<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allowing Traffic through ASA without NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256667#M1119330</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt; this is different to what was described in your initial post.&lt;/P&gt;
&lt;P&gt;Is this a production firewall that is already in use? Or a new implementation?&lt;/P&gt;
&lt;P&gt;Please provide your configuration.&lt;/P&gt;</description>
    <pubDate>Tue, 04 Feb 2025 18:05:51 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2025-02-04T18:05:51Z</dc:date>
    <item>
      <title>Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256606#M1119321</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-02-04 102246.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/239083iA8E04FDB4C6DBE3F/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-02-04 102246.png" alt="Screenshot 2025-02-04 102246.png" /&gt;&lt;/span&gt;Hi!&lt;/P&gt;&lt;P&gt;I have around 20 local networks. Im posting a basic topology with only 4 networks. Each server represents a network.&lt;BR /&gt;Everything internally is working fine. Nothing will be going out to the internet. This is all within house. Now there is a&lt;BR /&gt;client that needs to access these networks. We only want to allow certain network "10.0.0.0" on the client side to access internal networks.&lt;BR /&gt;So we added a firewall between the client and our network. We as well will need to access networks on the client end.&lt;/P&gt;&lt;P&gt;Question is do I need NAT for this? And how do I configure the ASA to allow Outbound traffic into our networks?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 15:36:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256606#M1119321</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T15:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256610#M1119322</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt; no you don't need NAT assuming each network can route to each other (either statics or routing). If there are no other NAT rules on the ASA then you don't need to configure anything, traffic would just be routed. However if you do have other NAT rules, you may need to configure a NAT exemption rule, to ensure this traffic is not unintentially translated.&lt;/P&gt;
&lt;P&gt;You would need to configure ACL inbound on the outside interface to communicates with the internal networks.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 15:43:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256610#M1119322</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-04T15:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256647#M1119324</link>
      <description>&lt;P&gt;I put:&lt;/P&gt;&lt;P&gt;access-list OUT-IN extended permit ip 10.0.0.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;int g0/0 (outside int)&lt;/P&gt;&lt;P&gt;access-group OUT-IN in interface outside&lt;/P&gt;&lt;P&gt;Cannot ping.&amp;nbsp;&lt;/P&gt;&lt;P&gt;i am inspecting icmp&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256647#M1119324</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T17:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256651#M1119325</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt; run packet-tracer and provide the output, example:-&lt;/P&gt;
&lt;P&gt;"packet-tracer input outside tcp 10.0.0.10 3000 10.1.1.11 80"&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:30:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256651#M1119325</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-04T17:30:13Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256661#M1119326</link>
      <description>&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.0.0.2 using egress ifc &amp;nbsp;inside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: EXTERNAL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:48:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256661#M1119326</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T17:48:11Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256663#M1119327</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt; re-run the packet-tracer but append "detailed" at the end and provide the full output (including the command you run) - ensure you don't use an IP address of the ASA itself, it can be any IP.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:52:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256663#M1119327</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-04T17:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256664#M1119328</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;You'll need to create an ACL&lt;BR /&gt;#access-list OUTBOUND_ACL extended permit ip 10.0.0.0 255.255.255.0 192.168.0.0 255.255.0.0 (you can edit subnet for your case)&lt;/P&gt;
&lt;P&gt;Apply ACL to the ASA Interface&lt;BR /&gt;#access-group OUTBOUND_ACL in interface outside&lt;/P&gt;
&lt;P&gt;Configure Routing&lt;BR /&gt;#route inside 192.168.0.0 255.255.0.0 &amp;lt;next-hop-IP&amp;gt; / You can edit IP's&lt;/P&gt;
&lt;P&gt;Allow Traffic from Internal Networks to Client&lt;BR /&gt;#access-list INBOUND_ACL extended permit ip 192.168.0.0 255.255.0.0 10.0.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;#access-group INBOUND_ACL in interface inside&lt;BR /&gt;&lt;BR /&gt;Thanks !&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 17:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256664#M1119328</guid>
      <dc:creator>Joshqun Ismayilov</dc:creator>
      <dc:date>2025-02-04T17:58:51Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256665#M1119329</link>
      <description>&lt;P&gt;packet-tracer input EXTERNAL tcp 100.1.1.1 30000 151.11.201.1 80 detail&lt;/P&gt;&lt;P&gt;100.1.1.1 is the external client router. 151.11.201.1 is any random IP. EXTERNAL is the nameif of the interface connected to the external client. I never used packet-tracer before so i apologize.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fef8f6304b0, priority=1, domain=permit, deny=false&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=48, user_data=0x0, cs_id=0x0, l3_type=0x8&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src mac=0000.0000.0000, mask=0000.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst mac=0000.0000.0000, mask=0100.0000.0000&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=EXTERNAL, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 172.0.0.2 using egress ifc &amp;nbsp;inside&lt;BR /&gt;&lt;BR /&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;&amp;nbsp;Forward Flow based lookup yields rule:&lt;BR /&gt;&amp;nbsp;in &amp;nbsp;id=0x7fef8ec60ea0, priority=501, domain=permit, deny=true&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; hits=2, user_data=0x7, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; src ip/id=100.1.1.1, mask=255.255.255.255, port=0, tag=any&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; input_ifc=EXTERNAL, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Result:&lt;BR /&gt;input-interface: EXTERNAL&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: inside&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256665#M1119329</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T18:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256667#M1119330</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt; this is different to what was described in your initial post.&lt;/P&gt;
&lt;P&gt;Is this a production firewall that is already in use? Or a new implementation?&lt;/P&gt;
&lt;P&gt;Please provide your configuration.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:05:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256667#M1119330</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-02-04T18:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256675#M1119331</link>
      <description>&lt;P&gt;That worked like a charm! thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:18:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256675#M1119331</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T18:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256679#M1119332</link>
      <description>&lt;P&gt;Rob thank you so much for your help. I got it working now. My access lists were wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:18:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256679#M1119332</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T18:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256695#M1119333</link>
      <description>&lt;P&gt;so the amount of acl's id have to do is alot. I was thinking can i NAT the outside int from the ASA and allow only 10.0.0.0 to access my internal networks?&lt;/P&gt;&lt;P&gt;I did:&lt;/P&gt;&lt;P&gt;object network EXTERNAL&lt;/P&gt;&lt;P&gt;subnet 10.0.0.0 255.255.255.252&lt;/P&gt;&lt;P&gt;object network INSIDE&lt;/P&gt;&lt;P&gt;192.168.0.0 255.255.255.252&lt;/P&gt;&lt;P&gt;nat(EXTERNAL,INSIDE) source static EXTERNAL INSIDE&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but not working&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:41:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256695#M1119333</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T18:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256699#M1119335</link>
      <description>&lt;P&gt;You're trying to translate an entire external subnet to an internal subnet, which doesn't make sense.&lt;/P&gt;
&lt;P&gt;Try this one /&lt;/P&gt;
&lt;P&gt;#object network EXTERNAL&lt;BR /&gt;subnet 10.0.0.0 255.255.255.252&lt;/P&gt;
&lt;P&gt;#object network INSIDE&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;#nat (EXTERNAL,INSIDE) source static EXTERNAL EXTERNAL destination static INSIDE INSIDE&lt;/P&gt;
&lt;P&gt;#access-list OUTSIDE_TO_INSIDE extended permit ip 10.0.0.0 255.255.255.252 192.168.0.0 255.255.255.0&lt;BR /&gt;#access-group OUTSIDE_TO_INSIDE in interface EXTERNAL&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 18:54:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256699#M1119335</guid>
      <dc:creator>Joshqun Ismayilov</dc:creator>
      <dc:date>2025-02-04T18:54:23Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256713#M1119336</link>
      <description>&lt;P&gt;Try your config and didnt work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 19:39:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256713#M1119336</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T19:39:47Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256716#M1119337</link>
      <description>&lt;P&gt;Im using a loopback interface from the external client trying to ping my inside networks. On wireshark the loopback address doesnt change to my inside address.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 19:48:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256716#M1119337</guid>
      <dc:creator>mcast999</dc:creator>
      <dc:date>2025-02-04T19:48:51Z</dc:date>
    </item>
    <item>
      <title>Re: Allowing Traffic through ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256989#M1119342</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1839762"&gt;@mcast999&lt;/a&gt;&amp;nbsp; as&amp;nbsp;loopback interfaces typically do not generate NAT traffic as they are not considered "routed" interfaces in many cases&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;object network EXTERNAL&lt;BR /&gt;subnet 10.0.0.0 255.255.255.252&lt;/P&gt;
&lt;P&gt;object network INSIDE&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object network NAT_INSIDE&lt;BR /&gt;subnet 192.168.0.0 255.255.255.0&lt;/P&gt;
&lt;P&gt;object network NAT_EXTERNAL&lt;BR /&gt;subnet 10.0.0.0 255.255.255.252&lt;/P&gt;
&lt;P&gt;nat (EXTERNAL,INSIDE) source dynamic NAT_EXTERNAL interface destination static NAT_INSIDE NAT_INSIDE&lt;BR /&gt;&lt;BR /&gt;access-list OUTSIDE_TO_INSIDE extended permit ip 10.0.0.0 255.255.255.252 192.168.0.0 255.255.255.0&lt;BR /&gt;access-group OUTSIDE_TO_INSIDE in interface EXTERNAL&lt;BR /&gt;&lt;BR /&gt;Try this one also please share&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;show xlate | include 10.0.0.&lt;BR /&gt;&lt;BR /&gt;Thanks !&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 04:14:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allowing-traffic-through-asa-without-nat/m-p/5256989#M1119342</guid>
      <dc:creator>Joshqun Ismayilov</dc:creator>
      <dc:date>2025-02-05T04:14:26Z</dc:date>
    </item>
  </channel>
</rss>

