<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic One more thing to confirm is in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594912#M229802</link>
    <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;One more thing to confirm is for traffic flow in bidirectional&amp;nbsp; it will use the same NAT rule right?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Yes, assuming the NAT statement is a static NAT.&amp;nbsp; Only static NAT is bidirectional, while dynamic NAT is not.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;For ACL check for traffic flow from inside to outside it will look look for ACL on ASA's inside interface right?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Correct. The ACL, if any, which is applied to the inside interface will be matched first.&amp;nbsp; However, it is possible to apply an ACL to the outside interface in the outbound direction which will also be applied to the traffic.&amp;nbsp; This is not a common practice though and is used only when there is a specific need for doing so.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Tue, 16 Dec 2014 21:55:41 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2014-12-16T21:55:41Z</dc:date>
    <item>
      <title>Port forwarding and Order of operation</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594909#M229798</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured port porwarding for our internal server as we have 1 public IP only.It is working fine.&lt;/P&gt;&lt;P&gt;Need to confirm if we access the server from &lt;STRONG&gt;outside world then first thing that will happen is&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;NAT and then it will look for ACL on outside interface right?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;For return traffic &amp;nbsp;from server to Outside world it will hit ACL then NAT&lt;/STRONG&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:14:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594909#M229798</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T05:14:10Z</dc:date>
    </item>
    <item>
      <title>Need to confirm if we access</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594910#M229800</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Need to confirm if we access the server from outside world then first thing that will happen is&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;NAT and then it will look for ACL on outside interface right?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;That is correct.&amp;nbsp; As you said, traffic will first be translated using the NAT statements and then checked against the ACL entries.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;For return traffic &amp;nbsp;from server to Outside world it will hit ACL then NAT&lt;/STRONG&gt;?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Again correct.&amp;nbsp; This is because the ACL check will happen on the inside interface and the NAT, in this case, will happen after the packet has entered the interface.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2014 16:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594910#M229800</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-12-16T16:34:18Z</dc:date>
    </item>
    <item>
      <title> Hi Marius, One more thing to</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594911#M229801</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Marius,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One more thing to confirm is for traffic flow in bidirectional&amp;nbsp; it will use the same NAT rule right?&lt;/P&gt;&lt;P&gt;For ACL check for traffic flow from inside to outside it will look look for ACL on ASA's inside interface right?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;MAhesh&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2014 17:21:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594911#M229801</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-16T17:21:25Z</dc:date>
    </item>
    <item>
      <title>One more thing to confirm is</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594912#M229802</link>
      <description>&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;One more thing to confirm is for traffic flow in bidirectional&amp;nbsp; it will use the same NAT rule right?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Yes, assuming the NAT statement is a static NAT.&amp;nbsp; Only static NAT is bidirectional, while dynamic NAT is not.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;For ACL check for traffic flow from inside to outside it will look look for ACL on ASA's inside interface right?&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Correct. The ACL, if any, which is applied to the inside interface will be matched first.&amp;nbsp; However, it is possible to apply an ACL to the outside interface in the outbound direction which will also be applied to the traffic.&amp;nbsp; This is not a common practice though and is used only when there is a specific need for doing so.&lt;/P&gt;&lt;P&gt;--&lt;/P&gt;&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2014 21:55:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594912#M229802</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2014-12-16T21:55:41Z</dc:date>
    </item>
    <item>
      <title> Many thanks Marius for</title>
      <link>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594913#M229803</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks Marius for confirming that i was thinking correct.&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2014 22:15:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-forwarding-and-order-of-operation/m-p/2594913#M229803</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2014-12-16T22:15:13Z</dc:date>
    </item>
  </channel>
</rss>

