<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA Version 9+ ACL for NAT Hosts? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873477#M6141</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;What about if I must NAT internal host so they can be reached from Outside/internet via let's say 3389:&lt;BR /&gt;nat (insde,outside) dynamic (mapped IP address) service tcp 3889 3889&lt;BR /&gt;access-list Outside-IN extended permit tcp any host (real IP) eq 3389&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You will need to use static instead of dynamic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;nat (inside,outside) &lt;STRONG&gt;static&lt;/STRONG&gt; (mapped IP address) service tcp 3889 3889&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also RDP isn't that secure, it would probably be more secure using a RAVPN to allow access to the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
    <pubDate>Sat, 15 Jun 2019 08:06:02 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2019-06-15T08:06:02Z</dc:date>
    <item>
      <title>ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3872807#M6032</link>
      <description>&lt;P&gt;In understand order of operations are different. Let's say I wanted natted_host to reach ANY destination and ANY destination to reach natted_host which is on Inside interface. My ACL will still reference natted_hosts since they are being natted to outside interface?&amp;nbsp; What if they were being natted to let's say another internal host such as 20.20.20.20?&lt;BR /&gt;Here are my configs.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;object network Natted_Hosts&lt;BR /&gt;subnet 200.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;nat (any,outside) static interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;access-list inside extended permit ip object natted_Hosts any&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any object&amp;nbsp;&lt;SPAN&gt;Natted_Hosts&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:13:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3872807#M6032</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2020-02-21T17:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873380#M6035</link>
      <description>Hi,&lt;BR /&gt;For inbound traffic, NAT is processed before the ACL (ASA 8.3 - 9.x), therefore you always use the real IP address of the hosts in the ACL.&lt;BR /&gt;&lt;BR /&gt;HTH</description>
      <pubDate>Fri, 14 Jun 2019 20:44:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873380#M6035</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-06-14T20:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873419#M6037</link>
      <description>&lt;P&gt;Inbound traffic meaning for traffic returning from a host that was natted going outbound?&lt;BR /&gt;So if host 10.10.10.10 was natted to the Outside interface IP of 20.20.20.20, the ACL on the Outside interface IN should allow 10.10.10.10 correct?&lt;BR /&gt;This is the correct Syntax to do that right?&lt;BR /&gt;object network obj-10.10.10.10&lt;BR /&gt;nat (insde,outside) static interface&lt;BR /&gt;&lt;BR /&gt;What about if I must NAT internal host so they can be reached from Outside/internet via let's say 3389:&lt;BR /&gt;nat (insde,outside) dynamic (mapped IP address) service tcp 3889 3889&lt;BR /&gt;access-list Outside-IN extended permit tcp any host (real IP) eq 3389&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 00:57:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873419#M6037</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-06-15T00:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873474#M6140</link>
      <description>&lt;P&gt;let walk though on your configuration&lt;/P&gt;&lt;P&gt;------------------------------------------------&lt;/P&gt;&lt;P&gt;object network Natted_Hosts&lt;BR /&gt;subnet 200.10.10.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (any,outside) static interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;access-list inside extended permit ip object natted_Hosts any&lt;/P&gt;&lt;P&gt;access-group inside in interface inside&lt;/P&gt;&lt;P&gt;access-list outside extended permit ip any object Natted_Hosts&lt;/P&gt;&lt;P&gt;----------------------------------------------------------&lt;/P&gt;&lt;P&gt;first your object Natted_Hosts better use dynamic instead of static as you have a subnet behind outside with /24.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inside extended permit ip object natted_Hosts any&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-group inside in interface inside&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;this above rule can be seen as a first line of defense, but depends how to play and what protocols you allow or deny.&lt;/P&gt;&lt;P&gt;Example now here if the initiator is subnet&amp;nbsp; 200.10.10.0 255.255.255.0 and you want to allow only traffic ssh. you will write it as&lt;/P&gt;&lt;P&gt;access-list inside extended permit tcp object natted_Hosts any eq shh&lt;/P&gt;&lt;P&gt;access-list inside extended permit deny ip any any&lt;/P&gt;&lt;P&gt;access-group inside in interface inside.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now the ASA will narrow down the access at inside instead of doing it at outside. this is also classify as good practice to save your ASA cpu.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list outside extended permit ip any object Natted_Hosts&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;packet coming from outside interface is allow access to Natted_Hosts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in you example (any,outside) with subnet 200.10.10.0 255.255.255.0. will be translated to asa outside ip address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 07:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873474#M6140</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-15T07:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873477#M6141</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/124138"&gt;@CiscoBrownBelt&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;What about if I must NAT internal host so they can be reached from Outside/internet via let's say 3389:&lt;BR /&gt;nat (insde,outside) dynamic (mapped IP address) service tcp 3889 3889&lt;BR /&gt;access-list Outside-IN extended permit tcp any host (real IP) eq 3389&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;You will need to use static instead of dynamic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;nat (inside,outside) &lt;STRONG&gt;static&lt;/STRONG&gt; (mapped IP address) service tcp 3889 3889&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also RDP isn't that secure, it would probably be more secure using a RAVPN to allow access to the server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 08:06:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873477#M6141</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2019-06-15T08:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873555#M6142</link>
      <description>&lt;P&gt;When you say instead of doing it on the Outside you mean no longer needing "access-list outside extended permit ip any object Natted_Hosts"?&lt;BR /&gt;Also, so ASA proces ACL rules in the CPU all the time meaning I would not want humongous ACLs correct?&lt;/P&gt;&lt;P&gt;When would I really know to use "Static" vs "Dynamic"?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 16:43:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873555#M6142</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-06-15T16:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873558#M6143</link>
      <description>When would I really know to use "Static" vs "Dynamic"?</description>
      <pubDate>Sat, 15 Jun 2019 16:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873558#M6143</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-06-15T16:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873585#M6144</link>
      <description>&lt;P&gt;have a read on this link &lt;A href="https://www.geeksforgeeks.org/computer-network-dynamic-nat-on-asa/" target="_blank"&gt;https://www.geeksforgeeks.org/computer-network-dynamic-nat-on-asa/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 15 Jun 2019 18:27:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3873585#M6144</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2019-06-15T18:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Version 9+ ACL for NAT Hosts?</title>
      <link>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3875997#M6145</link>
      <description>If I have the below, hosts trying to reach this subnet from Outside are automatically untranslated correct?:&lt;BR /&gt;object network Natted_Hosts&lt;BR /&gt;subnet 200.10.10.0 255.255.255.0&lt;BR /&gt;nat (any,outside) static interface</description>
      <pubDate>Wed, 19 Jun 2019 12:12:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-version-9-acl-for-nat-hosts/m-p/3875997#M6145</guid>
      <dc:creator>CiscoBrownBelt</dc:creator>
      <dc:date>2019-06-19T12:12:52Z</dc:date>
    </item>
  </channel>
</rss>

