Solved

Overwrite/Delete Existing Static NAT Entry

Posted on 2013-05-31
4
1,018 Views
Last Modified: 2013-06-06
I have an old webserver (w2) that is being replaced by a group of webservers (w3, w4, w7, w8).

On my ASA the External Web Address for website "A" is mapped to the old web server.  
Ex:
static (dmz, outside) 67.x.x.x 10.x.x.x netmask 255.255.255.255

I need to change the internal address (in bold) to the new web server 10.y.y.y.

When I enter the changes into the ASA, of course, it returns an
Error-Mapped Address Conflict With Existing Static

As these sites are moved to the new servers (a gradual process) I'll need to continue to update these entries.  

How do I do this?

Thank you!
0
Comment
Question by:CJones46
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 

Expert Comment

by:TFortson514
ID: 39211919
What version of code are you running on your ASA?
0
 
LVL 26

Accepted Solution

by:
pony10us earned 500 total points
ID: 39211945
Remove the 10.x.x.x first:

no static (dmz, outside) 67.x.x.x 10.x.x.x netmask 255.255.255.255
static (dmz, outside) 67.x.x.x 10.y.y.y netmask 255.255.255.255
0
 
LVL 46

Expert Comment

by:Craig Beck
ID: 39212711
...or log in to the ASA using ASDM and just edit the NAT rule.

You'll also need to edit the associated Access Rule to allow the traffic through the firewall, but I'm sure no-one else forgot that ;-)
0
 

Author Closing Comment

by:CJones46
ID: 39225275
Easy as pie.  Thanks!!
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In the world of WAN, QoS is a pretty important topic for most, if not all, networks. Some WAN technologies have QoS mechanisms built in, but others, such as some L2 WAN's, don't have QoS control in the provider cloud.
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question