<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to bypass nat on lan in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816532#M1007679</link>
    <description>&lt;P&gt;I have a pix 515 running version 634 with four interfaces, for example, outside, inside, dmz and lab. I need to be able to connect to devices that is located on both the dmz and lab from inside. I also need to connect to devices that is located on the dmz from  lab. The lab has a higher security than the dmz. I am also using remote access vpn. I would really appreciate if someone can help me with this as i have been working on it for a few days now.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:58:29 GMT</pubDate>
    <dc:creator>Lharrypersaud</dc:creator>
    <dc:date>2019-03-11T09:58:29Z</dc:date>
    <item>
      <title>How to bypass nat on lan</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816532#M1007679</link>
      <description>&lt;P&gt;I have a pix 515 running version 634 with four interfaces, for example, outside, inside, dmz and lab. I need to be able to connect to devices that is located on both the dmz and lab from inside. I also need to connect to devices that is located on the dmz from  lab. The lab has a higher security than the dmz. I am also using remote access vpn. I would really appreciate if someone can help me with this as i have been working on it for a few days now.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816532#M1007679</guid>
      <dc:creator>Lharrypersaud</dc:creator>
      <dc:date>2019-03-11T09:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: How to bypass nat on lan</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816533#M1007708</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;example for single host:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.1 10.1.1.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;example for subnet:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.0 10.1.1.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will also need to use nat zero:&lt;/P&gt;&lt;P&gt;access-list acl_name permit ip 192.168.1.0 255.255.255.0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list acl_name&lt;/P&gt;&lt;P&gt;acl_name defines source/destination ip pairs that you don't want nat'ed.  so this acl would read -  when a host on subnet 192.168.1.0/24 attempts to contact a host on 10.1.1.0 subnet, do not NAT the 192.168.1.x address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2007 19:27:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816533#M1007708</guid>
      <dc:creator>srue</dc:creator>
      <dc:date>2007-04-10T19:27:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to bypass nat on lan</title>
      <link>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816534#M1007710</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will try that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2007 19:29:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-to-bypass-nat-on-lan/m-p/816534#M1007710</guid>
      <dc:creator>Lharrypersaud</dc:creator>
      <dc:date>2007-04-10T19:29:51Z</dc:date>
    </item>
  </channel>
</rss>

