<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Outside to Inside with NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338787#M342445</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Option 1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; using ACL for permit and static route for routing&lt;/P&gt;&lt;P&gt;Option 2&lt;/P&gt;&lt;P&gt; nat con-trol&lt;/P&gt;&lt;P&gt; using nat0 (exempt).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Oct 2013 11:17:08 GMT</pubDate>
    <dc:creator>phuoctrung</dc:creator>
    <dc:date>2013-10-10T11:17:08Z</dc:date>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338769#M342425</link>
      <description>&lt;P&gt;Hyi have face problem regradin traffic from outside to insdie having applying acl below here&lt;/P&gt;&lt;P&gt;access-list 101 permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;APPLY on outside interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but my traffice didnt pass through from outside to indie&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 02:44:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338769#M342425</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2019-03-12T02:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338770#M342426</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you exactly describe what you want to allow on your ASA? Which is the ASA-version you are running and can the ASA reach the internet and the internal server that you want to expose to the internet? The actual config can also help.&lt;BR /&gt;&lt;BR /&gt;And "permit ip any any" is most likely not what you want to use on a firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 08:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338770#M342426</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-27T08:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338771#M342427</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Version 8.0(2) and ASA ping both sides (outside to internet and inside to internal network).&lt;/P&gt;&lt;P&gt;Here is the show running configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 10.1.1.30&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-group 101 in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:a910fcee5200493f2ed21db7bd2f82d6&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Navaz Wattoo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 09:58:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338771#M342427</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-09-27T09:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338772#M342428</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So it's not a real network but learning how to operate the ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should start with NAT and think about if you really need NAT. In your diagram inside and outside should have full routing reachability, so NAT is not needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Config-Guide you find all info how NAT works on the ASA:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;start with the commands "nat", "global" and "nat-control". For your case, all of these can be removed from the config and reachability should be there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to simulate a situation where the outside interface connects to the internet you need to configure a ststic translation and you should keep the "nat" and "global". The additional config you need is a "static" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that go over to the configuration of access-control:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/nwaccess.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/nwaccess.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You don't want to allow any traffic into your network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 10:29:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338772#M342428</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-27T10:29:49Z</dc:date>
    </item>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338773#M342431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check routing , i dont see any.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Pankaj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 12:07:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338773#M342431</guid>
      <dc:creator>pankaj29in</dc:creator>
      <dc:date>2013-09-27T12:07:26Z</dc:date>
    </item>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338774#M342432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the systems in this scenario are directly connected so there is no need for an extra routing-config. Of course you are right if this would be an internet-connected setup. There at least a default-route would be needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&amp;nbsp; &lt;BR /&gt;Don't stop after you've improved your network! Improve the world by lending money to the working poor: &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.kiva.org/invitedby/karsteni"&gt;http://www.kiva.org/invitedby/karsteni&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Sep 2013 13:06:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338774#M342432</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2013-09-27T13:06:12Z</dc:date>
    </item>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338775#M342433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have a look here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.darkmoon.org.uk/173"&gt;http://www.darkmoon.org.uk/173&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Simon &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.linksysinfo.org"&gt;http://www.linksysinfo.org&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Sep 2013 00:42:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338775#M342433</guid>
      <dc:creator>linksysinfo</dc:creator>
      <dc:date>2013-09-29T00:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338776#M342434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Navaz,&lt;BR /&gt;Along with routing and the ACL, you will also need to have a static xlate configured to allow the inbound traffic. I don't see that in your configuration.&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 03:31:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338776#M342434</guid>
      <dc:creator>dfeurt1969</dc:creator>
      <dc:date>2013-09-30T03:31:26Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338777#M342435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you please send me the xlate configuration?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 07:02:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338777#M342435</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-09-30T07:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338778#M342436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should look like this:&lt;BR /&gt;Static (inside,outside) 192.168.1.0 192.168.1.0 net mask 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;I'm not sure what your topology is, but you will have to be able to route to the 192.168.1.0 network from your outside host(s).&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 19:16:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338778#M342436</guid>
      <dc:creator>dfeurt1969</dc:creator>
      <dc:date>2013-09-30T19:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338779#M342437</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry, no space in the netmask keyword. The iPad auto correct strikes again... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Sent from Cisco Technical Support iPad App&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Sep 2013 19:19:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338779#M342437</guid>
      <dc:creator>dfeurt1969</dc:creator>
      <dc:date>2013-09-30T19:19:16Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338780#M342438</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;David i am sending you topology and the configuration that i configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA(config)# sh running-config&lt;/P&gt;&lt;P&gt;: Saved&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;ASA Version 8.0(2)&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;hostname ASA&lt;/P&gt;&lt;P&gt;enable password 8Ry2YjIyt7RRXU24 encrypted&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 10.1.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/4&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface Ethernet0/5&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;passwd 2KFQnbNIdI.2KYOU encrypted&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;access-list 101 extended permit ip any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;icmp unreachable rate-limit 1 burst-size 1&lt;/P&gt;&lt;P&gt;no asdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;nat-control&lt;/P&gt;&lt;P&gt;global (outside) 1 10.1.1.30&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (outside,inside) 10.1.1.30 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-group 101 in interface inside&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;/P&gt;&lt;P&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;dynamic-access-policy-record DfltAccessPolicy&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;/P&gt;&lt;P&gt;no crypto isakmp nat-traversal&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;/P&gt;&lt;P&gt;threat-detection statistics access-list&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;prompt hostname context&lt;/P&gt;&lt;P&gt;Cryptochecksum:a910fcee5200493f2ed21db7bd2f82d6&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA(config)#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Navaz&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Oct 2013 04:20:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338780#M342438</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-10-01T04:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338781#M342439</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;anyone have solution of this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 05:36:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338781#M342439</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-10-02T05:36:40Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338782#M342440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;what traffic (ports) are you try to let in from outside in and to where?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards Simon &lt;BR /&gt;&lt;A class="jive-link-external-small" href="http://www.linksysinfo.org"&gt;http://www.linksysinfo.org&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Oct 2013 06:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338782#M342440</guid>
      <dc:creator>linksysinfo</dc:creator>
      <dc:date>2013-10-02T06:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338783#M342441</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i need any kind of traffice pass through both side that from inside to outside and outside to inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 05:06:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338783#M342441</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-10-03T05:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338784#M342442</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Navaz,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think we are confused here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We all asume this is just for testing purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If what you want is to allow all traffic traversing the ASA from out in, in out&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No nat-control &lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no global (outside) 1 10.1.1.30&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;no static (outside,inside) 10.1.1.30 10.1.1.2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="background-color: #f7fafb; border-collapse: collapse; font-size: 12.222222328186035px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;Leave the ACL configuration u have so far and then you will have a Firewall configured to act as No Firewall hehe &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; weird enough!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;For more information about Core and Security Networking follow my website at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://laguiadelnetworking.com"&gt;http://laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;&lt;SPAN&gt;Any question contact me at &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:jcarvaja@laguiadelnetworking.com"&gt;jcarvaja@laguiadelnetworking.com&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;BR /&gt; &lt;BR /&gt;Cheers, &lt;BR /&gt; &lt;BR /&gt;Julio Carvajal Segura&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 07:04:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338784#M342442</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-10-03T07:04:23Z</dc:date>
    </item>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338785#M342443</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check the routes on your routers, even it is directly connected but you need a route on each router for the other subnet behind the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure static xlate on the firewall to reach the internal subnet usind a direct natted IP from the external range&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Oct 2013 11:08:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338785#M342443</guid>
      <dc:creator>Anas Hijjawi</dc:creator>
      <dc:date>2013-10-03T11:08:51Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338786#M342444</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;i am sending you my NAT configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat-control&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;global (outside) 1 10.1.1.10&lt;/P&gt;&lt;P&gt;nat (inside) 1 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.1.2 192.168.1.2 netmask 255.255.255.255 &lt;/P&gt;&lt;P&gt;access-group 101 in interface outside&lt;/P&gt;&lt;P&gt;access-group 101 out interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And Routes at Inside Router&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.2 [1/0] via 192.168.1.1&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0/24 is directly connected, GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;And Routes at Outside Router&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.1.1.0 is directly connected, GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0/32 is subnetted, 1 subnets&lt;/P&gt;&lt;P&gt;S&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.2 [1/0] via 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem is:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The problem is that i cant ping from outside to inside.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 07:28:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338786#M342444</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-10-10T07:28:56Z</dc:date>
    </item>
    <item>
      <title>Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338787#M342445</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Option 1:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No nat-control&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; using ACL for permit and static route for routing&lt;/P&gt;&lt;P&gt;Option 2&lt;/P&gt;&lt;P&gt; nat con-trol&lt;/P&gt;&lt;P&gt; using nat0 (exempt).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Oct 2013 11:17:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338787#M342445</guid>
      <dc:creator>phuoctrung</dc:creator>
      <dc:date>2013-10-10T11:17:08Z</dc:date>
    </item>
    <item>
      <title>Re: Outside to Inside with NAT</title>
      <link>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338788#M342446</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can i use static nat for low to high and nat globle for hihg to low?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Navaz&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 11 Oct 2013 03:52:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/outside-to-inside-with-nat/m-p/2338788#M342446</guid>
      <dc:creator>Navaz Wattoo</dc:creator>
      <dc:date>2013-10-11T03:52:36Z</dc:date>
    </item>
  </channel>
</rss>

