<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions Regarding NAT on PIX/ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417505#M703373</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to flow from lower-security to higher-security interface you need:&lt;/P&gt;&lt;P&gt;STATIC NAT and ACL&lt;/P&gt;&lt;P&gt;If you have NAT-CONTROL disabled, you only need ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to flow from higher-security to lower-security interface you need:&lt;/P&gt;&lt;P&gt;NAT&lt;/P&gt;&lt;P&gt;If you have NAT-CONTROL disabled, you don't need any other commands.&lt;/P&gt;&lt;P&gt;If there's an existing ACL, it should allow the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT order of operation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. NAT 0 access-list&lt;/P&gt;&lt;P&gt;2. STATIC NAT/PAT&lt;/P&gt;&lt;P&gt;3. Policy NAT&lt;/P&gt;&lt;P&gt;4. Dynamic NAT/PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 12 Apr 2010 15:27:19 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-04-12T15:27:19Z</dc:date>
    <item>
      <title>Questions Regarding NAT on PIX/ASA</title>
      <link>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417504#M703357</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done a bit of reading on the topic of NAT on the PIX/ASA but still have a few questions that I'm looking for clarification on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the diagram attached, I'm thinking there are 3 ways to get this working with NAT. There is no need on the PIX/ASA in the diagram to allow the users to access the Internet. The Internet here is used only as a method to establish a LAN-to-LAN IPSec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; Method 1: no nat-control command. This should exempt ALL traffic from NAT, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------------------&lt;/P&gt;&lt;P&gt;Method 2: Static command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Inside,DMZ) 10.132.1.0 10.132.1.0 netmask 255.255.255.0 0 0&lt;BR /&gt;static (Inside,DMZ) 10.1.1.0 10.1.1.0 netmask 255.255.240.0 0 0&lt;BR /&gt;static (Inside,DMZ) 10.2.2.0 10.2.2.0 netmask 255.255.240.0 0 0&lt;BR /&gt;static (Inside,DMZ) 10.3.3.0 10.3.3.0 netmask 255.255.240.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (DMZ,Inside) 10.132.65.0 10.132.65.0 netmask 255.255.255.0 0 0&lt;BR /&gt;static (DMZ,Inside) 10.132.65.0 10.132.65.0 netmask 255.255.255.0 0 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (Outside,DMZ) 10.16.1.0 10.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-------------------------&lt;/P&gt;&lt;P&gt;Method 3: NAT/Global command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 0 10.132.1.0 255.255.255.0&lt;BR /&gt;nat (Inside) 0 10.1.1.0 255.255.255.0&lt;BR /&gt;nat (Inside) 0 10.2.2.0 255.255.255.0&lt;BR /&gt;nat (Inside) 0 10.3.3.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 10.132.65.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Outside) 0 10.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or possibly this could work as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (Inside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (DMZ) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;nat (Outside) 0 0.0.0.0 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Do I also need "global" statements like these in order for the "nat" commands to work properly or is that just needed if I was sending traffic to the Internet so the clients could browse websites?&lt;/P&gt;&lt;P&gt; global (Outside) 0 interface&lt;BR /&gt; global (DMZ) 0 interface&lt;BR /&gt; global (Inside) 0 interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- For traffic going from an interface with higher security level to a lower one, traffic should be allowed I believe.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If going from a lower security level to a higher one, I know I need an ACL to permit the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Do I also need a static NAT translation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Would the "nat (DMZ) 0 10.132.65.0 255.255.255.0" command work to exempt NAT on traffic from the lower security level interface to a higher one or would only the static NAT translation be looked at for this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- If both "static" and "nat" commands, are the "static" commands looked at first before the "nat" commands?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Pete&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:31:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417504#M703357</guid>
      <dc:creator>priedman1</dc:creator>
      <dc:date>2019-03-11T17:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Questions Regarding NAT on PIX/ASA</title>
      <link>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417505#M703373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to flow from lower-security to higher-security interface you need:&lt;/P&gt;&lt;P&gt;STATIC NAT and ACL&lt;/P&gt;&lt;P&gt;If you have NAT-CONTROL disabled, you only need ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For traffic to flow from higher-security to lower-security interface you need:&lt;/P&gt;&lt;P&gt;NAT&lt;/P&gt;&lt;P&gt;If you have NAT-CONTROL disabled, you don't need any other commands.&lt;/P&gt;&lt;P&gt;If there's an existing ACL, it should allow the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT order of operation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. NAT 0 access-list&lt;/P&gt;&lt;P&gt;2. STATIC NAT/PAT&lt;/P&gt;&lt;P&gt;3. Policy NAT&lt;/P&gt;&lt;P&gt;4. Dynamic NAT/PAT&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 15:27:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417505#M703373</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-04-12T15:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Questions Regarding NAT on PIX/ASA</title>
      <link>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417506#M703384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the help Frederico,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is very helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Pete&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 12 Apr 2010 18:00:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-regarding-nat-on-pix-asa/m-p/1417506#M703384</guid>
      <dc:creator>priedman1</dc:creator>
      <dc:date>2010-04-12T18:00:34Z</dc:date>
    </item>
  </channel>
</rss>

