<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using ASA without NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220253#M349477</link>
    <description>&lt;P&gt;The way I have usually deployed an ASA is with using NAT.&amp;nbsp; I am working on a situation with an ASA where it is an interior firewall and NAT isnt needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the same time, due to some organizational issues, I have brought up this ASA in multi-context mode so I can have the firewall for each group function in the way they need it.&amp;nbsp; From my workstation on the inside interface, I can ping the inside interface of the firewall without a problem.&amp;nbsp; From a console screen, I can ping from the firewall to anywhere on the outside or on the internet.&amp;nbsp; Fromy my workstation, I can't ping the outside interface of the ASA or anything external on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have put a static route on the router that the interior ASA plugs into to point back to the public interface of the interior ASA for the subnet that is on the private side of the interface.&amp;nbsp; My suspicion is that the problem is something on the ASA configuration that I have missed.&amp;nbsp; Here is a snippet of the config to see if anyone can see what I have missed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Outside&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.34.50.101 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface NSG_Data&lt;/P&gt;&lt;P&gt;nameif NSG_Data&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.34.150.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list NSG_Data remark Access List for NSG Context&lt;/P&gt;&lt;P&gt;access-list NSG_Data extended permit ip any any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;icmp permit any NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group NSG_Data in interface NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 10.34.50.1 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;dhcpd address 10.34.150.10-10.34.150.100 NSG_Data&lt;/P&gt;&lt;P&gt;dhcpd enable NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using 8.2.5 version of code.&amp;nbsp; I have stayed away from 8.3 at TAC's suggestion and was thinking about 8.4 when I saw v9 released.&amp;nbsp; Since 8.2.5 doesnt support dynamic routing protocols, I will have to use static routes until I can get v9 downloaded and evaluated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a bare minimum config at this point and will be properly hardened once I have it up and running.&amp;nbsp; i have looked at the system context but dont see anything there since it is little more than assigning the physical interfaces or sub-interfaces to a specific context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help,&lt;/P&gt;&lt;P&gt;Ron&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 01:47:21 GMT</pubDate>
    <dc:creator>ronald.nutter</dc:creator>
    <dc:date>2019-03-12T01:47:21Z</dc:date>
    <item>
      <title>Using ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220253#M349477</link>
      <description>&lt;P&gt;The way I have usually deployed an ASA is with using NAT.&amp;nbsp; I am working on a situation with an ASA where it is an interior firewall and NAT isnt needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At the same time, due to some organizational issues, I have brought up this ASA in multi-context mode so I can have the firewall for each group function in the way they need it.&amp;nbsp; From my workstation on the inside interface, I can ping the inside interface of the firewall without a problem.&amp;nbsp; From a console screen, I can ping from the firewall to anywhere on the outside or on the internet.&amp;nbsp; Fromy my workstation, I can't ping the outside interface of the ASA or anything external on the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have put a static route on the router that the interior ASA plugs into to point back to the public interface of the interior ASA for the subnet that is on the private side of the interface.&amp;nbsp; My suspicion is that the problem is something on the ASA configuration that I have missed.&amp;nbsp; Here is a snippet of the config to see if anyone can see what I have missed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface Outside&lt;/P&gt;&lt;P&gt;nameif Outside&lt;/P&gt;&lt;P&gt;security-level 0&lt;/P&gt;&lt;P&gt;ip address 10.34.50.101 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;interface NSG_Data&lt;/P&gt;&lt;P&gt;nameif NSG_Data&lt;/P&gt;&lt;P&gt;security-level 100&lt;/P&gt;&lt;P&gt;ip address 10.34.150.1 255.255.255.0 &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-interface&lt;/P&gt;&lt;P&gt;same-security-traffic permit intra-interface&lt;/P&gt;&lt;P&gt;access-list NSG_Data remark Access List for NSG Context&lt;/P&gt;&lt;P&gt;access-list NSG_Data extended permit ip any any &lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;icmp permit any NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;access-group NSG_Data in interface NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;route Outside 0.0.0.0 0.0.0.0 10.34.50.1 1&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;dhcpd dns 8.8.8.8&lt;/P&gt;&lt;P&gt;!&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;dhcpd address 10.34.150.10-10.34.150.100 NSG_Data&lt;/P&gt;&lt;P&gt;dhcpd enable NSG_Data&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using 8.2.5 version of code.&amp;nbsp; I have stayed away from 8.3 at TAC's suggestion and was thinking about 8.4 when I saw v9 released.&amp;nbsp; Since 8.2.5 doesnt support dynamic routing protocols, I will have to use static routes until I can get v9 downloaded and evaluated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is a bare minimum config at this point and will be properly hardened once I have it up and running.&amp;nbsp; i have looked at the system context but dont see anything there since it is little more than assigning the physical interfaces or sub-interfaces to a specific context.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help,&lt;/P&gt;&lt;P&gt;Ron&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:47:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220253#M349477</guid>
      <dc:creator>ronald.nutter</dc:creator>
      <dc:date>2019-03-12T01:47:21Z</dc:date>
    </item>
    <item>
      <title>Using ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220254#M349478</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well the most common problem related to testing connectivity with ICMP through the ASA is lacking the ICMP Inspection which is NOT enabled by default&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can enable to inside each Security Context with the commands&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you can configure it also under the global "policy-map" currently on the ASA (The above commands are old format commands that the ASA converts to the below format automatically. I would imagine that they will eventually remove any support for the above commands)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp; inspect icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above should allow the ICMP messages to through in both direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Otherwise you have to configure an ACL on the external interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN remark ICMP&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit icmp any any echo-reply&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit icmp any any time-exceeded&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list OUTSIDE-IN permit icmp any any unreachable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group OUTSIDE-IN in interface outside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or something to that direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, even though you said you had configured a route on the external router I am not sure if you have more routers in the network and are you running dynamic routing so that the route to the internal network (of the ASA) is reachable from everywhere else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 16:03:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220254#M349478</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T16:03:25Z</dc:date>
    </item>
    <item>
      <title>Using ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220255#M349479</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried the inspect commands you gave (should have remembered that one).&amp;nbsp; Still no joy on ping able to ping the Outside interface from the inside in the context (NSG) that I am working on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would think this should be that hard to do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not running any dynamic routing on the network.&amp;nbsp; I have a 3560 switch in layer 3 mode that is sitting between the inside ASA and what I will refer to as the Outside ASA.&amp;nbsp; The outside interface of the Inside ASA and the inside interface of the outside ASA are in ths same vlan.&amp;nbsp; When plugged into the console port of the Inside ASA, I can ping the inside interface of the Outside ASA.&amp;nbsp; That says the path is good between the two.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 18:55:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220255#M349479</guid>
      <dc:creator>ronald.nutter</dc:creator>
      <dc:date>2013-05-22T18:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Using ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220256#M349480</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said that you configured route on the L3 switch for the networks behind the INSIDE ASA. Does the OUTSIDE ASA have the route for those networks aswell?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you can always configure ICMP capture on the INSIDE ASA also&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ICMP-CAP permit icmp &lt;INSIDE network=""&gt; &lt;MASK&gt; any&lt;/MASK&gt;&lt;/INSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list ICMP-CAP permit icmp any &lt;INSIDE network=""&gt; &lt;MASK&gt;&lt;/MASK&gt;&lt;/INSIDE&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture ICMP-CAP type raw-data access-list ICMP-CAP interface outside buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can test ICMP and issue the command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture ICMP-CAP&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and determine if any Echo Reply messages are coming back to the INSIDE ASA "outside" interface when a host behind the INSIDE ASA sends ICMP Echos&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 May 2013 19:07:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220256#M349480</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-05-22T19:07:31Z</dc:date>
    </item>
    <item>
      <title>Using ASA without NAT</title>
      <link>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220257#M349481</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got it up and running.&amp;nbsp; This is my first journey into running an ASA without NAT.&amp;nbsp; Should have thought about putting a static route at the OUTSIDE ASA's end.&amp;nbsp; That fixed the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Ron&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 May 2013 16:09:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-asa-without-nat/m-p/2220257#M349481</guid>
      <dc:creator>ronald.nutter</dc:creator>
      <dc:date>2013-05-23T16:09:16Z</dc:date>
    </item>
  </channel>
</rss>

