<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static NAT on ASA query in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530314#M607433</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the below setting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 33.33.33.1 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a packet comes from the inside to destination 33.33.33.1, how will the inspection and traffic flow go?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking that the firewall, upon receipt of the packet from an inside host, will forward the packet to the outside interface.&amp;nbsp; Upon reaching the outside interface, since there is no ACL applied on the outside that will allow inside IP addresses to enter the DMZ zone, the packet get dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above analysis correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 19:05:54 GMT</pubDate>
    <dc:creator>marcusbrutus</dc:creator>
    <dc:date>2019-03-11T19:05:54Z</dc:date>
    <item>
      <title>Static NAT on ASA query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530314#M607433</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Given the below setting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 33.33.33.1 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a packet comes from the inside to destination 33.33.33.1, how will the inspection and traffic flow go?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am thinking that the firewall, upon receipt of the packet from an inside host, will forward the packet to the outside interface.&amp;nbsp; Upon reaching the outside interface, since there is no ACL applied on the outside that will allow inside IP addresses to enter the DMZ zone, the packet get dropped.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the above analysis correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:05:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530314#M607433</guid>
      <dc:creator>marcusbrutus</dc:creator>
      <dc:date>2019-03-11T19:05:54Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530315#M607434</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike here I hope you are doing great. Not exactly, You will be able to access that resource only if you run DNS doctoring, Otherwise what you will be doing will be a hairping on the outside interface which is not allowed on the firewall. My suggestion for you if you want to access this host that is on the DMZ with the mapped IP, you can configure something like this&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 33.33.33.1 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That way you will be able to access that resource with the Mapped IP instead of using the private. Here is a document for reference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a00807968c8.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Nov 2010 05:05:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530315#M607434</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-06T05:05:00Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530316#M607435</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maykol,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i have both configurations running on the firewall, will it work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 33.33.33.1 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (dmz,inside) 33.33.33.1 10.0.0.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Nov 2010 05:55:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530316#M607435</guid>
      <dc:creator>marcusbrutus</dc:creator>
      <dc:date>2010-11-06T05:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Static NAT on ASA query</title>
      <link>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530317#M607436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sure, There will be no problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try it out and let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks !&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Nov 2010 19:35:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/static-nat-on-asa-query/m-p/1530317#M607436</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2010-11-06T19:35:49Z</dc:date>
    </item>
  </channel>
</rss>

