<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Port passthrough on 5520 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857479#M488630</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ga,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me see if a understand, you just want to permit traffic on the firewall on xx port..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then what you need to do is open that port using an ACL on the interface where the packet will arrive.. If you have nat control enabled on the ASA you can use a nat 0 or a Identity nat this to avoid translating the devices that will receive traffic on that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 15 Jan 2012 03:38:06 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-01-15T03:38:06Z</dc:date>
    <item>
      <title>Port passthrough on 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857478#M488629</link>
      <description>&lt;P&gt;In a cisco firewall 5520 how could you take a public wan connection and pass it to another firewall behind the 5520 without using nat. How could you put a single port on the 5520 into transparent or passthrough much like you can on a broadband modem?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:14:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857478#M488629</guid>
      <dc:creator>georgiapb78</dc:creator>
      <dc:date>2019-03-11T22:14:29Z</dc:date>
    </item>
    <item>
      <title>Port passthrough on 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857479#M488630</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ga,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me see if a understand, you just want to permit traffic on the firewall on xx port..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then what you need to do is open that port using an ACL on the interface where the packet will arrive.. If you have nat control enabled on the ASA you can use a nat 0 or a Identity nat this to avoid translating the devices that will receive traffic on that port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jan 2012 03:38:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857479#M488630</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-15T03:38:06Z</dc:date>
    </item>
    <item>
      <title>Port passthrough on 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857480#M488631</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes I have a public ip address from the isp and I wan't to pass all traffic from it to the wan of a sonicwall firewall that sits on a vlan behind the 5520.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;currently the 5520 is doing a nat on this traffic and then sending to the wan of the sonicwall which is causing stability problems when i ssl vpn into the sonicwall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jan 2012 04:43:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857480#M488631</guid>
      <dc:creator>georgiapb78</dc:creator>
      <dc:date>2012-01-15T04:43:28Z</dc:date>
    </item>
    <item>
      <title>Port passthrough on 5520</title>
      <link>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857481#M488632</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Ga,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok so what you need to do is the nat on the SonicWall and then just an Identity nat on the ASA, at least thats how I see it..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say the internal address is 192.168.12.25 and the public ip address that the host needs to use is 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so on the sonic wall do the nat 192.168.12.25 to 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then on the asa just an identity nat 1.1.1.1 to 1.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this makes sense. I would like to know If I understand the problem you are facing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 15 Jan 2012 08:57:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/port-passthrough-on-5520/m-p/1857481#M488632</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-01-15T08:57:36Z</dc:date>
    </item>
  </channel>
</rss>

