<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT Configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388473#M1080080</link>
    <description>&lt;P&gt;Ok so this is one of those where I had to put it on paper to understand it myself.&amp;nbsp; I think I've figured this out (Duh!!).&amp;nbsp; Packet comes into ASA, ASA performs a route lookup, and then forwards it out the DMZ interface.&amp;nbsp; No NAT needed.&amp;nbsp; NAT (dynamic PAT) is needed between inside and outside so the internal hosts can use the single IP address of the OUTSIDE interface!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah!!!....its one of those days and I'm only on my second cup of coffee.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 16 Apr 2021 15:34:30 GMT</pubDate>
    <dc:creator>Ricky Sandhu</dc:creator>
    <dc:date>2021-04-16T15:34:30Z</dc:date>
    <item>
      <title>ASA NAT Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388467#M1080079</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp; I have an ASA 5525x with PC-A on the INSIDE network with IP address 10.20.32.40.&amp;nbsp; PC-B is in DMZ with an IP address of 10.20.30.10.&amp;nbsp; The security level for INSIDE is 100 and DMZ is 50. I have rules to allow PC-A to communicate with PC-B over TCP3389. I don't have any NAT configurations specified (at the moment) for translating packets from INSIDE to DMZ. When I run Wireshark capture on PC-B, I can see the IP address of PC-A communicating with it.&amp;nbsp; My question, how is this possible when I don't have NAT configured between the two networks. My understanding of the way ASAs work, you must have NAT configured between two separate networks in order for the traffic to flow, for example from Inside to Outside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="asa.jpg" style="width: 678px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/118262i2377E6B82243809E/image-size/large?v=v2&amp;amp;px=999" role="button" title="asa.jpg" alt="asa.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:30:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388467#M1080079</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-04-16T15:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388473#M1080080</link>
      <description>&lt;P&gt;Ok so this is one of those where I had to put it on paper to understand it myself.&amp;nbsp; I think I've figured this out (Duh!!).&amp;nbsp; Packet comes into ASA, ASA performs a route lookup, and then forwards it out the DMZ interface.&amp;nbsp; No NAT needed.&amp;nbsp; NAT (dynamic PAT) is needed between inside and outside so the internal hosts can use the single IP address of the OUTSIDE interface!&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah!!!....its one of those days and I'm only on my second cup of coffee.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:34:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388473#M1080080</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-04-16T15:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388476#M1080081</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/149208"&gt;@Ricky Sandhu&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't need NAT, without a matching nat rule, traffic would be routed.&lt;/P&gt;
&lt;P&gt;You'd normally need nat for outbound internet access, translating the private IP address to the public (routeable) IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:36:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388476#M1080081</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2021-04-16T15:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388487#M1080082</link>
      <description>&lt;P&gt;Thank you for confirming.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:46:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388487#M1080082</guid>
      <dc:creator>Ricky Sandhu</dc:creator>
      <dc:date>2021-04-16T15:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Configuration</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388490#M1080083</link>
      <description>In order to have access from lower security level ( DMZ 50 ) to higher&lt;BR /&gt;security level ( INSIDE 100 ) you should configure ACL rule and allow TCP&lt;BR /&gt;338 source PC B to destination PC A. NAT has nothing to do in this&lt;BR /&gt;scenario. the rules you have configure form INSIDE to DMZ are no longer&lt;BR /&gt;needed since ASA is stateful firewall and keep the connection table for all&lt;BR /&gt;traffic coming from Higher security level and allow the return traffic&lt;BR /&gt;then.&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Apr 2021 15:48:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-configuration/m-p/4388490#M1080083</guid>
      <dc:creator>Mike_83</dc:creator>
      <dc:date>2021-04-16T15:48:08Z</dc:date>
    </item>
  </channel>
</rss>

