<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: no nat and use of static/nat 0 on PIX in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121203#M622644</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for allowing traffic both ways you need to configure two things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first you needs a translation command of the translation of  the internal addresses to the outside addresses (even if you don't want translation of the source addresses). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic translation:&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.40.2.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command allows traffic passing through the firewall from inside to outside. Also responses to valid requests are allowed back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second thing you have to do:&lt;/P&gt;&lt;P&gt;if you want to allow sessions initiated from the outside to the inside, you have to configure access-lists.  Find the syntax of the access-list command on this page:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/ab.htm#xtocid7" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/ab.htm#xtocid7&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still have questions, let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 23 Nov 2002 13:04:48 GMT</pubDate>
    <dc:creator>tvanginneken</dc:creator>
    <dc:date>2002-11-23T13:04:48Z</dc:date>
    <item>
      <title>no nat and use of static/nat 0 on PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121201#M622596</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a scenario where I don't want to do any address translation. Is it sufficient to use only a static command e.g.:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.40.2.0 10.40.2.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for traffic both ways (outside to inside, inside to outside) ?  &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or do I also need a:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.40.2.0 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;to let traffic out (inside to outside)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards rolf&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:23:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121201#M622596</guid>
      <dc:creator>lunestadr</dc:creator>
      <dc:date>2020-02-21T06:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: no nat and use of static/nat 0 on PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121202#M622618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, by default the PIX doesn't perform any kind of NAT or filtering (from the inside to the outside) so i guess you don't have to configure any of those lines.&lt;/P&gt;&lt;P&gt;Have you tried the communications without those lines?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 22 Nov 2002 16:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121202#M622618</guid>
      <dc:creator>pferraz</dc:creator>
      <dc:date>2002-11-22T16:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: no nat and use of static/nat 0 on PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121203#M622644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for allowing traffic both ways you need to configure two things:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;first you needs a translation command of the translation of  the internal addresses to the outside addresses (even if you don't want translation of the source addresses). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dynamic translation:&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.40.2.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This command allows traffic passing through the firewall from inside to outside. Also responses to valid requests are allowed back in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The second thing you have to do:&lt;/P&gt;&lt;P&gt;if you want to allow sessions initiated from the outside to the inside, you have to configure access-lists.  Find the syntax of the access-list command on this page:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/ab.htm#xtocid7" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_62/cmdref/ab.htm#xtocid7&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still have questions, let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Nov 2002 13:04:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121203#M622644</guid>
      <dc:creator>tvanginneken</dc:creator>
      <dc:date>2002-11-23T13:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: no nat and use of static/nat 0 on PIX</title>
      <link>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121204#M622673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I done some tests myself and here is what I found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it IS sufficient to use only a static command e.g.: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 10.40.2.0 10.40.2.0 netmask 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for traffic both ways (outside to inside, inside to outside).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however, the best way to disable nat is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list no_nat permit ip any any&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list no_nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this will allow traffic both ways not to be nat'ed. The &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 10.40.2.0 255.255.255.0 0 0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;command will only handle traffic inside to outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards rolf&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 24 Nov 2002 08:51:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/no-nat-and-use-of-static-nat-0-on-pix/m-p/121204#M622673</guid>
      <dc:creator>lunestadr</dc:creator>
      <dc:date>2002-11-24T08:51:41Z</dc:date>
    </item>
  </channel>
</rss>

