11-17-2010 05:48 AM - edited 03-11-2019 12:10 PM
One of the server host uses the same internet ip to get on to internet and also receive the request from internet to itself. this was done for address space restraint. But a recent security audit has forced to seperate the communication for this server using a single internet registered ip both ways.
i.e server host 10.19.2.2 will use internet IP X.X.X.X for internet bound data from itself & the same X.X.X.X internet IP will be used to reach this host when any other host on internet needs to start a new connection to 10.19.2.2.
Insights into how best,this can be achieved, will be helpful.
TIA.
Solved! Go to Solution.
11-17-2010 06:26 AM
In that case you can modify the configuration to this:
static (in,out) 2.2.2.2 1.1.1.1
The above command will always translate 1.1.1.1 to 2.2.2.2 for inbound or outbound trafffic.
Federico.
11-17-2010 06:07 AM
Hi,
If you want to do this on ASA you can do the following:
static (in,out) tcp 2.2.2.2 80 1.1.1.1 80
nat (inside) 1 1.1.1.1 255.255.255.255
global (outside) 1 2.2.2.3
The above example assumes the following:
Inbound connections to the server (1.1.1.1) will use the NAT IP (2.2.2.2) when the requests comes on port 80.
Outbound traffic from the server will use (2.2.2.3) to get to the Internet.
Hope it helps.
Federico.
11-17-2010 06:24 AM
Thanks. Apologize if my question was not clear.
Taking the eg. that you have stated, our policy needs me to use the same public IP for this server host 1.1.1.1 when going out to internet & use the same public IP for inbound connections to this server initiated by any source from the internet.
TIA.
11-17-2010 06:26 AM
In that case you can modify the configuration to this:
static (in,out) 2.2.2.2 1.1.1.1
The above command will always translate 1.1.1.1 to 2.2.2.2 for inbound or outbound trafffic.
Federico.
11-17-2010 06:35 AM
so the static line will accomplish the task for both inbound & outbound using same ip.
and i would say there needs to be an acl on the outside interface for the incoming new request. would this static and rule hold true for both tcp & udp connections.
Appreciate your help. Thanks.
11-17-2010 06:37 AM
Correct.
The static will hold true for TCP and UDP connections.
Also, to allow incoming traffic you require the ACL as you mentioned.
Federico.
11-17-2010 06:47 AM
Thanks, last query , to check these connections when in use , would sh conn and sh xlate be appropriate commands . Or any other command for this.
11-17-2010 06:49 AM
Correct.
To check the translations (layer 3) you use sh xlate
To check the connections (layer 4) you use sh conn (sh conn state/sh conn det)
Since you have a static one-to-one NAT, there's going to be a single XLATE with multiple connections for that particular host.
Federico.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide