<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow traffic through Outside - Inside ASA-5505 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415242#M728551</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally to allow traffic from a lower-security interface to a higher-security interface you need a STATIC NAT and an ACL allowing the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, as long as there a static translation for a host and an ACL permiting the traffic, you can come from the outside and access any host on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you say that depending on what address you're coming from, to be redirected to an specific ip on the inside, you mean using the outside IP of the ASA to redirect traffic based on ports?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, you can use the outside public IP of the ASA to redirect traffic to several internal hosts depending on the destination port of the connection.&lt;/P&gt;&lt;P&gt;I supposed you can use Policy NAT to specify where to go depending on the IP you're coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Mar 2010 13:39:53 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-03-16T13:39:53Z</dc:date>
    <item>
      <title>Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415241#M728550</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I been thinking quite a long time over this and i hope anyone here could help out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to "route" traffic through outside interface and depending on what ip adress you are coming from you are directed to a specific ip on the inside? I know how it works when using PAT but now it is rather a question of just let traffic flow directly to inside adress without any questions asked or rules depending of what ip you have when on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Asa only has one ipadress assigned (ouside). I think if i had more ip adresses on the outside i could map the traffic more easy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also...i´m a beginner at Cisco FW &lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Mattias&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:22:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415241#M728550</guid>
      <dc:creator>mattias</dc:creator>
      <dc:date>2019-03-11T17:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415242#M728551</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally to allow traffic from a lower-security interface to a higher-security interface you need a STATIC NAT and an ACL allowing the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, as long as there a static translation for a host and an ACL permiting the traffic, you can come from the outside and access any host on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you say that depending on what address you're coming from, to be redirected to an specific ip on the inside, you mean using the outside IP of the ASA to redirect traffic based on ports?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, you can use the outside public IP of the ASA to redirect traffic to several internal hosts depending on the destination port of the connection.&lt;/P&gt;&lt;P&gt;I supposed you can use Policy NAT to specify where to go depending on the IP you're coming from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Take a look:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/nat_overview.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 13:39:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415242#M728551</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-03-16T13:39:53Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415243#M728552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From outside i want to allow traffic to inside depending of what ip you are originating from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say FW Outside IP is 10.10.10.10&lt;/P&gt;&lt;P&gt;Inside is 192.168.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:Ip adresses that i want to get "full access" to internal ip is&lt;/P&gt;&lt;P&gt;Ouside ip 12.12.12.20 forwarded to 192.168.0.20&lt;/P&gt;&lt;P&gt;12.12.12.21 forwarded to 192.168.0.21&lt;/P&gt;&lt;P&gt;12.12.12.22 forwarded to 192.168.0.22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible to do`?&amp;nbsp; NAT by using source 12.12.12.20 and destination 192.168.0.20 service ANY?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mattias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 13:58:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415243#M728552</guid>
      <dc:creator>mattias</dc:creator>
      <dc:date>2010-03-16T13:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415244#M728553</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.12.12.21&amp;nbsp; 192.168.0.21 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.12.12.22&amp;nbsp; 192.168.0.22 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit ip host 10.10.10.10 host 12.12.12.21&lt;/P&gt;&lt;P&gt;access-list outside_in extended permit ip host 10.10.10.10 host 12.12.12.22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive-quote"&gt; &lt;/BLOCKQUOTE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 14:13:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415244#M728553</guid>
      <dc:creator>samuelpetrescu</dc:creator>
      <dc:date>2010-03-16T14:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415245#M728554</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks i will try this. I looks a bit backward to me (Cisco logic?!) but is the 12.12.12.20 (21) adress an outside adress equal to orginating adress that i tried to explain? Lan inside should be 192.168.0.21 (22). Correct?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Mattias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 14:42:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415245#M728554</guid>
      <dc:creator>mattias</dc:creator>
      <dc:date>2010-03-16T14:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415246#M728555</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip addresses 192.168.0.21&amp;nbsp; and 192.168.0.22 are inside addresses&lt;/P&gt;&lt;P&gt;Ip addresses&amp;nbsp; 12.12.12.21&amp;nbsp;&amp;nbsp; and&amp;nbsp; 12.12.12.21 are outside addresses (usually public IP's)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ip addresses 10.10.10.10 is an outside address where traffic was originated from.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example, allow only outside host 10.10.10.10 to access internal hosts 192.168.0.21 and 192.168.0.22.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Samuel Petrescu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 14:52:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415246#M728555</guid>
      <dc:creator>samuelpetrescu</dc:creator>
      <dc:date>2010-03-16T14:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Allow traffic through Outside - Inside ASA-5505</title>
      <link>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415247#M728556</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the example by Samuel...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 12.12.12.21&amp;nbsp; 192.168.0.21 netmask 255.255.255.255&lt;BR /&gt;static (inside,outside) 12.12.12.22&amp;nbsp; 192.168.0.22 netmask 255.255.255.255 &lt;BR /&gt; &lt;BR /&gt;access-list outside_in extended permit ip host 10.10.10.10 host 12.12.12.21&lt;BR /&gt;access-list outside_in extended permit ip host 10.10.10.10 host 12.12.12.22 &lt;BR /&gt;access-group outside_in in interface outside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside NATed address: 12.12.12.21 for inside local 192.168.0.21&lt;BR /&gt;Outside NATed address: 12.12.12.22 for inside local 192.168.0.22&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Then, the ACL allows IP from outside host 10.10.10.10 to both NATed addresses.&lt;/P&gt;&lt;P&gt;I don't think this is the redirection that you're asking, but is a valid configuration.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When outside 10.10.10.10 wants to access 12.12.12.21 it will be redirected to 192.168.0.21&lt;BR /&gt;On the other hand, when the same 10.10.10.10 wants to access 12.12.12.22 it will be redirected to&lt;BR /&gt;192.168.0.22&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this will work for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Mar 2010 14:52:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/allow-traffic-through-outside-inside-asa-5505/m-p/1415247#M728556</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-03-16T14:52:14Z</dc:date>
    </item>
  </channel>
</rss>

