ntwrkrbkj
IS-IT--Management
- Jun 2, 2003
- 58
Is the ASA 5505 capable of doing 1 to 1 NAT? Every configuration I've tried hasn't worked, but then again, I'm used to the PIX series. Does anyone have any good links to config examples that encorporate 1 to 1 NAT?
These are the commands I'm using (yes, the x's are public IPs):
access-list outside_access_in extended permit tcp any x.x.x.177 255.255.255.255 eq 80
access-list outside_access_in extended permit tcp any x.x.x.177 255.255.255.255 eq 443
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 21
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 25
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 588
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 110
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 80
static (inside,outside) tcp x.x.x.177 80 192.168.5.177 80 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.177 443 192.168.5.177 443 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 21 192.168.5.164 21 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 25 192.168.5.164 25 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 588 192.168.5.164 588 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 110 192.168.5.164 110 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 80 192.168.5.164 80 netmask 255.255.255.255
access-group outside_access_in in interface outside
I've only ever gotten the device to successfully pass RDP traffic (which isn't in the commands). Ugh, any ideas?
These are the commands I'm using (yes, the x's are public IPs):
access-list outside_access_in extended permit tcp any x.x.x.177 255.255.255.255 eq 80
access-list outside_access_in extended permit tcp any x.x.x.177 255.255.255.255 eq 443
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 21
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 25
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 588
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 110
access-list outside_access_in extended permit tcp any x.x.x.164 255.255.255.255 eq 80
static (inside,outside) tcp x.x.x.177 80 192.168.5.177 80 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.177 443 192.168.5.177 443 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 21 192.168.5.164 21 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 25 192.168.5.164 25 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 588 192.168.5.164 588 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 110 192.168.5.164 110 netmask 255.255.255.255
static (inside,outside) tcp x.x.x.164 80 192.168.5.164 80 netmask 255.255.255.255
access-group outside_access_in in interface outside
I've only ever gotten the device to successfully pass RDP traffic (which isn't in the commands). Ugh, any ideas?