cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
474
Views
5
Helpful
1
Replies

NATting External Netowrk in ASA 5555-X

ammartalal
Level 1
Level 1

We have a Cisco ASA 5555-X Firewall, and I have an external connection from a partner company coming through an MPLS connection provided by another telecom company. The partner needs to access a server inside my company's server vlan range, from a server at their side.

 

The IP of the partner's server is 192.168.0.1, which is an IP that we already have in our company's network & I can't change it in the server which is using it. The MPLS connection is using a different range, 192.168.75.0/24. The MPLS modem is having IP 192.168.75.198 & my server is supposed to be having the IP 192.168.75.201, which I am NATting to the internal IP of the server, which is 10.195.8.136. The MPLS connection is on vlan81, which is separate from the default vlan we are using for the servers.

I tried to NAT the source IP 192.168.0.1 to become 192.168.75.202 when it comes to my network. But when I tried to NAT the above scenario, I got an error in the log saying (No Valid Adjacency). Please see the attached for the NAT rule. PO-Billing-Server = 10.195.8.136 - Post-Office-Server = 192.168.75.201 & PO-NAT = 192.168.75.202

 

Is it possible to NAT the IP of their server 192.168.0.1 although I have the same IP present in my network on another vlan? And what is the best way to achieve that?

 

Please let me know if I missed any information or if any further information is needed.

 

Thanks.

Ammar Al-Masaabi

1 Accepted Solution

Accepted Solutions

rais
Level 7
Level 7

You should be able to use:

ip nat outside source static 192.168.0.1 192.168.75.205

for what you are trying to do.

 

Take a look at this case:

https://community.cisco.com/t5/firewalls/access-issues-quot-no-valid-adjacency-quot/td-p/2330314

 

HTH.

View solution in original post

1 Reply 1

rais
Level 7
Level 7

You should be able to use:

ip nat outside source static 192.168.0.1 192.168.75.205

for what you are trying to do.

 

Take a look at this case:

https://community.cisco.com/t5/firewalls/access-issues-quot-no-valid-adjacency-quot/td-p/2330314

 

HTH.

Review Cisco Networking products for a $25 gift card