05-02-2018 04:29 AM - edited 02-21-2020 07:41 AM
Our issue is that, outside 3 public IPs need to communicate with one of our internal IP addresses. So it is actually a group of host public IP address. Which type of NAT we need to write?
05-03-2018 02:03 AM
05-03-2018 03:38 AM
When an outside system needs to reach an internal system, then you always need a static NAT for the internal system:
object network INTERNAL-SERVER host 10.10.10.10 nat (inside,outside) static 192.0.2.1
Then you need access-control to allow traffic to that host:
object-group network ALLOWED-HOSTS network-object host 1.2.3.4 network-object host 2.3.4.5 network-object host 3.4.5.6 ! access-list OUTSIDE-ACCESS-IN permit tcp object-group ALLOWED-HOSTS object INTERNAL-SERVER eq 443 ! access-group OUTSIDE-ACCESS-IN in interface outside
Just adjust the ACL-name if there is already an ACL in place.
05-03-2018 03:50 AM
nat (outside,inside) source static group-of-public-iplist destination static Public_NAT router-ip(internal) service ssh ssh no-proxy-arp
nat (inside,outside) source dynamic internal network Public_Nat dns
nat (outside,inside) source static group-of-public-iplist destination static Public_Nat group-of-public-iplist service any no-proxy-arp
this is the configuration we applied.But no hits comming with this configuration.
05-03-2018 05:03 AM
have you got an ACL to permit the destination port on the outside interface. remember it needs to be permitted, after the unNAT..also have you got routes from your fw to the internal destination? runpacket tracer to verify your logic
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide