<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA NAT Best Practice in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031532#M179169</link>
    <description>Hi,&lt;BR /&gt;You would always define the real IP address in the ACL.&lt;BR /&gt;Best Practice is to be consistent with your NAT rules. Source should be highest security level to lowest - e.g "nat (inside,outside) ...."&lt;BR /&gt;&lt;BR /&gt;HTH</description>
    <pubDate>Tue, 18 Feb 2020 12:25:10 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2020-02-18T12:25:10Z</dc:date>
    <item>
      <title>ASA NAT Best Practice</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031530#M179168</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am in the process of reconfiguring all the outside access rules and NATs as we are migrating to a new public IP range. My question is about the best practice when configuring the NAT and access rules. I want to only use manual NATs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Should the outside in access rule have the destination as the mapped public IP (so any to public ip) or the real IP address (any to&amp;nbsp;real ip)&amp;nbsp;of the internal server&lt;/P&gt;&lt;P&gt;2) Should the nat rule (although bidirectional) be inside to outside (real inside real outside translated mapped inside real outside) or the other way around. I know the rule will be bidirectional and I can make it unidirectional but what works as best practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 12:18:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031530#M179168</guid>
      <dc:creator>Mokhalil82</dc:creator>
      <dc:date>2020-02-18T12:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Best Practice</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031532#M179169</link>
      <description>Hi,&lt;BR /&gt;You would always define the real IP address in the ACL.&lt;BR /&gt;Best Practice is to be consistent with your NAT rules. Source should be highest security level to lowest - e.g "nat (inside,outside) ...."&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Tue, 18 Feb 2020 12:25:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031532#M179169</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2020-02-18T12:25:10Z</dc:date>
    </item>
    <item>
      <title>Re: ASA NAT Best Practice</title>
      <link>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031855#M294611</link>
      <description>&lt;P&gt;The biggest rule, as mentioned by RJI is to be consistant with your NAT and ACL configurations.&amp;nbsp; However, there are some rules I try to follow as best as possible (though it is not easily done in some situations)&lt;/P&gt;
&lt;P&gt;1. Configure NAT rules based on an inside to outside traffic flow (i.e. higher security level to lower security level)&lt;/P&gt;
&lt;P&gt;2. Always define NAT source and destination interfaces (do not use "any" for an interface)&lt;/P&gt;
&lt;P&gt;3. Try to be as specifc as possible with the IPs / subnets and ports in ACLs (this is particularly difficult as server administrators do not always know the traffic flow of their applications.)&lt;/P&gt;
&lt;P&gt;4. Restrict access between internal devices (a PC needs to reach the AD, DHCP, DNS and printers, etc., but doesnt need to reach other PCs..usually)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ACLs require the use of the real IP address of an internal host.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Feb 2020 22:26:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-nat-best-practice/m-p/4031855#M294611</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2020-02-18T22:26:00Z</dc:date>
    </item>
  </channel>
</rss>

