<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall static rule configuration in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326001#M858717</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Subodh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i understand your question correctly then the answer is that a static NAT translation is bi-directional ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 195.17.17.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means any traffic from outside coming to 195.17.17.1 will be translated to 10.1.1.1 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it also means any traffic coming from 10.1.1.1 on the inside will be translated to 195.17.17.1 on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from the outside the destination IP is changed from 195.17.17.1 to 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the inside the source IP is changed from 10.1.1.1 to 195.17.17.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this naswer your question ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 12 Jul 2009 15:13:27 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2009-07-12T15:13:27Z</dc:date>
    <item>
      <title>Firewall static rule configuration</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326000#M858713</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have very basic doubt about firewall static rule configuration.&lt;/P&gt;&lt;P&gt;When we configure a static rule to allow connections originated from out side world to inside world  on that particulart port and on that particular IP address.&lt;/P&gt;&lt;P&gt;For example : Public ip Address :A.B.C.D and port : 80.&lt;/P&gt;&lt;P&gt;Internal server : 10.1.1.1 which responds to user request.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outside = A.B.C.D on Port 80.&lt;/P&gt;&lt;P&gt;Redirected to 10.1.1.1 on inside zone with port 80. &lt;/P&gt;&lt;P&gt;Access list on outside permits user request from anywhere on A.B.C.D with port 80.&lt;/P&gt;&lt;P&gt;Now when 10.1.1.1 returns the user request how does inside interface behaves? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have NOT configured NAT-global configuration to access internet  from inside, as users are not allowed to browse internet. Only users from outside shoud be able to visit the web server.&lt;/P&gt;&lt;P&gt;Will the corresponding permit access list gets applied to inside interface. &lt;/P&gt;&lt;P&gt;That means if user initiates a internet connection from 10.1.1.1 ( that is from inside host ) will he be able to browse internet. Although there no configuration by ( NAT-global ).&lt;/P&gt;&lt;P&gt;Please share experience.&lt;/P&gt;&lt;P&gt;Thanks in adavnce.&lt;/P&gt;&lt;P&gt;Subodh&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:53:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326000#M858713</guid>
      <dc:creator>bapatsubodh</dc:creator>
      <dc:date>2019-03-11T15:53:54Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static rule configuration</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326001#M858717</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Subodh&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If i understand your question correctly then the answer is that a static NAT translation is bi-directional ie. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 195.17.17.1 10.1.1.1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means any traffic from outside coming to 195.17.17.1 will be translated to 10.1.1.1 on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But it also means any traffic coming from 10.1.1.1 on the inside will be translated to 195.17.17.1 on the outside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So from the outside the destination IP is changed from 195.17.17.1 to 10.1.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the inside the source IP is changed from 10.1.1.1 to 195.17.17.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this naswer your question ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Jul 2009 15:13:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326001#M858717</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-07-12T15:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static rule configuration</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326002#M858720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks Jon.Marshall, you have answered my question exactly. That indirectly means traffic from 10.1.1. to Out-side_world_Address  will be allowed by corresponding access-list applied on interface. &lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;subodh&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 12 Jul 2009 16:07:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-rule-configuration/m-p/1326002#M858720</guid>
      <dc:creator>bapatsubodh</dc:creator>
      <dc:date>2009-07-12T16:07:23Z</dc:date>
    </item>
  </channel>
</rss>

