<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804863#M983253</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is difference use real address and NAT address in the inside and dmz network? Does infect application access? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ben &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 02 Aug 2007 14:33:57 GMT</pubDate>
    <dc:creator>bma</dc:creator>
    <dc:date>2007-08-02T14:33:57Z</dc:date>
    <item>
      <title>NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804861#M983251</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;  What is for static (inside dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.255 0 0?  Is it no nat for the 192.168.100.0 network? If I remove this line, what is happen? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;   Could I use following lines together&lt;/P&gt;&lt;P&gt; static (inside dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; static (inside dmz) 192.168.4.70 192.168.100.50 network 255.255.255.255 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ben&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:52:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804861#M983251</guid>
      <dc:creator>bma</dc:creator>
      <dc:date>2019-03-11T10:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804862#M983252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ben,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No you have the wrong netmask. But if you change the netmask to 255.255.255.0 it would mean that you can access the 192.168.100.0/24 network from the dmz using the real addresses (if the dmz acl permits).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And yes you can use a static for the network together with a static for one ip, if you use different netmasks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 08:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804862#M983252</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-02T08:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804863#M983253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is difference use real address and NAT address in the inside and dmz network? Does infect application access? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ben &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 14:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804863#M983253</guid>
      <dc:creator>bma</dc:creator>
      <dc:date>2007-08-02T14:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804864#M983254</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no difference. Normally you do not have to translate addresses between the inside and dmz networks, but you can do it either way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need to initiate connections from the DMZ to the inside you must use the static command for some addresses or the entire network (but you do not have to translate the addresses).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But if you only need the inside to access the dmz, you can instead use nat/global command. That will only allow outbound connections from the inside.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 14:43:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804864#M983254</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-02T14:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804865#M983255</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If use virtual server ip address(netscaler) in the dmz, real server ip address is with internal, do I need do static from dmz to internal? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 15:14:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804865#M983255</guid>
      <dc:creator>bma</dc:creator>
      <dc:date>2007-08-02T15:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804866#M983256</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you need static statements to permit access from any interface when you are going to the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You also need an access-list to permit the traffic on the dmz interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 15:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804866#M983256</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-02T15:20:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804867#M983257</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just try add one static line &lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.4.150 192.168.0.250 netmask 255.255.255.255 0 0,&lt;/P&gt;&lt;P&gt;but it is fail, message is real-address conflict with existing static &lt;/P&gt;&lt;P&gt;inside: 192.168.0.0 to dmz: 192.168.0.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks have to remove static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0 0 0 from pix. &lt;/P&gt;&lt;P&gt;What is risk to remove this line? Maybe some ip deny access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 16:04:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804867#M983257</guid>
      <dc:creator>bma</dc:creator>
      <dc:date>2007-08-02T16:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804868#M983258</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, you need to use policy nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list HOST1 permit ip host 192.168.0.250  192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.4.150 access-list HOST1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if you have to remove the other static, try it without first.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it does not work you have to remove it, but then people will loose connectivity, and add it again with policy-nat:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list NET1 permit ip 192.168.0.0 255.255.255.0 192.168.4.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.0.0 access-list NET1 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 17:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804868#M983258</guid>
      <dc:creator>mattiaseriksson</dc:creator>
      <dc:date>2007-08-02T17:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804869#M983259</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If nat-control is enabled (assuming PIX/ASA OS 7.x and later), or if you're using PIX OS 6.x or earlier, you need to enable nat between any higher security level interface and any lower security level interface.  &lt;/P&gt;&lt;P&gt;You can use any type of nat except identity nat if hosts on the lower security interface need to initiate connections back to the higher level security interface.&lt;/P&gt;&lt;P&gt;This means you can use any type of nat except the following: &lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;nat (inside) 0 192.168.1.1 255.255.255.255&lt;/P&gt;&lt;P&gt;...just for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat exemption allows connections to be initiated both ways and looks like the following:&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 101&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any nat involving the static command also allows connections to be initiated from either side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 17:40:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804869#M983259</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-08-02T17:40:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question</title>
      <link>https://community.cisco.com/t5/network-security/nat-question/m-p/804870#M983260</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ben&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 02 Aug 2007 20:44:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question/m-p/804870#M983260</guid>
      <dc:creator>bma</dc:creator>
      <dc:date>2007-08-02T20:44:50Z</dc:date>
    </item>
  </channel>
</rss>

