<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic What is the best way to bypass NAT on FWSM in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764430#M533217</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the main difference between using identity nat and disabling nat control&lt;/P&gt;&lt;P&gt;Is there a benefit to keeping nat control on and using the nat (outside)&amp;nbsp; 0&amp;nbsp; method&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Aug 2011 02:29:05 GMT</pubDate>
    <dc:creator>rrockliff</dc:creator>
    <dc:date>2011-08-18T02:29:05Z</dc:date>
    <item>
      <title>What is the best way to bypass NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764428#M533215</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I want to setup my FWSM so that the outside networks can communicate with the inside networks on their real ip address and visa versa. This is not an Internet facing Firewall and only being used to filter traffic between some secure networks, all of the users, domain controllers etc will sit on the outside, the mission critical devices will sit on the inside networks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Should i disable NAT control&lt;/P&gt;&lt;P&gt;or create nat rules similar to bellow using identity nat &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.1.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;and &lt;/P&gt;&lt;P&gt;nat (outside) 0 10.1.20 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any assistance&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Richard&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333;"&gt;﻿&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:13:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764428#M533215</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2019-03-11T21:13:31Z</dc:date>
    </item>
    <item>
      <title>What is the best way to bypass NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764429#M533216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can do both, eith disable nat-control and just allow the traffic from outside to inside through ACL's, or use nat exempt, something like this:&lt;/P&gt;&lt;P&gt;Lets say your source network on outside is 10.0.0.0/8 and inside is 20.1.0.0/16, then&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 10.0.0.0 255.0.0.0 20.1.0.0 255.255.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would translate the ip into themselves, and is the correct way to do it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please rate helpful posts&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 02:20:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764429#M533216</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T02:20:47Z</dc:date>
    </item>
    <item>
      <title>What is the best way to bypass NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764430#M533217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the reply,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the main difference between using identity nat and disabling nat control&lt;/P&gt;&lt;P&gt;Is there a benefit to keeping nat control on and using the nat (outside)&amp;nbsp; 0&amp;nbsp; method&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 02:29:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764430#M533217</guid>
      <dc:creator>rrockliff</dc:creator>
      <dc:date>2011-08-18T02:29:05Z</dc:date>
    </item>
    <item>
      <title>What is the best way to bypass NAT on FWSM</title>
      <link>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764431#M533218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well there is no difference, enabling nat-control and using identity nat is only helpful if you want to nat all traffic but some specific traffic or subnet need not be natted, so you use nat exempt.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Moreover nat exempt is helppful because, you can specify the destination as well, along with the source, so as in my example, if the same subnet is going to 30.0.0.0, it would need natting, so it makes things a bit flexible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Aug 2011 02:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-is-the-best-way-to-bypass-nat-on-fwsm/m-p/1764431#M533218</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-08-18T02:34:13Z</dc:date>
    </item>
  </channel>
</rss>

