08-02-2016 10:04 AM - edited 03-12-2019 01:04 AM
Hi everyone,
I have a problem I've never run up against before, and don't even know what to call it so I'm going to say I'm hiding two hosts from each other using NAT :) Here's the situation:
I have two mail servers on two different networks in my data center, that need to exchange mail directly with each other, and not go over the internet (they are for two companies owned by the same owner, but there needs to be a level of separation between them). I have an ASA 5505 sitting between these networks, configured as such:
Inside interface: 10.189.131.126
Outside interface: 10.250.1.251
The mail server IPs are:
Server A: 10.189.128.30 (behind the "Inside" interface)
Server B: 10.250.1.111
Basically, these two mail servers need to communicate with each other, but not with their real addresses. So essentially, when Mail Server A connects to the IP 10.189.131.130 it needs to be translated to 10.250.1.30, and vice versa. If we can limit it to port 25 I could even use the interface IPs if that makes it simpler.
Is this even possible? How would one go about doing it? :)
Thanks in advance.
Solved! Go to Solution.
08-07-2016 01:20 PM
Hi;
Please find the Cisco ASA firewall natting on OS ver 8.2(1) as per your requirement:
Static Nat:
static (inside,outside) 10.250.1.30 10.189.131.130 netmask 255.255.255.255
To restrict the communication on port 25:
access-list OUT-IN extended permit tcp host 10.250.1.111 host 10.250.1.30 eq 25
access-group OUT-IN in interface outside
Thanks & Best regards;
08-02-2016 12:34 PM
Hi Greg,
I hope you are fine, yes that can be achieved, but I would like to know which software version are you running on the ASA?
08-02-2016 02:15 PM
I am running version 8.2(1)
08-05-2016 10:22 AM
Any ideas how to pull this off? I'm beating my head against the wall over here :)
08-05-2016 12:57 PM
Hi Greg,
You can use a static policy NAT to do the requirement when an IP wants to communicate with a specific server translate the IP to a different IP
An example here:
When host 192.168.1.1 goes to 172.16.10.1 translate the IP to 10.200.192.56
access-list NAT permit tcp host 192.168.1.1 host 172.16.10.1 eq 443
static (inside,outside) 10.200.192.56 access-list NAT
08-07-2016 01:20 PM
Hi;
Please find the Cisco ASA firewall natting on OS ver 8.2(1) as per your requirement:
Static Nat:
static (inside,outside) 10.250.1.30 10.189.131.130 netmask 255.255.255.255
To restrict the communication on port 25:
access-list OUT-IN extended permit tcp host 10.250.1.111 host 10.250.1.30 eq 25
access-group OUT-IN in interface outside
Thanks & Best regards;
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide