<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routed and transparent mode simultaneoulsy in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968583#M144177</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We have a customer who wants to enable routed and transparent mode at the same time for FTD platform. The use case is that the firewall in NAT mode for Internal private IP network and use the firewall in transparent mode for our Internal Public IP network.&lt;/P&gt;
&lt;P&gt;Kindly advise.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:39:57 GMT</pubDate>
    <dc:creator>ymadheka</dc:creator>
    <dc:date>2019-03-12T08:39:57Z</dc:date>
    <item>
      <title>Routed and transparent mode simultaneoulsy</title>
      <link>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968583#M144177</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We have a customer who wants to enable routed and transparent mode at the same time for FTD platform. The use case is that the firewall in NAT mode for Internal private IP network and use the firewall in transparent mode for our Internal Public IP network.&lt;/P&gt;
&lt;P&gt;Kindly advise.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:39:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968583#M144177</guid>
      <dc:creator>ymadheka</dc:creator>
      <dc:date>2019-03-12T08:39:57Z</dc:date>
    </item>
    <item>
      <title>You can just not NAT traffic</title>
      <link>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968584#M144180</link>
      <description>&lt;P&gt;You can just not NAT traffic coming from the Internal Public IP network. That's independent of routed vs.transparent mode.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 15:40:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968584#M144180</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-12-15T15:40:30Z</dc:date>
    </item>
    <item>
      <title>Hi Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968585#M144182</link>
      <description>&lt;P&gt;Hi Marvin,&lt;/P&gt;
&lt;P&gt;Thanks for the reply.&lt;/P&gt;
&lt;P&gt;Here the private network represents the server zone and not any internal users. Based on the discussion with the customer the use case is like they have two networks behind the firewall one represents the private network for their servers zone while the other one represents public network of the server zone. The ideology is to not inspect the traffic coming to the public network since their service functionality are delivered through the NATted part of the private network.&lt;/P&gt;
&lt;P&gt;Hence want to pass through the traffic for the public network and inspect the traffic for the private network.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 08:02:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968585#M144182</guid>
      <dc:creator>ymadheka</dc:creator>
      <dc:date>2016-12-17T08:02:38Z</dc:date>
    </item>
    <item>
      <title>Sure - you would combine NAT</title>
      <link>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968586#M144184</link>
      <description>&lt;P&gt;Sure - you would combine NAT rules (including NAT exemption) with your Access Control (AC) policy.&lt;/P&gt;
&lt;P&gt;Just build the AC policy top down like a traditional ACL - first match will govern how the traffic is treated / inspected.&lt;/P&gt;</description>
      <pubDate>Sat, 17 Dec 2016 12:01:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/routed-and-transparent-mode-simultaneoulsy/m-p/2968586#M144184</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-12-17T12:01:36Z</dc:date>
    </item>
  </channel>
</rss>

