<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Firewall  inside &amp;lt;--&amp;gt; Outside access with out NAT ( Bidirect in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726102#M537124</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Josh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that wat you are referring to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer----------outside(ASA)inside---------3750-------------inside(PIX)outside---------------Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then also no worries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static internal_subnets internal_subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jul 2011 18:10:48 GMT</pubDate>
    <dc:creator>varrao</dc:creator>
    <dc:date>2011-07-13T18:10:48Z</dc:date>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirectional)</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726093#M537115</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest me to configure the standard way to configure my ASA FW for the below requirment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following is requirement :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Inside to outside network no nat should be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Outside to Inside No nat should be used.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.2.1.1 Layer 3 interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Router&lt;/P&gt;&lt;P&gt;Coreswitch--10.2.1.2.inside.FW..Out172.16.31.2......172.16.31.1 RouterA--10.241.2.1....10.241.2.2..ISP_MPLS.......ISP.10.241.2.X....Vendor..10.4.x.x&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently I have another few subnets within my Coreswitch 10.1.200.X and 10.1.222.X to be accessed to vendor network with out Nat translation and also the Vendor traffic from 10.4.x.x&amp;nbsp; outside network shoould be allowed with out NAT to be accessed to 10.1.200.x network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleae suggest me the required config for end -end routing/NAT/ACL..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please note that from router to ISP on both sides E-Bgp configured and on router A i can get all the Vendor Router inside networks published via E-bgp.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also i can ping from router A to vendor inside network 10.4.x.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Subnets are &lt;/P&gt;&lt;P&gt;172.16.31.0/24&lt;/P&gt;&lt;P&gt;10.2.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your high efforts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;KA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest me the required changes on ASA&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:51:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726093#M537115</guid>
      <dc:creator>virgoboy009</dc:creator>
      <dc:date>2019-03-11T20:51:48Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726094#M537116</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) No natting from inside to outside:&lt;/P&gt;&lt;P&gt;access-list nonat_inside permit ip 10.2.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list nonat_inside permit ip 10.1.200.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;access-list nonat_inside permit ip 10.1.222.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat_insisde&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2 No natting from outside to inside:&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.2.1.0 10.2.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.200.0 10.1.200.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.222.0 10.1.222.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And then you must have a access-list applied to outside interface wich permits the traffic that is allowed to go to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 08:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726094#M537116</guid>
      <dc:creator>kampmalm2</dc:creator>
      <dc:date>2011-06-28T08:18:55Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726095#M537117</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Paul,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one doubt here on your below NAT statement for NAT outside to inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;2No natting from outside to inside:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.2.1.0 10.2.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.200.0 10.1.200.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.222.0 10.1.222.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IS the Static command should be&amp;nbsp; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (outside,&lt;/STRONG&gt;&lt;STRONG&gt;inside&lt;/STRONG&gt;&lt;STRONG&gt;) 10.4.x.0 172.16.31.0 netmask 255.255.255.0&lt;/STRONG&gt;..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here 10.4.x.0 is Vendor network subnet and 172.16.31.0 is MY FW outside subnet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if not what scenarios the command will be &lt;/P&gt;&lt;P&gt;static (inside,outside) 10.1.200.0 10.1.200.0 netmask 255.255.255.0 for this requirement.&lt;/P&gt;&lt;P&gt;please let me know how we can use static ( inside, outside) ...to inititate traffic from outside to inside and what ACL should be used in regards to source to destintion for applying on in traffic for outside interface of FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Appreciate your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;KA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Jun 2011 09:48:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726095#M537117</guid>
      <dc:creator>virgoboy009</dc:creator>
      <dc:date>2011-06-28T09:48:00Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726096#M537118</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Karim,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you going to have any NAT configured at all on the firewall? If there is none configured, there is no need for the static or nat 0 statements above (given nat-control is disabled). All you need are ACLs on the outside interface to allow outside subnets to access the inside networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Prapanch&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jul 2011 22:34:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726096#M537118</guid>
      <dc:creator>praprama</dc:creator>
      <dc:date>2011-07-08T22:34:26Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726097#M537119</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prapanch,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With 8.4 there is no "nat-control" AFAIK.&amp;nbsp; Can I configure an 8.4 ASA without any NAT commands at all and expect traffic to traverse the device (with appropriate ACLs)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was under the impression from the docs that you must at least do Identity NAT.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 13:00:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726097#M537119</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T13:00:05Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726098#M537120</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Josh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is no concept of nat-control post 8.3 versions, so yes you would need atleast a identity nat configuration to pass the traffic through ASA. Kindly let me know if you need any config help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 13:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726098#M537120</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T13:07:36Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726099#M537121</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Varun,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what I am doing:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer&amp;nbsp; -&amp;gt;&amp;nbsp; ASA 5520&amp;nbsp; -&amp;gt;&amp;nbsp; 3750X&amp;nbsp; -&amp;gt;&amp;nbsp; PIX&amp;nbsp; -&amp;gt;&amp;nbsp; Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am protecting the "3750X" portion of the network from the Customer network.&amp;nbsp; The customer uses the Internet through the PIX.&amp;nbsp; There cannot be any NAT at all on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some of this going on which seems to be the appropriate Identity NAT:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Inet&lt;/P&gt;&lt;P&gt; subnet 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object network Inet&lt;/P&gt;&lt;P&gt; nat (3750x,customer) static 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My ACLs are permit IP any any on both interfaces.&amp;nbsp; Customer has the lower security level.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;=======&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Connectivity from the Customer to the Internet is very spotty.&amp;nbsp; It almost looks like an MTU issue - some websites load, others do not, pings are good to go everywhere.&amp;nbsp; When I replace that ASA with a Cisco router, everything works great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want the ASA to behave like a router (no NAT) but provide nice ACL, packet inspection and logging features.&amp;nbsp; I could do this easily in the past with an ASA using "nat 0" or "no nat-control."&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 13:28:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726099#M537121</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T13:28:15Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726100#M537122</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Josh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would need the following nat config to exempt all customer network:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say your customer network has 3 networks:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;192.168.1.0&lt;/P&gt;&lt;P&gt;192.168.2.0&lt;/P&gt;&lt;P&gt;192.168.3.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and youi want to exempt these networks completely:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you would need:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;object-group network internal_subnets&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object subnet 192.168.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object subnet 192.168.2.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&amp;nbsp; network-object subnet 192.168.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static internal_subnets internal_subnets&amp;nbsp;&amp;nbsp; (assuming your cust network is on the inside interafce)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats it.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You just need these nats.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726100#M537122</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T18:04:30Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726101#M537123</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Consider that the entire Internet is "internal" in this configuration.&amp;nbsp; The customer is "external" and the 3750x areas + the Internet are "internal".&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726101#M537123</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T18:06:40Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726102#M537124</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Josh,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is that wat you are referring to:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Customer----------outside(ASA)inside---------3750-------------inside(PIX)outside---------------Internet&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then also no worries:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static internal_subnets internal_subnets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats it...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:10:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726102#M537124</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T18:10:48Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726103#M537125</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And by internal_subnets do you mean 0.0.0.0/0?&amp;nbsp; If I only list the actual subnets in the 3750x area, the customer will not be able to reach the Internet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726103#M537125</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T18:12:51Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726104#M537126</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Or would it be:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (outside,inside) source static customer_subnets customer_subnets&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:14:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726104#M537126</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T18:14:12Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726105#M537127</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I mean the customer_subnets, the one that I mentioned in the configuration. On the PIX device you must be having a nat statement, something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;global (outside) 1 &lt;PUBLIC ip=""&gt;&lt;/PUBLIC&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so this would give internet access to all IP addresses on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:16:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726105#M537127</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T18:16:57Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726106#M537128</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will give that a try next week and come back here to let you know.&amp;nbsp; Yes the PIX is NATing to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Josh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:19:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726106#M537128</guid>
      <dc:creator>JOSH GANT</dc:creator>
      <dc:date>2011-07-13T18:19:45Z</dc:date>
    </item>
    <item>
      <title>ASA Firewall  inside &lt;--&gt; Outside access with out NAT ( Bidirect</title>
      <link>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726107#M537129</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem Josh!!!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you ahve any issues, do post ot to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:21:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-firewall-inside-lt-gt-outside-access-with-out-nat/m-p/1726107#M537129</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-07-13T18:21:43Z</dc:date>
    </item>
  </channel>
</rss>

