<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT question for ASA running 8.4(5) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133853#M416605</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we have a customer firewall (behind the actual Internet firewall) that has absolutely no NAT configurations. Its only doing access control with ACLs acting as a border between 2 local network segments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 26 Jan 2013 01:35:56 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2013-01-26T01:35:56Z</dc:date>
    <item>
      <title>NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133849#M416601</link>
      <description>&lt;P&gt;We have a client who is about to hang an ASA off the DMZ of our firewall that is running 8.4(5). That firewall is currently on a different part of our network, and NAT is going to be significantly changed. Now, everything on the clients firewall needs to be NATed on the outside to the same as the internal IP scheme, e.g. like the old "static (inside,outside) 172.16.16.0 172.16.16.0 netm 255.255.255.0" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I look at Cisco's document for NAT conversion (&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html#wp96828" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html#wp96828&lt;/A&gt;&lt;SPAN&gt;), I don't see any conversion between the two. This isn't a "nat 0" because Internet users will need access to some hosts on the inside of our client's firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can someone please point me in the right direction? Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 12:49:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133849#M416601</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2020-02-21T12:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133850#M416602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Will the following work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;nat (inside,outside) source static any any &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 07:01:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133850#M416602</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2013-01-25T07:01:52Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133851#M416603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets assume that the following is true&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The new ASA has "inside" and "outside" network/interface only&lt;/LI&gt;&lt;LI&gt;The new ASA doesnt have to do ANY NAT from "inside" to "outside" traffic at any situation (your firewall handles this?)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you can simply have the ASA with absolutely NO NAT configurations. The ASA with the new software versions 8.3 and above automatically passes all traffic UNNATED through the ASA. We use this on one customer and it works just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if the above is the case or if not can think of something else&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 21:12:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133851#M416603</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-25T21:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133852#M416604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With the previous versions of firmware, with "nat (inside) 0" and "global outside" commands, you couldn't initiate traffic from the outside to the inside. We will need to do this. So I can simply remove all NAT commands, and it will work fine?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Jan 2013 23:09:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133852#M416604</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2013-01-25T23:09:23Z</dc:date>
    </item>
    <item>
      <title>NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133853#M416605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, we have a customer firewall (behind the actual Internet firewall) that has absolutely no NAT configurations. Its only doing access control with ACLs acting as a border between 2 local network segments.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2013 01:35:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133853#M416605</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-01-26T01:35:56Z</dc:date>
    </item>
    <item>
      <title>NAT question for ASA running 8.4(5)</title>
      <link>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133854#M416606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;JouniForss, thanks for your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Jan 2013 14:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-question-for-asa-running-8-4-5/m-p/2133854#M416606</guid>
      <dc:creator>baskervi</dc:creator>
      <dc:date>2013-01-26T14:25:13Z</dc:date>
    </item>
  </channel>
</rss>

