<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Basic question about Nat &amp; DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/basic-question-about-nat-dmz/m-p/2896188#M153583</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If I have two web servers (say 10.1.1.1:80 &amp;amp; 10.1.1.2:81) in a DMZ, is it sufficient enough to add a static NAT or PAT only and the servers will be reachable from outside on those ports?&lt;BR /&gt;Or do you need an outgoing dynamic nat in order for those servers to reply outbound?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 07:47:36 GMT</pubDate>
    <dc:creator>louis0001</dc:creator>
    <dc:date>2019-03-12T07:47:36Z</dc:date>
    <item>
      <title>Basic question about Nat &amp; DMZ</title>
      <link>https://community.cisco.com/t5/network-security/basic-question-about-nat-dmz/m-p/2896188#M153583</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;If I have two web servers (say 10.1.1.1:80 &amp;amp; 10.1.1.2:81) in a DMZ, is it sufficient enough to add a static NAT or PAT only and the servers will be reachable from outside on those ports?&lt;BR /&gt;Or do you need an outgoing dynamic nat in order for those servers to reply outbound?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:47:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-question-about-nat-dmz/m-p/2896188#M153583</guid>
      <dc:creator>louis0001</dc:creator>
      <dc:date>2019-03-12T07:47:36Z</dc:date>
    </item>
    <item>
      <title>Hi there,</title>
      <link>https://community.cisco.com/t5/network-security/basic-question-about-nat-dmz/m-p/2896189#M153584</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is sufficient to use a static NAT entry for this because the ASA is stateful and will build a connection which allows the traffic to communicate both ways. If you go from outside to inside and use the unidirectional keyword, then the traffic can only be initiated from the outside.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;You can learn more of how to configure this scenario here: &lt;A href="http://www.internetworkingcareer.com/firewall/configure-nat-asa-firewall/"&gt;http://www.internetworkingcareer.com/firewall/configure-nat-asa-firewall/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Tim&lt;/P&gt;</description>
      <pubDate>Tue, 24 May 2016 20:13:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/basic-question-about-nat-dmz/m-p/2896189#M153584</guid>
      <dc:creator>Tim Y</dc:creator>
      <dc:date>2016-05-24T20:13:10Z</dc:date>
    </item>
  </channel>
</rss>

