<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Basic NAT-PAT configuration question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776950#M980188</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;best practice is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you literally use the keyword 'interface' in the global command.  it will use the outside interface IP, no matter what it is.  you could also just use the outside IP there though. both accomplish NAT overloading / PAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 May 2007 16:33:08 GMT</pubDate>
    <dc:creator>srue</dc:creator>
    <dc:date>2007-05-23T16:33:08Z</dc:date>
    <item>
      <title>Basic NAT-PAT configuration question</title>
      <link>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776949#M980186</link>
      <description>&lt;P&gt;I want to configure a PIX 501 firewall for NAT - or more accurately PAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want all inside users to be able to access the Internet using their non-routable IP adresses that the PIX will translate at the perimeter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only have one public IP address available.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not have a range as shown in the example below from:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v52/config/examples.htm#xtocid2" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v52/config/examples.htm#xtocid2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Start of example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 209.165.201.10-209.165.201.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 209.165.201.8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Create a pool of global addresses that translated addresses use when they exit the firewall from the protected networks to the unprotected networks. The global command statement is associated with a nat command statement by the NAT ID, which in this example is 1. Because there are limited IP addresses in the pool, a PAT (Port Address Translation) global is added to handle overflow."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End of example&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, in my case, can I simply use the second global line to attain my objective?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do I need to configure particular access-list entries in this case or will the PIX take care of everything automatically?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776949#M980186</guid>
      <dc:creator>DAVMAC111</dc:creator>
      <dc:date>2019-03-11T10:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Basic NAT-PAT configuration question</title>
      <link>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776950#M980188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;best practice is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you literally use the keyword 'interface' in the global command.  it will use the outside interface IP, no matter what it is.  you could also just use the outside IP there though. both accomplish NAT overloading / PAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 May 2007 16:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776950#M980188</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-05-23T16:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Basic NAT-PAT configuration question</title>
      <link>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776951#M980189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the answer!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does the result look right (I'm going to test it now)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pixfw(config)# nat (inside) 1 0 0&lt;/P&gt;&lt;P&gt;pixfw(config)# show nat&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;pixfw(config)# global (outside) 1 interface&lt;/P&gt;&lt;P&gt;outside interface address added to PAT pool&lt;/P&gt;&lt;P&gt;pixfw(config)# show global&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 May 2007 12:21:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-nat-pat-configuration-question/m-p/776951#M980189</guid>
      <dc:creator>DAVMAC111</dc:creator>
      <dc:date>2007-05-24T12:21:17Z</dc:date>
    </item>
  </channel>
</rss>

