<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Query regarding same security interface in ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499478#M689801</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi ankur&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;read the thread and i want to tell that i am running through the same scenario and have to add 2 "nat 0 with ACLs" .So there are some times when single &lt;/P&gt;&lt;P&gt;nat 0 with ACL doesnot works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if there are some bugs associated with this , if required i can post the software version and asa model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;ankur&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 May 2010 09:40:32 GMT</pubDate>
    <dc:creator>anksachd</dc:creator>
    <dc:date>2010-05-24T09:40:32Z</dc:date>
    <item>
      <title>Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499472#M689787</link>
      <description>&lt;P&gt;Hi halijenn / pkampana/all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a query regarding traffic traversing from one interface to another with same security level as of other&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inside range -&amp;gt; 192.168.10.0/24&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Inside1 range -&amp;gt; 10.10.10.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The inside interface and inside1 interface have same security level 100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;[a] Consider that we have NAT-CONTROL enabled &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) I want to access the resources in bidirectional way If i want to access the resources from inside to inside1 and vice-versa with "nat 0 with ACL"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-intefrace&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;nat (inside) 0 access-list NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000; "&gt;access-list NONAT permit ip host 192.168.10.1 host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence please let me know if i need to accomplish one more access-list in addition to above for traffic from Inside1 to Inside .That is do i need to&lt;/P&gt;&lt;P&gt;configure the below as well ?However according to me NAT 0 with ACL is bidirectional and we should not require the below acl for bidirectional traffic .Also please let me know what would be the config if these 2 interfaces would not have been on same sec. level ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;access-list NONAT permit ip host 10.10.10.1 host 192.168.10.1&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) I want to access the resources in bidirectional way . If i want to access the resources from inside to inside1 and vice-versa with "static" command please let me know if below is correct configuraion , I.E one static will do or both statics are required ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter-intefrace&lt;/P&gt;&lt;P&gt;static (inside,inside1) 192.168.10.1 192.168.10.1&lt;/P&gt;&lt;P&gt;static (inside1,inside) 10.10.10.1 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;[b] Consider that we have NAT-CONTROL disabled &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If no nat-control is configured how will the above change ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:48:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499472#M689787</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2019-03-11T17:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499473#M689790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;[a] Consider that we&amp;nbsp; have NAT-CONTROL enabled &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) You are absolutely correct. NAT exemption (NAT 0 with ACL) is bidirectional. Hence you only need to configure the NAT and ACL in 1 direction.&lt;/P&gt;&lt;P&gt;If you apply the NAT exemption on the inside interface, it would be as you have stated:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside) 0 access-list&amp;nbsp; NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT permit ip host 192.168.10.1 host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ alternatively you can configure the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside1) 0 access-list&amp;nbsp; NONAT-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT-1 permit ip host 10.10.10.1 &lt;/STRONG&gt;&lt;STRONG style="color: #ff0000;"&gt;host 192.168.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it would be 1 or the other, not both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the security level is different, ie: inside - 100, inside1 - 90, then NAT exemption is always configured in the direction of high security level towards the low security level, and again, it is bidirectional, so you should only configure the following:&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside) 0 access-list&amp;nbsp; NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT permit ip host 192.168.10.1 host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) Static statement works exactly the same as NAT exemption above. It is also bidirectional. So you only need to configure 1 static line:&lt;/P&gt;&lt;P&gt;Either this:&lt;/P&gt;&lt;P&gt;static (inside,inside1) 192.168.10.1 192.168.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ this:&lt;/P&gt;&lt;P&gt;static&amp;nbsp; (inside1,inside) 10.10.10.1 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not both.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;[b] Consider that we&amp;nbsp; have NAT-CONTROL disabled &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If you have nat-control disable, then for the same security interface, you don't have to configure any NAT exemption or static statement. However, if it is different security level, traffic from high to low security level, you don't need any NAT exemption or static, however, traffic originated from low security level towards high security level, you still need to configure NAT exemption or static as per the above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However you can't have any NAT statement at all configured on the interface because even if nat-control is disabled, and if you have 1 NAT statement, for example: nat (inside) 1 0 0, this will turn nat-control back on automatically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that answers your questions.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2010 11:13:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499473#M689790</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-19T11:13:47Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499474#M689793</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This was excellent expalantion !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) In part [b] if i have "no nat-control" and the following statement is already there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat(inside) 1 0 0&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if inside1 is having same-security level then with above statement enabled the nat-control will turn back on automatically .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence traffic from inside to inside1 will require below statement and inside1 to inside reachability will be accomplished automatically .Please correct me if i am wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside) 0 access-list&amp;nbsp; NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT permit ip host 192.168.10.1 host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now if inside1 is having lower security level and inside the higher one , STILL the above command will do .Please correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) In part [b] if i have "no nat-control" and there would have been no "nat(inside) and global(outside)" , then if both the inside and inside1 are at same-security level then there is no requirement for nat 0 with ACL .right ? However if both on diff sec level , only the lower (inside1) would require&lt;/P&gt;&lt;P&gt;nat 0 with acl .Let me know if it is correct ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 May 2010 07:47:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499474#M689793</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-05-22T07:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499475#M689794</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You are absolutely correct with both 1) and 2), with 1 minor correction on the following statement on 2):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"However if both on diff sec level , only the lower (inside1) would&amp;nbsp; require nat 0 with acl .Let me know if it is correct ?":&lt;/P&gt;&lt;P&gt;--&amp;gt; If security level is different, then you require either static or nat exemption for traffic initiated from the lower security level, however, as far as the nat exemption (nat 0 with acl) is concern, it should be configured on the higher security level interface (and it works bidirectionally, so traffic initiated from the lower security level will also work).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that answers your question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 May 2010 07:57:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499475#M689794</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-22T07:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499476#M689797</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;thanks for the reply .does that means we have to apply this on higher sec interface &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #f8fafd;"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside) 0 access-list&amp;nbsp; NONAT&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT permit ip host 192.168.10.1 host 10.10.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if we dont apply above will the below work if applied on lower sec interface as again this is bidirectional NAT ? According to me it will not&lt;/P&gt;&lt;P&gt;as you said , as this is the case of different sec level interfaces and even if lower requires to speak to higher and we require nat0 with ACL to&lt;/P&gt;&lt;P&gt;accomplish it , the above statement will be correct statement .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside1) 0 access-list&amp;nbsp; NONAT-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp; NONAT-1 permit ip host 10.10.10.1 &lt;/STRONG&gt;&lt;STRONG style="color: #ff0000;"&gt;host 192.168.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 10:52:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499476#M689797</guid>
      <dc:creator>ankurs2008</dc:creator>
      <dc:date>2010-05-23T10:52:24Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499477#M689800</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;nat (inside1) 0 access-list&amp;nbsp;&amp;nbsp; NONAT-1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #ff0000;"&gt;access-list&amp;nbsp;&amp;nbsp; NONAT-1 permit ip host 10.10.10.1 &lt;/STRONG&gt;&lt;STRONG style="color: #ff0000;"&gt;host 192.168.10.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;will also work. Just from best practise point of view, it is recommended to apply NAT exemption on the high security level interface. This provides consistency in your configuration, ie: instead of having some interface having some NAT exemption on lower security level and some on high security level, this is to ensure that NAT exemption is only configured on the higher security level interface towards lower security level interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 May 2010 11:04:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499477#M689800</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-23T11:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499478#M689801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi ankur&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;read the thread and i want to tell that i am running through the same scenario and have to add 2 "nat 0 with ACLs" .So there are some times when single &lt;/P&gt;&lt;P&gt;nat 0 with ACL doesnot works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;halijenn&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if there are some bugs associated with this , if required i can post the software version and asa model&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;&lt;P&gt;ankur&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 09:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499478#M689801</guid>
      <dc:creator>anksachd</dc:creator>
      <dc:date>2010-05-24T09:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Query regarding same security interface in ASA</title>
      <link>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499479#M689802</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not too sure what you mean by single nat 0 with ACL does not work.&lt;/P&gt;&lt;P&gt;It should always work, and should be applied to the high security level interface, and make sure that you "clear xlate" after configuration changes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 May 2010 11:41:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/query-regarding-same-security-interface-in-asa/m-p/1499479#M689802</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-24T11:41:18Z</dc:date>
    </item>
  </channel>
</rss>

