<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT 9.1 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657538#M194977</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have asa 5525 version 9.1(2)&lt;/P&gt;&lt;P&gt;i want to allow the traffice from outsid to inside and inside to outside. Also attached a diagram.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:46:59 GMT</pubDate>
    <dc:creator>infra.admin1</dc:creator>
    <dc:date>2019-03-12T05:46:59Z</dc:date>
    <item>
      <title>NAT 9.1</title>
      <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657538#M194977</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have asa 5525 version 9.1(2)&lt;/P&gt;&lt;P&gt;i want to allow the traffice from outsid to inside and inside to outside. Also attached a diagram.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:46:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657538#M194977</guid>
      <dc:creator>infra.admin1</dc:creator>
      <dc:date>2019-03-12T05:46:59Z</dc:date>
    </item>
    <item>
      <title>Hi Admin,Configure a static</title>
      <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657539#M194978</link>
      <description>&lt;P&gt;Hi Admin,&lt;/P&gt;&lt;P&gt;Configure a static NAT on the ASA, as you require bi-directional traffic flow.&lt;/P&gt;&lt;P&gt;Static NAT configuration example:&lt;/P&gt;&lt;P&gt;&lt;U&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa91/configuration/firewall/asa_91_firewall_config/nat_objects.html#pgfId-1106703&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Shrinkhala&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 13:42:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657539#M194978</guid>
      <dc:creator>shrising</dc:creator>
      <dc:date>2015-04-16T13:42:14Z</dc:date>
    </item>
    <item>
      <title>Hi. What traffic do you want</title>
      <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657540#M194980</link>
      <description>&lt;P&gt;Hi. What traffic do you want to allow in, and what do you want to allow in.&lt;/P&gt;&lt;P&gt;Remember that traffic from a higher security level interface to a lower security level interface. &amp;nbsp;This traffic will be statefully inspected (except for icmp by default) And the return traffic will be allowed. So this means for outgoing Internet traffic all you need is dynamic PAT ( no ACL) if your outside interface security level is lower than your inside. For traffic coming from outside you need an access rule (ACL). If you need inside servers available on the outside, &amp;nbsp;you eill need static NAT rules.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Apr 2015 17:31:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657540#M194980</guid>
      <dc:creator>Andre Neethling</dc:creator>
      <dc:date>2015-04-16T17:31:39Z</dc:date>
    </item>
    <item>
      <title>Hi Andre, Thanks for the</title>
      <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657541#M194982</link>
      <description>&lt;P&gt;Hi Andre,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply and i configure as per below configuration. And i want allow all kind of traffic including ICMP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network InsideTOoutside&lt;/P&gt;&lt;P&gt;host 11.11.11.2&lt;/P&gt;&lt;P&gt;nat(inside,outside) static 12.12.12.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-lis 101 permit ip any any&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ip route 0.0.0.0 12.12.12.2&lt;/P&gt;&lt;P&gt;11.11.11.2----------------------inside server ip&lt;/P&gt;&lt;P&gt;12.12.12.1----------------------firewall outside ip with 29 subnet mask&lt;/P&gt;&lt;P&gt;12.12.12.2-----------------------internet gateway with 29 subnet mask&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but its not working even from firewall 12.12.12.2 is not pingable.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 06:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657541#M194982</guid>
      <dc:creator>infra.admin1</dc:creator>
      <dc:date>2015-04-17T06:26:06Z</dc:date>
    </item>
    <item>
      <title>Hi ,The NAT rule is correct</title>
      <link>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657542#M194984</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;The NAT rule is correct.&lt;BR /&gt;&lt;BR /&gt;You can troubleshoot the following:&lt;/P&gt;&lt;P&gt;-Run a packet tracer to confirm if the firewall is allowing the traffic:&lt;BR /&gt;&lt;BR /&gt;packet-tracer input inside icmp&amp;nbsp;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;11.11.11.2 8 0 4.2.2.2 detailed&lt;P&gt;&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;- Check the arp entry for the gateway on the outside interface&lt;/P&gt;&lt;P&gt;sh arp | inc&amp;nbsp;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;12.12.12.2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;&lt;P&gt;Confirm the entry is not stale. &lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;&lt;P&gt;clear&amp;nbsp;the ARP entry. Ping the gateway&lt;/P&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;&lt;P&gt;Check if the firewall learns the ARP entry&amp;nbsp;again.&lt;/P&gt;&amp;nbsp;(if it does not try changing the cable or check with your ISP).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;;
color:#4B4B4B"&gt;- You can also test by enabling ICMP inspection:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;ASA(config)# fixup protocol icmp&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Apr 2015 08:25:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-9-1/m-p/2657542#M194984</guid>
      <dc:creator>shrising</dc:creator>
      <dc:date>2015-04-17T08:25:16Z</dc:date>
    </item>
  </channel>
</rss>

