I am having some problems trying to set up a simple one-to-one NAT between a public IP and a DMZ server. I've spent a number of hours staring at this problem and I'm hoping one of you can spot whatever I have missed.
The ASA has 4 interfaces. Inside, Outside, DMZ and Guest. NAT wont work with the Outside interface for some reason. When choosing (DMZ, Inside) it works perfectly fine.
The inside host is running static IP 192.168.50.200 with subnet 255.255.255.0 and gateway 192.168.50.1.
The one im having problems with is has the object name of DMZ_Test
I've looked into the issue some more during the weekend. The config seems to be correct, the real problem is when I try to do changes in an existing NAT, or use public IPs that has previosly been natted.
I redid the NAT using another public IP that has never been natted before and that worked with the same host and internal IP, but now I cant use the 220.127.116.11 on a new NAT.
It's almost like the external IPs gets locked up somehow and are unusable even after the original NAT is removed.
Another funny thing is that packet-trace doesnt produce any errors, even though the NAT isnt working properly.
So I'm not sure what the real problem is, if this is a bug in the OS or if theres a need to somehow clear the config even though the NATs are removed.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :