<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Your Thoughts on a Dynamic NAT or PAT from Inside to DMZ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/your-thoughts-on-a-dynamic-nat-or-pat-from-inside-to-dmz/m-p/2720938#M190544</link>
    <description>&lt;P&gt;hi there. Have been conducting ASA upgrades (8.2 &amp;gt; 9.1) and at the same time doing a tremendous amount of cleanup, e.g. the usual untidy mess of stale objects, obscure undocumented rules, and messy NAT configurations&lt;/P&gt;&lt;P&gt;There seems to be a school of thought here that you need a Dynamic NAT or PAT for traffic sourced in the 'INSIDE' when headed to the 'DMZ'. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The original configurations that I inherited had Dynamic NAT pools going in every direction, resulting in a lot of static Identity NAT's as it would break certain traffic. After doing cleanup, we have much cleaner, and I feel best practice, configurations such as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside,outside) after-auto source dynamic INTERNAL-NET interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know one can argue that "you will secure your internal host traffic if there is malicious activity in the DMZ" - &amp;nbsp;but it seems that if your FW perimeter / DMZ has been compromised, this Dynamic NAT pool isnt going to save you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:07:47 GMT</pubDate>
    <dc:creator>Jonathan Wiggins</dc:creator>
    <dc:date>2019-03-12T06:07:47Z</dc:date>
    <item>
      <title>Your Thoughts on a Dynamic NAT or PAT from Inside to DMZ</title>
      <link>https://community.cisco.com/t5/network-security/your-thoughts-on-a-dynamic-nat-or-pat-from-inside-to-dmz/m-p/2720938#M190544</link>
      <description>&lt;P&gt;hi there. Have been conducting ASA upgrades (8.2 &amp;gt; 9.1) and at the same time doing a tremendous amount of cleanup, e.g. the usual untidy mess of stale objects, obscure undocumented rules, and messy NAT configurations&lt;/P&gt;&lt;P&gt;There seems to be a school of thought here that you need a Dynamic NAT or PAT for traffic sourced in the 'INSIDE' when headed to the 'DMZ'. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The original configurations that I inherited had Dynamic NAT pools going in every direction, resulting in a lot of static Identity NAT's as it would break certain traffic. After doing cleanup, we have much cleaner, and I feel best practice, configurations such as:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;nat (inside,outside) after-auto source dynamic INTERNAL-NET interface&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know one can argue that "you will secure your internal host traffic if there is malicious activity in the DMZ" - &amp;nbsp;but it seems that if your FW perimeter / DMZ has been compromised, this Dynamic NAT pool isnt going to save you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:07:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/your-thoughts-on-a-dynamic-nat-or-pat-from-inside-to-dmz/m-p/2720938#M190544</guid>
      <dc:creator>Jonathan Wiggins</dc:creator>
      <dc:date>2019-03-12T06:07:47Z</dc:date>
    </item>
    <item>
      <title>Hi,As per this Interface PAT</title>
      <link>https://community.cisco.com/t5/network-security/your-thoughts-on-a-dynamic-nat-or-pat-from-inside-to-dmz/m-p/2720939#M190547</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;As per this Interface PAT configuration , this would certainly secure your network rather than doing a NONAT for this traffic.&lt;/P&gt;&lt;P&gt;The reason for that is that the DMZ users would not be able to initiate connections back to the internal users as Dynamic PAT works uni directionally.&lt;/P&gt;&lt;P&gt;Again , other than this we can still secure the internal networks even with the Static Identity NAT as well by using an ACL.&lt;/P&gt;&lt;P&gt;So , this is just a design requirement query. If you think , DMZ would ever initiate any connections , Dynamic PAT is not an option.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Vibhor Amrodia&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2015 02:41:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/your-thoughts-on-a-dynamic-nat-or-pat-from-inside-to-dmz/m-p/2720939#M190547</guid>
      <dc:creator>Vibhor Amrodia</dc:creator>
      <dc:date>2015-06-17T02:41:46Z</dc:date>
    </item>
  </channel>
</rss>

