<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: asa inbound access in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580881#M593821</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok , i und'stand now !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the fw is having the inside ip interface 199.X.X.1 and 199.X.X.11 assigned to inside machine ip (gateway is inside i/f) so will a static translation to itself still reqd in fw ? and will the firewall still do arping for this ip during the inbound access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 21 Jan 2011 10:36:15 GMT</pubDate>
    <dc:creator>techkamleshs</dc:creator>
    <dc:date>2011-01-21T10:36:15Z</dc:date>
    <item>
      <title>asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580875#M593815</link>
      <description>&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am confused if we arehaving a public ip 199.X.X.11 of inside server given to its nic and is behind asa inside and asa external range doesnot fall into that will i be able to access this server from outside .the access list is applied on the outside for the public ip 199.X.X.11 for dest port 80 and ISP has a route pinting tothe firewall for the server public ip .also is static required in asa ? sorry if this is basic as am new to cisco and donot know about this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;asa external ip - 64.X.X.9&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internal server ---(inside )fw(outside)--ISP---internet---user&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:37:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580875#M593815</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2019-03-11T19:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580876#M593816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart of the access-list to allow the traffic through, you would also need to have a static 1:1 NAT configured for the inside server. Configuration as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 199.X.X.11 199.X.X.11 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are however running version 8.3, then the configuration would be as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;object network obj-199.X.X.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; host 199.X.X.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; nat (inside,outside) static 199.X.X.11&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2011 10:19:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580876#M593816</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-19T10:19:11Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580877#M593817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for answering , why this static is required if we have a route in the isp router ( external to firewall) and will know to send it to the&lt;/P&gt;&lt;P&gt;firewall . statics are put for the outside to inside (private) mapping and we dont have that scenario here&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) 199.X.X.11 199.X.X.11 netmask 255.255.255.255&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2011 10:30:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580877#M593817</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-19T10:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580878#M593818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The reason why we need a static NAT statement is because if the traffic is being initiated from low security level (outside) towards high security level&lt;/P&gt;&lt;P&gt;(inside), it is a requirement to have 2 things configured:&lt;/P&gt;&lt;P&gt;1) static NAT translation (whether it is an actual NAT translation, or just a translation to itself)&lt;/P&gt;&lt;P&gt;2) ACL applied on the outside interface to allow the traffic through.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2011 10:43:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580878#M593818</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-19T10:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580879#M593819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi jennifer,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so will the firewall do an arp for 199.X.X.11 though it doesnot belong to it and what mac will be sent to router or its like the router will never do any arp lookup for this address ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2011 11:04:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580879#M593819</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-19T11:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580880#M593820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, it will not be ARPing for it since it is a routed interface. As you have advised, on the router there is route for the&amp;nbsp; 199.X.X.11 ip address to point towards the ASA outside interface ip address. So base on that route, it will be routed towards the ASA outside interface. On the ASA, either 199.X.X.11 is in the same subnet as the ASA inside interface, or if it's not, you would need to configure route for 199.X.X.11 on the ASA to point to the correct next hop on the inside interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Jan 2011 11:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580880#M593820</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-19T11:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580881#M593821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok , i und'stand now !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if the fw is having the inside ip interface 199.X.X.1 and 199.X.X.11 assigned to inside machine ip (gateway is inside i/f) so will a static translation to itself still reqd in fw ? and will the firewall still do arping for this ip during the inbound access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jan 2011 10:36:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580881#M593821</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-21T10:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580882#M593822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any thoughts on this ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the fw is having the inside ip interface 199.X.X.1 and 199.X.X.11 assigned to inside machine ip (gateway is inside i/f) so will a static translation to itself still reqd in fw ? and will the firewall still arp for this ip during the inbound access&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 10:09:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580882#M593822</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-28T10:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580883#M593823</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you don't have any NAT statement at all in your configuration, then you can configure:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no nat-control&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And this does not require any static NAT statement at all.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 10:22:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580883#M593823</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-28T10:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580884#M593824</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ok&amp;nbsp; , but here i am having multiple nat statements for outbound traffic with nat-control enabled , so considering this if you can let me know if static is still reqd in fw as below ? and if the firewall still arp for this ip for incoming traffic ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (private,public) 199.X.X.11 199.X.X.11&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 28 Jan 2011 10:31:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580884#M593824</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-28T10:31:56Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580885#M593825</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi experts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;anyone who can share views on this ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 11:17:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580885#M593825</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-01-31T11:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580886#M593826</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a few options depending on what have been configured on the ASA itself.&lt;/P&gt;&lt;P&gt;With ASA, eventhough you are not actually translating the IP address from inside towards outside, you would still need to configure the static 1:1 NAT to itself. It will not translate the ip address, it's just a configuration that still needs to be configured as per the ASA design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your last post, you mention that you have a few NAT statements for outbound, hence the "no nat-control" will not take effect anymore for that interface where you have configured the NAT statements. Again depending on what the NAT statement actually says:&lt;/P&gt;&lt;P&gt;1) for the ip address 199.x.x.11, if you do not want to translate, you can configure "no nat-control". This will allow you to pass inbound traffic from outside to inside interface without any translation. However, for outbound traffic from 199.x.x.11 to the internet, if your NAT statement does cover that particular IP Address, it will be NATed to the IP Address configured in the "Global" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) To be 100% sure that the 199.x.x.11 does not get NATed for both inbound and outbound traffic, then configure the static NAT statement to itself as advised earlier: "static (inside,outside) 199.x.x.11 199.x.x.11". Because static NAT takes precedence over NAT (dynamic NAT) statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please advise the reason why you are reluctant to configure static NAT to itself? This is widely used, and a must to be configured if you don't disable nat-control and have nat statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same is typically configured as well if you don't want to NAT traffic between inside interface and DMZ interface for example.&lt;/P&gt;&lt;P&gt;Eg: if your inside network is 10.10.10.0/24 and you don't want to NAT traffic between inside and DMZ, then you configure the following:&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 11:52:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580886#M593826</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-31T11:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580887#M593827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a few options depending on what have been configured on the ASA itself.&lt;/P&gt;&lt;P&gt;With ASA, eventhough you are not actually translating the IP address from inside towards outside, you would still need to configure the static 1:1 NAT to itself. It will not translate the ip address, it's just a configuration that still needs to be configured as per the ASA design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your last post, you mention that you have a few NAT statements for outbound, hence the "no nat-control" will not take effect anymore for that interface where you have configured the NAT statements. Again depending on what the NAT statement actually says:&lt;/P&gt;&lt;P&gt;1) for the ip address 199.x.x.11, if you do not want to translate, you can configure "no nat-control". This will allow you to pass inbound traffic from outside to inside interface without any translation. However, for outbound traffic from 199.x.x.11 to the internet, if your NAT statement does cover that particular IP Address, it will be NATed to the IP Address configured in the "Global" command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) To be 100% sure that the 199.x.x.11 does not get NATed for both inbound and outbound traffic, then configure the static NAT statement to itself as advised earlier: "static (inside,outside) 199.x.x.11 199.x.x.11". Because static NAT takes precedence over NAT (dynamic NAT) statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you please advise the reason why you are reluctant to configure static NAT to itself? This is widely used, and a must to be configured if you don't disable nat-control and have nat statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same is typically configured as well if you don't want to NAT traffic between inside interface and DMZ interface for example.&lt;/P&gt;&lt;P&gt;Eg: if your inside network is 10.10.10.0/24 and you don't want to NAT traffic between inside and DMZ, then you configure the following:&lt;/P&gt;&lt;P&gt;static (inside,DMZ) 10.10.10.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Jan 2011 11:52:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580887#M593827</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-31T11:52:40Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580888#M593828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jennifer ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for reply , but why will nat-control have an affect on the static statement . As per your statement specifically for "inbound" access&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"for the ip address 199.x.x.11, if you do not want to translate, you can configure "no nat-control". This will allow you to pass inbound traffic from outside to inside interface without any translation."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so whether i put "nat-control" or "no nat-control" , as per my thought static should be required from lower to higher security interface . why it is like that with the "no nat-control" , static is not required ? I am saying this as cisco guide says this :&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Traffic identified by a static command is not affected.&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html#wp1065667"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/configuration/guide/cfgnat.html#wp1065667&lt;/A&gt;In the NAT Control and Static NAT section in the following guide it is mentioned "NAT control does not affect static NAT "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_control.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 10:59:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580888#M593828</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-02-01T10:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580889#M593829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are a number of options depending on what you have on your current configuration as well as whether you need both inbound and outbound access from 199.x.x.11 not translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said earlier, the simplest way is to just configure the static 1:1 to itself, and you really don't have to worry about any other configuration within your existing config as that takes precedence over any other dynamic NAT statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct, "nat-control" only affects nat statement, not static nat statement, however, if you have a nat statement in your existing configuration, the outbound traffic from 199.x.x.11 will be nated accordingly. Configuring static nat statement will confirm that both outbound and inbound traffic will not be translated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Feb 2011 13:00:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580889#M593829</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-01T13:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580890#M593830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi jennifer&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for your reply again . i know that with the below static the identity source translation will also happen from private to public .&amp;nbsp; but i am not concerned for outbound . my requirment is only for inbound and i want to understand natcontrol . the theory in the documentation is coming against what i am observing in practical . i removed all the nat statements frm firewall and also did a "no nat-control" and without any NAT in my config , i am able to ping from outside to in on 199.X.X.11 which should not happen&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (private,public) 199.X.X.11 199.X.X.11&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- With "no nat-control" and without any NAT statements on firewall and just inbound ACL for 199.X.X.11 , i can ping inbound to&amp;nbsp; 199.X.X.11 without any static&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- With "nat-control" and without any NAT statements on firewall and just inbound ACL for 199.X.X.11 , i cannot ping without static command being in place&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so like i said , NAT control is affecting Static NAT. the document should not be telling that "NAT control does not affect static NAT "&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 12:42:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580890#M593830</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-02-03T12:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580891#M593831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is not affecting the static nat statement.&lt;/P&gt;&lt;P&gt;If you have the command "no nat-control", it will allow inbound connection without any static nat statement, because there is no control over any of the nat statements.&lt;/P&gt;&lt;P&gt;If you however have "nat-control", or any of the NAT statement with "no nat-control", it will impose the old translation rule where by you would need to configure static nat statement for inbound traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"nat-control" is a new feature from version 7.0 onwards. The old version of PIX (6.3 and below), there is no nat-control feature, and static nat statement is imposed for all inbound connection from low to high security level.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 17:47:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580891#M593831</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-03T17:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580892#M593832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If you have the command "no nat-control", it will allow inbound connection without any static nat statement, because there is no control over any of the nat statements."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;consider that fw doesnot have any nat command in it and no nat-control configured . now i put just nat-control without any nat statements . so isnt the natcontrol only for outbound traffic i.e from inside to outside ? so why do we need to put static for inbound traffic at this point of time . if nat-control is independent of static and only meant for outbound traffic , why static is required ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 12:14:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580892#M593832</guid>
      <dc:creator>techkamleshs</dc:creator>
      <dc:date>2011-02-04T12:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: asa inbound access</title>
      <link>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580893#M593833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I said earlier, disabling NAT with "no nat-control" is a new feature, and prior to the availability of this particular command, you will need to configure static NAT statement for inbound (from low to high security level) and there is no other option.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enabling "nat-control" brings back the old rule of having to have the static NAT statement for inbound traffic. This is the design for the ASA, and those are the design rule and how you configure it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Feb 2011 16:50:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inbound-access/m-p/1580893#M593833</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-02-05T16:50:03Z</dc:date>
    </item>
  </channel>
</rss>

