<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT or NO NAT? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730796#M1095539</link>
    <description>&lt;P&gt;You need to built your ACL top-down - to allow what you need on top, and to deny everything else. By looking at your ACL, I see that you've restricted traffic from zones (e.g. inside to inside) so please bare in mind that there is a logical AND condition between statements (if src_zone=inside AND dst_zone=inside AND ...). Most likely, your other traffic is not being permitted by anything before, thus falling to default Block_ALL rule.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
    <pubDate>Thu, 01 Dec 2022 08:31:57 GMT</pubDate>
    <dc:creator>Milos_Jovanovic</dc:creator>
    <dc:date>2022-12-01T08:31:57Z</dc:date>
    <item>
      <title>NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730532#M1095518</link>
      <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I am at my wits end. I have an FPR1010 w/ 8 STATIC IP’s (6 usable).&lt;/P&gt;&lt;P&gt;My WAN FPR IP is x.x.x.182.&lt;/P&gt;&lt;P&gt;I have available, .177 to .181. I am using x.x.x.177 as an IP dedicated to a server on LAN 192.268.5.42.&lt;/P&gt;&lt;P&gt;Without NAT, NOTHING gets through and no data transmitted, to be expected.&amp;nbsp;&lt;BR /&gt;WITH NAT, and with my ACL’s, I can connect to those ACL’s as well as, well, um everything?&amp;nbsp;&lt;BR /&gt;So I played a little game. I kept my NAT on (and this occurs as auto NAT and manual NAT) but removed EVERY ACL pertaining to my x.x.x.177 and 192.168.5.42 and with NO ACL’s I still got in?!?! Is this because NAT, auto or manual, bypasses ACL’s? Is this a glitch or am I missing something. How am I connecting to everything with NO ACL? &amp;nbsp;So to bypass my little issue I have STATIC NAT WAN .177 to LAN 192.168.5.42 ( ANY and ANY on ports) and the. At the software level on my server I am using iptables. This seems, not so secure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 18:33:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730532#M1095518</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T18:33:40Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730539#M1095519</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331626"&gt;@TheGoob&lt;/a&gt; can you please provide a screenshot of your NAT and ACL (ACP) configuration please.&lt;/P&gt;
&lt;P&gt;What OS are you running on your FPR1010, FTD or ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 18:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730539#M1095519</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-30T18:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730540#M1095520</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331626"&gt;@TheGoob&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;There are 2 things to consider when deploying public services (of course, there are much more, but I'm simplifying) - one is NAT, and secodn one is ACL. NAT is simply stating if device is reachable over Internet or not, while ACL is the one defining which services will be accessible, and everything else should be blocked.&lt;/P&gt;
&lt;P&gt;This is almost true, unless you haven't configured any ACLs on your FW. In that case, security level&amp;nbsp; gets in effect - it is always allowed to access security zone with lower level, if reaching it from a zone with higher security level. If you have defined your server zone with e.g. 20, while WAN zone with 30, it will always be possible to reach everything in server zone from WAN zone.&lt;/P&gt;
&lt;P&gt;You should check your zone levels with "show nameif", and your ACL assignments with "show run access-group", to confirm that proper configuration is in place.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 18:48:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730540#M1095520</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-30T18:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730548#M1095523</link>
      <description>&lt;P&gt;First, I am running the FTD and will show screenshot in a minute but to the 2nd poster... PLEASE don't tell me I am an idiot and this is telling me what I think it is telling me; that all my levels are 0.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show nameif&lt;BR /&gt;Interface&amp;nbsp; &amp;nbsp; &amp;nbsp;Name&amp;nbsp; &amp;nbsp; &amp;nbsp;Security&lt;BR /&gt;Ethernet1/1&amp;nbsp; &amp;nbsp; &amp;nbsp;outside&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/2&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_2&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/3&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_3&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/4&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_4&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/5&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_5&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/6&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_6&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/7&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_7&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Ethernet1/8&amp;nbsp; &amp;nbsp; &amp;nbsp;inside_8&amp;nbsp; &amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Management1/1&amp;nbsp; &amp;nbsp; &amp;nbsp;diagnostic&amp;nbsp; &amp;nbsp; 0&lt;BR /&gt;BVI1 inside 0&lt;/P&gt;&lt;P&gt;and ;&lt;/P&gt;&lt;P&gt;&amp;gt; show running-config access-group&lt;BR /&gt;access-group NGFW_ONBOX_ACL global&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 19:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730548#M1095523</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T19:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730558#M1095528</link>
      <description>&lt;P&gt;Hopefully these are viewable...On THIS, as seen in the ACL only SSH is open, and yet I can connect to &lt;A href="http://x.x.x.181:80" target="_blank"&gt;http://x.x.x.181:80&lt;/A&gt;&amp;nbsp;and it loads. IP's are different than original post as I have THAT one disabled, but this does the same thing; lets every port in.&lt;/P&gt;&lt;P&gt;My NAT is literally inside 192.168.5.43 to outside x.x.x.181&lt;/P&gt;&lt;P&gt;My ACL is only allowing in SSH Port 177 from outside (x.x.x.181) to inside (192.168.5.43)&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 19:33:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730558#M1095528</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T19:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730559#M1095529</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331626"&gt;@TheGoob&lt;/a&gt; remove the source ports on your Access Control rules, the source port would be dynamic - so the leave the source ports as "any"&lt;/P&gt;
&lt;P&gt;FYI, you've a default allow rule....so that would explain why you can connect with no explicit allow rules. Change the deafult rule to deny and create more explict rules to permit the traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 19:38:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730559#M1095529</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-11-30T19:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730561#M1095530</link>
      <description>&lt;P&gt;You are running FTD, and principles over there are bit different &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I assumed it was ASA, thus my explanation from before.&lt;/P&gt;
&lt;P&gt;All zones have same security level, and only one ACL (global one) is applied to all zones.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt; alredy replied what is going on.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 19:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730561#M1095530</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-11-30T19:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730563#M1095531</link>
      <description>&lt;P&gt;I mean, how funny. I see it everyday and notice it but until you mention it, it seems obvious and ridiculous that I left it "allow" as a default rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In regards to ACL's; Would all and any ACL source port be left blank? What conditions would it be inputted? For Port forwarding?&lt;/P&gt;&lt;P&gt;I will get back momentarily with results. Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 19:44:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730563#M1095531</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T19:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730567#M1095532</link>
      <description>&lt;P&gt;Well at this stage I will definitely say it is something I am doing wrong. I did indeed change default rule to BLOCK and then removed Source Port and it definitely stopped anything from getting into the server but now I can not SSH in.&amp;nbsp; Does NAT placement as well as auto/manual possibly have a hand in this? If I am doing direct nat from a WAN IP to a LAN IP would that be manual, above inside_2, as I have it?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 20:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730567#M1095532</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T20:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730611#M1095533</link>
      <description>&lt;P&gt;I don't know why but I feel that, in my situation, BLOCK default rule is overruling everything!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Nov 2022 22:14:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730611#M1095533</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-11-30T22:14:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730796#M1095539</link>
      <description>&lt;P&gt;You need to built your ACL top-down - to allow what you need on top, and to deny everything else. By looking at your ACL, I see that you've restricted traffic from zones (e.g. inside to inside) so please bare in mind that there is a logical AND condition between statements (if src_zone=inside AND dst_zone=inside AND ...). Most likely, your other traffic is not being permitted by anything before, thus falling to default Block_ALL rule.&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 08:31:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730796#M1095539</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-01T08:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730953#M1095546</link>
      <description>&lt;P&gt;The “TRUST” ACL’s inside to inside and inside to outside are what is blocking my traffic?&lt;/P&gt;&lt;P&gt;as you mention; (non verbatim)&lt;/P&gt;&lt;P&gt;inside to inside trust&lt;/P&gt;&lt;P&gt;inside to outside trust&lt;/P&gt;&lt;P&gt;incoming mail allow&lt;/P&gt;&lt;P&gt;incoming ssh allow&lt;/P&gt;&lt;P&gt;incoming ssh allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;block all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is causing everything to be blocked because of placement?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 13:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4730953#M1095546</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-12-01T13:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731085#M1095568</link>
      <description>&lt;P&gt;Alright, got it to work as we intended. Earlier this morning after changing what we talked about I ignorantly did LAN to LAN, not WAN to LAN ACL. Anyway, it seems to be working. IO am now going to implement the other servers and what not and verify works before "solved". But this is awesome, thank you.&lt;/P&gt;&lt;P&gt;Regardless of that, and I did this after I verified your way worked, I reinstated the SOURCE Port, and it stopped working. How would a set source to a set destination port not work? I understand Port Forwarding source 88 to destination 22, would a source port be used in that scenario? Just weird source and destination causing it to not work. Regardless, I have source port to any and it works.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 17:08:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731085#M1095568</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-12-01T17:08:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731096#M1095569</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1331626"&gt;@TheGoob&lt;/a&gt; because the source port is dynamic you would write an inbound rule with just the required destination port (and host IP), the source port would be left as "any".&lt;/P&gt;
&lt;P&gt;You can verify this from the CLI using system "support firewall-engine-debug" set a filter on the destination IP or source IP, generate traffic and watch the connections, you can confirm the source ports.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 17:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731096#M1095569</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2022-12-01T17:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: NAT or NO NAT?</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731106#M1095570</link>
      <description>&lt;P&gt;Fair enough. Awesome guys, thank you!&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2022 17:46:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-no-nat/m-p/4731106#M1095570</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2022-12-01T17:46:38Z</dc:date>
    </item>
  </channel>
</rss>

