<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FTD NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164569#M1074593</link>
    <description>&lt;P&gt;It all depends on the requirement. If you have a Public IP address (i would prefer to do that, rather interface).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only case was used Interface, where do not have More Public IP addresses or getting DHCP Public IP to address from the provider.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 10 Oct 2020 13:25:11 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2020-10-10T13:25:11Z</dc:date>
    <item>
      <title>FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164560#M1074592</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Can anyone explain the pro's and cons of configuring NAT on the interface or using a dedicated Public IP to Nat traffic to on an FTD or ASA etc, ????????&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 12:42:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164560#M1074592</guid>
      <dc:creator>benolyndav</dc:creator>
      <dc:date>2020-10-10T12:42:56Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164569#M1074593</link>
      <description>&lt;P&gt;It all depends on the requirement. If you have a Public IP address (i would prefer to do that, rather interface).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The only case was used Interface, where do not have More Public IP addresses or getting DHCP Public IP to address from the provider.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 13:25:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164569#M1074593</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2020-10-10T13:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164806#M1074607</link>
      <description>&lt;P&gt;If you don't have spare public IP addresses, the only option you would have is to PAT the traffic to the outside interface. However, if you have spare public IP addresses then a couple of things to keep in mind would be:&lt;/P&gt;&lt;P&gt;- Use a dedicated public IP for guest traffic. Guest traffic might pose security risks that would end up in blacklisting your public IP, so you don't want that to happen to the primary IP address assigned to the outside interface&lt;/P&gt;&lt;P&gt;- Use a dedicated public IP for the applications that would be subject to some restrictions based on the source public IP. Although you can still PAT to the outside interface, but I think best practice to dedicate one for those applications&lt;/P&gt;&lt;P&gt;- Use a dedicated public IP for any service that you would expose externally, an example would be a web server in the DMZ&lt;/P&gt;</description>
      <pubDate>Sun, 11 Oct 2020 18:19:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4164806#M1074607</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2020-10-11T18:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: FTD NAT</title>
      <link>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4165019#M1074618</link>
      <description>&lt;P&gt;This all boils down to how many public IPs, if any, you have access to for internal use.&amp;nbsp; It is always an advantage to have more public IPs as you can allocate a separate public IP to different services.&amp;nbsp; However, as mentioned by Aref, if you do not have any spare public IPs or your budget doesn't allow for it, then you don't have any other choice than to use the interface IP.&amp;nbsp; There is nothing wrong with doing this, but you will be limited in what ports you will be able to access your internal services on from the internet since you cannot have the same NATed port for two services.&amp;nbsp; For example, if you have two separate web servers, you will not be able to access both servers using port TCP/80.&amp;nbsp; You would need to access one on TCP/80 and another on TCP/8080 (for example.)&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 09:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ftd-nat/m-p/4165019#M1074618</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-10-12T09:15:54Z</dc:date>
    </item>
  </channel>
</rss>

