<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Network under a Network, ACL/NAT on Firewall or Switch? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/network-under-a-network-acl-nat-on-firewall-or-switch/m-p/5276221#M1120336</link>
    <description>&lt;P&gt;Hey I was messing around with esxi and from FPR1010 I have a connection to an SG350XG.. On the SG I have a Network 192.168.4.0/24. That Network is connected to esxi vswitch. On there I have VM and another vswitch with 10.0.2.0/24 Network. Now, 10.0.2.0 has Internet access and all is fine but how would INCOMING ACL/NAT work? I know normal I'd NAT/ACL for the 192.168.4.x Network/Host, but what if there is another Network under that? Would I NAT/ACL to the inner host and it knows where to find it, or do I create another ACL on the switch for its subordinates? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 28 Mar 2025 19:31:07 GMT</pubDate>
    <dc:creator>TheGoob</dc:creator>
    <dc:date>2025-03-28T19:31:07Z</dc:date>
    <item>
      <title>Network under a Network, ACL/NAT on Firewall or Switch?</title>
      <link>https://community.cisco.com/t5/network-security/network-under-a-network-acl-nat-on-firewall-or-switch/m-p/5276221#M1120336</link>
      <description>&lt;P&gt;Hey I was messing around with esxi and from FPR1010 I have a connection to an SG350XG.. On the SG I have a Network 192.168.4.0/24. That Network is connected to esxi vswitch. On there I have VM and another vswitch with 10.0.2.0/24 Network. Now, 10.0.2.0 has Internet access and all is fine but how would INCOMING ACL/NAT work? I know normal I'd NAT/ACL for the 192.168.4.x Network/Host, but what if there is another Network under that? Would I NAT/ACL to the inner host and it knows where to find it, or do I create another ACL on the switch for its subordinates? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Mar 2025 19:31:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-under-a-network-acl-nat-on-firewall-or-switch/m-p/5276221#M1120336</guid>
      <dc:creator>TheGoob</dc:creator>
      <dc:date>2025-03-28T19:31:07Z</dc:date>
    </item>
    <item>
      <title>Re: Network under a Network, ACL/NAT on Firewall or Switch?</title>
      <link>https://community.cisco.com/t5/network-security/network-under-a-network-acl-nat-on-firewall-or-switch/m-p/5279366#M1120518</link>
      <description>&lt;P&gt;It really depends on your setup. E.g., will your 1010 act as a firewall-on-a-stick with VLANs/sub-interfaces to route the traffic. Or will your SG be a L3 hop with static/dynamic routes to the 1010. A small diagram / sketch of your setup will help here.&lt;/P&gt;
&lt;DIV id="bodyDisplay_3" class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;
&lt;DIV class="lia-message-body-content"&gt;
&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Tue, 08 Apr 2025 14:54:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/network-under-a-network-acl-nat-on-firewall-or-switch/m-p/5279366#M1120518</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2025-04-08T14:54:03Z</dc:date>
    </item>
  </channel>
</rss>

