<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Nat or Router vs ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504110#M733924</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sushil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use either the ASA or router for NAT.&lt;/P&gt;&lt;P&gt;I prefer doing NAT on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally, you decide to do NAT on the device that has the public IP assigned.&lt;/P&gt;&lt;P&gt;If in this case, the router is having the public IP, I say NAT on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPsec VPN clients still can connect to the ASA if you create a STATIC NAT translation to redirect VPN traffic to the ASA.&lt;/P&gt;&lt;P&gt;So, the VPN clients will actually connect to the public IP of the router, which will redirect the connection to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If on the other hand, the ASA also has a public IP, so NAT on the ASA and terminate the VPNs on that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way, you can't go wrong, as long as the equipment that you have support the amount of traffic and connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 May 2010 13:36:58 GMT</pubDate>
    <dc:creator>Federico Coto Fajardo</dc:creator>
    <dc:date>2010-05-07T13:36:58Z</dc:date>
    <item>
      <title>Nat or Router vs ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504109#M733919</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What would be the best place to nat&amp;nbsp; in a network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router or ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Router would be terminating the ISP connection and then ASA in place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As ASA doesn't have the option of PBR.Is it would be better to have it on Router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other hand Wanted to run IPSEC on ASA,but how would remote users or Remote peer see this if it is sitting behind a natted router?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it to be done based out of deliverable or is there any thumb rule to this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Curious to know if router can be used instead of ASA for Nat?&lt;/P&gt;&lt;P&gt;What are pros and cons using this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Reg,&lt;/P&gt;&lt;P&gt;Sushil&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504109#M733919</guid>
      <dc:creator>sushil</dc:creator>
      <dc:date>2019-03-11T17:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: Nat or Router vs ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504110#M733924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sushil,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use either the ASA or router for NAT.&lt;/P&gt;&lt;P&gt;I prefer doing NAT on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Normally, you decide to do NAT on the device that has the public IP assigned.&lt;/P&gt;&lt;P&gt;If in this case, the router is having the public IP, I say NAT on the router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The IPsec VPN clients still can connect to the ASA if you create a STATIC NAT translation to redirect VPN traffic to the ASA.&lt;/P&gt;&lt;P&gt;So, the VPN clients will actually connect to the public IP of the router, which will redirect the connection to the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If on the other hand, the ASA also has a public IP, so NAT on the ASA and terminate the VPNs on that IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Either way, you can't go wrong, as long as the equipment that you have support the amount of traffic and connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Federico.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 13:36:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504110#M733924</guid>
      <dc:creator>Federico Coto Fajardo</dc:creator>
      <dc:date>2010-05-07T13:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: Nat or Router vs ASA</title>
      <link>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504111#M733929</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would prefer to use an ASA for the translations as they are designed and more efficient for it.&lt;/P&gt;&lt;P&gt;Routers can still do it as already suggested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 May 2010 15:06:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-or-router-vs-asa/m-p/1504111#M733929</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-05-07T15:06:40Z</dc:date>
    </item>
  </channel>
</rss>

