<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA static in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-static/m-p/1426875#M742153</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't configure static (inside,dmz) 0.0.0.0 --&amp;gt; you will need to be specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;A few options&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;1) You can group your static statement with a wider subnet mask.&lt;/P&gt;&lt;P&gt;Eg: static (inside,dmz) 192.168.128.0 192.168.128.0 netmask 255.255.248.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Do you perform NATing at all going through this firewall? If you don't have NAT statement, you can configure "no nat-control" and you don't have to configure any static translation if you don't want to translate traffic between inside and dmz interface. However, if you have 1 NAT statement (eg: nat (inside) 1 0 0) then, you can't use this method.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) You can also configure NAT exemption:&lt;/P&gt;&lt;P&gt;ie: if DMZ is 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.128.0 255.255.248.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, you only need to configure more access-list lines (you can group all your internal network into wider subnets wherever possible).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 18 Mar 2010 11:49:15 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2010-03-18T11:49:15Z</dc:date>
    <item>
      <title>ASA static</title>
      <link>https://community.cisco.com/t5/network-security/asa-static/m-p/1426872#M742150</link>
      <description>&lt;P&gt;I would like to any ip from dmz to inside or inside to dmz using own ip without NAT, so i type the following sentense to ASA.&amp;nbsp; &lt;/P&gt;&lt;P&gt;static (inside, dmz) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;however, amost all pc in dmz fail to ping each others and I noticed that the ASA trigger proxy-arp to function.&lt;/P&gt;&lt;P&gt;And I want to know what is the real meaning of this "static (inside, dmz) 0.0.0.0 0.0.0.0 netmask 0.0.0.0" ??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, if i type&lt;/P&gt;&lt;P&gt;static (inside, dmz) 168.18.0.0 168.18.0.0 netmask 255.255.0.0&lt;/P&gt;&lt;P&gt;the proxy-arp would not be function and only bridging the 168.18.0.0/24.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:23:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static/m-p/1426872#M742150</guid>
      <dc:creator>szekahungdanny</dc:creator>
      <dc:date>2019-03-11T17:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: ASA static</title>
      <link>https://community.cisco.com/t5/network-security/asa-static/m-p/1426873#M742151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To create static statement, you would need to be more specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example: if your inside network is 192.168.100.0/24, you would configure the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above statement works bidirectionally, ie: you do not have to configure the opposite, ie: static (dmz,inside) statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My recommendation is to configure static statement from high security level to low security level. Assumption is inside is on 100 security level, and dmz is anything lower (eg: 20).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 08:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static/m-p/1426873#M742151</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-18T08:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA static</title>
      <link>https://community.cisco.com/t5/network-security/asa-static/m-p/1426874#M742152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply. I still wanna to know why "static (inside,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0" would not trigger proxy-arp?&lt;/P&gt;&lt;P&gt;but "static (inside,dmz) 0.0.0.0 0.0.0.0 netmask 0.0.0.0" would trigger proxy-arp??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;also, since i have thousand of network in inside, so i need to create a thousand of static map..&lt;/P&gt;&lt;P&gt;that mean...&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.100.0 192.168.100.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.101.0 192.168.101.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.102.0 192.168.102.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;static (inside,dmz) 10.0.0.0.0 10.0.0.0 netmask 255.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would it be too waste of time? that why i create 1 rule :&lt;/P&gt;&lt;P&gt;static (inside,dmz) 0.0.0.0 0.0.0.0 netmask 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so... any smart ways? also...why and in what condition that would trigger proxy-arp..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 11:38:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static/m-p/1426874#M742152</guid>
      <dc:creator>szekahungdanny</dc:creator>
      <dc:date>2010-03-18T11:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA static</title>
      <link>https://community.cisco.com/t5/network-security/asa-static/m-p/1426875#M742153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't configure static (inside,dmz) 0.0.0.0 --&amp;gt; you will need to be specific.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;A few options&lt;/STRONG&gt;&lt;/SPAN&gt;:&lt;/P&gt;&lt;P&gt;1) You can group your static statement with a wider subnet mask.&lt;/P&gt;&lt;P&gt;Eg: static (inside,dmz) 192.168.128.0 192.168.128.0 netmask 255.255.248.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Do you perform NATing at all going through this firewall? If you don't have NAT statement, you can configure "no nat-control" and you don't have to configure any static translation if you don't want to translate traffic between inside and dmz interface. However, if you have 1 NAT statement (eg: nat (inside) 1 0 0) then, you can't use this method.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) You can also configure NAT exemption:&lt;/P&gt;&lt;P&gt;ie: if DMZ is 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list nonat permit ip 192.168.128.0 255.255.248.0 172.16.1.0 255.255.255.0&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list nonat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case, you only need to configure more access-list lines (you can group all your internal network into wider subnets wherever possible).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Mar 2010 11:49:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-static/m-p/1426875#M742153</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2010-03-18T11:49:15Z</dc:date>
    </item>
  </channel>
</rss>

