;
&lt;PRE&gt;object network INTERNAL-SERVER
 host 10.10.10.10
 nat (inside,outside) static 192.0.2.1&lt;/PRE&gt;
&lt;P&gt;Then you need access-control to allow traffic to that host:&lt;/P&gt;
&lt;PRE&gt;object-group network ALLOWED-HOSTS
 network-object host 1.2.3.4
 network-object host 2.3.4.5
 network-object host 3.4.5.6
!
access-list OUTSIDE-ACCESS-IN permit tcp object-group ALLOWED-HOSTS object INTERNAL-SERVER eq 443
!
access-group OUTSIDE-ACCESS-IN in interface outside&lt;/PRE&gt;
&lt;P&gt;Just&amp;nbsp;adjust the ACL-name if there is already an ACL in place.&lt;/P&gt;</description>
      <pubDate>Thu, 03 May 2018 10:38:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377234#M974686</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2018-05-03T10:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377240#M974687</link>
      <description>&lt;P&gt;nat (outside,inside) source static group-of-public-iplist destination static Public_NAT router-ip(internal) service ssh ssh no-proxy-arp&lt;BR /&gt;nat (inside,outside) source dynamic internal network Public_Nat dns&lt;BR /&gt;nat (outside,inside) source static&amp;nbsp;group-of-public-iplist destination static Public_Nat group-of-public-iplist&amp;nbsp; service any no-proxy-arp&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this is the configuration we applied.But no hits comming with this configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 03 May 2018 10:50:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377240#M974687</guid>
      <dc:creator>vishnuvichu36601</dc:creator>
      <dc:date>2018-05-03T10:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT rule</title>
      <link>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377275#M974688</link>
      <description>&lt;P&gt;have you got an ACL to permit the destination port on the outside interface. remember it needs to be permitted,&amp;nbsp;after the unNAT..also have you got routes from your fw to the internal destination?&amp;nbsp; runpacket tracer to verify your logic&lt;/P&gt;</description>
      <pubDate>Thu, 03 May 2018 12:03:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-rule/m-p/3377275#M974688</guid>
      <dc:creator>Dennis Mink</dc:creator>
      <dc:date>2018-05-03T12:03:52Z</dc:date>
    </item>
  </channel>
</rss>

