<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat exempt Question in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445045#M662402</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The internal 172.16.34.208 can't get out to the Internet?&lt;/P&gt;&lt;P&gt;But you said is reachable from the Internet correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an ACL applied to the inside interface? You can check with ''sh run access-group''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other machines on the inside interface have Internet access as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 01 Jul 2010 02:10:07 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-07-01T02:10:07Z</dc:date>
    <item>
      <title>Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445042#M662337</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I currently have a Static Nat for example ( web1-internal ) to ( web1-external ) - see Static Nat below !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which allows external hosts to connect on a public address and then get translated to the internal address host !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What l want to do now is permit http traffic from this internal host to outside but for some reason it is not working !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried adding a nat exempt rule using the inside host translated on the outbound interface with no luck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And also adding a access-list to the inside interface off :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inbound_inside permit tcp host web1 any eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current Static Nat rule is :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;static (inside,outside) web1-xlate web1 netmask 255.255.255.255 tcp 1000 500&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example IP Addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;web1 : 172.16.34.208&lt;/P&gt;&lt;P&gt;web1-xlate : 203.14.59.50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if you need more info or config !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Simon&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:05:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445042#M662337</guid>
      <dc:creator>sgalloway</dc:creator>
      <dc:date>2019-03-11T18:05:46Z</dc:date>
    </item>
    <item>
      <title>Re: Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445043#M662343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Simon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The static NAT that you mention is bidirectional.&lt;/P&gt;&lt;P&gt;This means that it will work for allowing inbound traffic to the public IP and outbound traffic from the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow outbound traffic nothing needs to be done because it is permitted by default.&lt;/P&gt;&lt;P&gt;(if you already have an ACL applied to the inside interface, then the traffic should be specified to be permitted).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To allow inbound traffic, you should explicitly allow the traffic in the ACL applied to the outside interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 01:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445043#M662343</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-07-01T01:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445044#M662363</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I already have a acl on the outside interface :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list inbound_outside permit tcp any host web1-xlate eq www&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This rule works fine !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but going the other way with initiating the connection from the internal web1&amp;nbsp; ( 172.16.34.208 ) to the outside doesn't work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;E.g l want to http to outside from web1 internally but it doesn't work ???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any more suggestions !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your prompt reply - much appreciated !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 02:04:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445044#M662363</guid>
      <dc:creator>sgalloway</dc:creator>
      <dc:date>2010-07-01T02:04:41Z</dc:date>
    </item>
    <item>
      <title>Re: Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445045#M662402</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The internal 172.16.34.208 can't get out to the Internet?&lt;/P&gt;&lt;P&gt;But you said is reachable from the Internet correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an ACL applied to the inside interface? You can check with ''sh run access-group''&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The other machines on the inside interface have Internet access as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 02:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445045#M662402</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-07-01T02:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445046#M662419</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Federico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;all sorted now ,&amp;nbsp;&amp;nbsp; for some reason the guys that setup this internal server forgot to put the DNS Server in the IP addressing !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Http traffic from this internal server is now Fine !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you so much for your time Much appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SG&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 02:19:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445046#M662419</guid>
      <dc:creator>sgalloway</dc:creator>
      <dc:date>2010-07-01T02:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Nat exempt Question</title>
      <link>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445047#M662464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glad to hear that &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jul 2010 02:21:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-exempt-question/m-p/1445047#M662464</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-07-01T02:21:04Z</dc:date>
    </item>
  </channel>
</rss>

