cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
714
Views
0
Helpful
6
Replies

Access FTP Sever in inside interface with Public IP

manuadoor
Level 1
Level 1

Hi,

I have a ftp server in my inside zone of ASA, One of my application team needed to access that ftp server in the inside interface with the Public IP. If they were using a url for that I could have used "dns doctoring". I tried with the following NAT

static (inside, inside) <localip> <publicip>

but ASA thinking that it is an attack

Note: Both Client and FTP server are in the same network hence the zone which is inside.

1 Accepted Solution

Accepted Solutions

Correct, if you already have NAT statement on that interface, then you would need the global (inside) command. Otherwise, if there is no NAT statement at all on that interface, you can disable nat-control, and the connection would work.

Also, if you have ACL assigned to the inside interface, you would need to allow the traffic:

access-list permit tcp host eq 21

View solution in original post

6 Replies 6

Jennifer Halim
Cisco Employee
Cisco Employee

It should be as follows:

static (inside, inside) netmask 255.255.255.255

global (inside) 1 interface

same-security-traffic permit intra-interface

halijenn,

Nat syntax is ilike

nat (real int, mapped int) mapped ip  real ip netmask ??/

in my case I want to replace my public ip with my local ip, what is the logic behind  static (inside, inside) netmask  255.255.255.255


Also pls let me know why we require the following??

global (inside) 1 interface

This is just to clear my understanding!!!

For normal static (inside,outside) statement, you would configure the following: static (inside,outside) , so the concept is the same for static (inside,inside).

You are trying to reach the public ip, so the first ip address in the static statement should be the public-ip, and the second ip is the local-ip.

The reason why you need "global (inside) 1 interface" is you still need translation for the source address which is your internal host. The static statement above is for destination translation.

The first part is clear now ,,

Since the host and the server is in the same zone (inside), why we need source translaion??? You meant for nat-control??

Correct, if you already have NAT statement on that interface, then you would need the global (inside) command. Otherwise, if there is no NAT statement at all on that interface, you can disable nat-control, and the connection would work.

Also, if you have ACL assigned to the inside interface, you would need to allow the traffic:

access-list permit tcp host eq 21

Thanks a lot.. Let me try now!!!

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: