<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Direct access to devices behind the firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491814#M700226</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks alot Jon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 18 May 2010 14:19:52 GMT</pubDate>
    <dc:creator>nimalrajphilips</dc:creator>
    <dc:date>2010-05-18T14:19:52Z</dc:date>
    <item>
      <title>Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491806#M700218</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to establish a direct connection to devices behind the firewall without NAT.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA5510 FW where both sides are private IP addresses. outside interface is Security level 0 and the inside interface is Security level 100.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have couple of servers behind the firewall. But i want them to access using their own IP addresses from outside, rather than using a mapped IP addresses.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried with Nat 0. But then realised, it wont work as the it only protects the source IP address of the devies behind the firewall to be translated.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it is possible to do that? If then, can you give me the step by step procedures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Nimalraj&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:47:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491806#M700218</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2019-03-11T17:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491807#M700219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can configure NAT exemption, ie: NAT 0 with access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Example&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;Inside host has ip address of 192.168.100.5&lt;/P&gt;&lt;P&gt;Outside host has ip address of 192.168.200.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For outside host to access inside host with its private ip address, you can configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip host 192.168.100.5 host 192.168.200.5&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On your inbound access-list on the outside interface, you would need to allow the access. Check the name of the outside access list: sh run access-group, then add the following access-list:&lt;/P&gt;&lt;P&gt;access-list &lt;OUTSIDE-ACL-NAME&gt; permit ip host 192.168.200.5 host 192.168.100.5&lt;/OUTSIDE-ACL-NAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ a more restrictive access-list if you wish.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 13:12:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491807#M700219</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-18T13:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491808#M700220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I tried that beforehand. But didnt work. The following is the configuration i have in my ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list inbound extended permit icmp any any&lt;BR /&gt;access-list inbound extended permit ip any any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat extended permit ip any host 172.16.1.20&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 0 access-list nonat&lt;BR /&gt;nat (inside) 1 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;access-group inbound in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the clients have internet access. But i cannot ping or connect to the 172.16.1.20 machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea..?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 13:40:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491808#M700220</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2010-05-18T13:40:32Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491809#M700221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are the servers ever going to go out from the inside and get translated to the public IP on your outside interface ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If they are do you know the specific source IPs you want to use to be able to access the servers on their private addresses from outside ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 13:47:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491809#M700221</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-05-18T13:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491810#M700222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No.. These servers are going to remain private. And there wont be any mapping from outside interface to the private IP address of the server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thats why i want some way to access the server using the private IP address, rather than using the mapped IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nimalraj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 13:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491810#M700222</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2010-05-18T13:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491811#M700223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Try this -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.10.0 172.16.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where 172.16.10.0/24 would be the server subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 13:54:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491811#M700223</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-05-18T13:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491812#M700224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That did the trick for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you elobrate more about this command. The reason i am asking is, it worked without even Nat0 command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thats why i am bit confused.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 14:11:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491812#M700224</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2010-05-18T14:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491813#M700225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;nimalrajphilips wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That did the trick for me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you elobrate more about this command. The reason i am asking is, it worked without even Nat0 command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thats why i am bit confused.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically it is a static NAT statement that takes precedence over your dynamic NAT statements. Usually you see something like -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 195.17.10.10 192.168.5.10 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where you are natting the private IP of 192.168.5.10 on the inside to the public IP of 195.17.10.10 on the outside. Yes the (inside,outside) are the wrong way round compared to IOS but you get used to it &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Using a static NAT allows connections to be initiated from the outside to the inside. With your example ie.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 172.16.10.0 172.16.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are simply saying present the 172.16.10.x addresses to the outside as 172.16.10.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note that on other vendors firewalls you wouldn't need this statement if the addresses you present are the same as the real addresses as in your scenario but this is another quirk of the Cisco Pix/ASA firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 14:16:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491813#M700225</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2010-05-18T14:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491814#M700226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks alot Jon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 14:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491814#M700226</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2010-05-18T14:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491815#M700227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you use the NAT exemption method, your ACL is the other way round.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You have "access-list nonat extended permit ip any host 172.16.1.20" configured. It should have been "access-list nonat extended permit ip host 172.16.1.20 any"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, as Jon's suggestion, you can also use the static to itself statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Both ways will work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 May 2010 22:24:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491815#M700227</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-05-18T22:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Direct access to devices behind the firewall</title>
      <link>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491816#M700228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will try this option too. Thanks for your update.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 May 2010 08:37:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/direct-access-to-devices-behind-the-firewall/m-p/1491816#M700228</guid>
      <dc:creator>nimalrajphilips</dc:creator>
      <dc:date>2010-05-19T08:37:28Z</dc:date>
    </item>
  </channel>
</rss>

