<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA - NAT question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329786#M1122690</link>
    <description>&lt;P&gt;NO advantage&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both same&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Static NAT is bidirectional' so it work from (DMZ to outside) or from (Outside to DMZ).&lt;/P&gt;
&lt;P&gt;I prefer using DMZ to outside' because it easy for troubleshooting.&lt;/P&gt;
&lt;P&gt;And again you can use any of it.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2025 18:40:53 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2025-09-12T18:40:53Z</dc:date>
    <item>
      <title>ASA - NAT question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329785#M1122689</link>
      <description>&lt;P&gt;Hello ,&lt;/P&gt;
&lt;P&gt;a doubt about Manual NAT, if I have to configure static PAT, so I allow connection into my web server on dmz from outside for example.&lt;/P&gt;
&lt;P&gt;I would have configured this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (dmz,outside) source static PRIV-IP PUB-IP service TCP443 TCP443&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;but In one ASA that I now have to manage, I found this:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;nat (outside,dmz) source static any any destination static PUB-IP PRIV-IP service TCP443 TCP443&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Both are ok? Any disadvange from one to another?&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 18:35:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329785#M1122689</guid>
      <dc:creator>babalao</dc:creator>
      <dc:date>2025-09-12T18:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329786#M1122690</link>
      <description>&lt;P&gt;NO advantage&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both same&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Static NAT is bidirectional' so it work from (DMZ to outside) or from (Outside to DMZ).&lt;/P&gt;
&lt;P&gt;I prefer using DMZ to outside' because it easy for troubleshooting.&lt;/P&gt;
&lt;P&gt;And again you can use any of it.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 18:40:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329786#M1122690</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-12T18:40:53Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329788#M1122691</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115904-asa-config-dmz-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check cisco recommends&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 18:51:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329788#M1122691</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-09-12T18:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329845#M1122696</link>
      <description>&lt;LI-CODE lang="markup"&gt;nat (dmz,outside) source static PRIV-IP PUB-IP service TCP443 TCP443&lt;/LI-CODE&gt;
&lt;P&gt;this should be good enough along if you have dedicated IP with ACL policies to allow traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Sep 2025 10:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329845#M1122696</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2025-09-13T10:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA - NAT question</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329971#M1122700</link>
      <description>&lt;P&gt;Although both are ok, the first PAT rule is more common. The use case of the second PAT rule would be when you want a host on the outside to be translated to something belonging to the DMZ segment. For instance, let's say you want the traffic coming from outside host 1.1.1.1 destined to DMZ host 172.16.0.1 on port 443/tcp to appear as if it's coming from 172.16.0.20, then in that case you use the second PAT rule. We call that outside NAT. In that case the rule would look similar to this:&lt;/P&gt;
&lt;P&gt;object network PUB-1.1.1.1&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 1.1.1.1&lt;BR /&gt;object network PRIV-1.1.1.1&lt;BR /&gt;&amp;nbsp; &amp;nbsp;host 172.16.0.20&lt;/P&gt;
&lt;P&gt;nat (outside,dmz) source static PUB-1.1.1.1 PRIV-1.1.1.1 destination static PUB-IP PRIV-IP service TCP443 TCP443&lt;/P&gt;
&lt;P&gt;In terms of pros and cons, I would say the only con I can see with the second PAT rule is that the firewall would be using more resources to evaluate something that will never be translated which is the source any any of the hosts on the outside, so there is no point to configure the rule in that way in the first place and it's better to stick with the common configuration of the first rule.&lt;/P&gt;</description>
      <pubDate>Sun, 14 Sep 2025 11:27:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-question/m-p/5329971#M1122700</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-09-14T11:27:02Z</dc:date>
    </item>
  </channel>
</rss>

