<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall static statements in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286180#M858883</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, no default redirection. 80 always goes to 80, 443 always goes to 443, if the service is unavailable (blocked by ACL), the service just fails and does not redirect to any other port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 06 Jul 2009 15:26:29 GMT</pubDate>
    <dc:creator>Collin Clark</dc:creator>
    <dc:date>2009-07-06T15:26:29Z</dc:date>
    <item>
      <title>Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286174#M858877</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Similar to statements put in routers for allowing internet based segment to access services hosted inside the network,firewall uses the static command ( if am correct).&lt;/P&gt;&lt;P&gt;My query is , if the inside server is hosting service on port 344( eg.) then should the static statement include port 344 also . In case if the port is not included will the access go about some default port like http.&lt;/P&gt;&lt;P&gt;Kindly explain.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:51:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286174#M858877</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2019-03-11T15:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286175#M858878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What are yhou refering to NAT or Access-lists?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 12:10:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286175#M858878</guid>
      <dc:creator>andrew.prince</dc:creator>
      <dc:date>2009-07-06T12:10:04Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286176#M858879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Both NAT &amp;amp; access list, i believe is required for externals to access services hosted inside of firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 12:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286176#M858879</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2009-07-06T12:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286177#M858880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the first NAT, you translate only a single port-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 75.50.95.73 80 192.168.1.5 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the second NAT you translate all ports. If you query port 123, it will be translated to port 123.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 75.50.95.73 192.168.1.5 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 12:54:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286177#M858880</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-06T12:54:21Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286178#M858881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Is it better to specify the statement as first one , since my understanding says during the connection translation to the local server ip inside the network, request would have to be pushed to the desired service port on that ip as well.&lt;/P&gt;&lt;P&gt;This will ensure the services are properly accessed.&lt;/P&gt;&lt;P&gt;If we use the 2nd statement, wouldnt it cause problems, in the sense that it may sometimes default to port 80 or something default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please correct if this is wrong.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 15:20:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286178#M858881</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2009-07-06T15:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286179#M858882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No it just means that you will be able to access your internal server on any port, it will not default to a specific port. So as long as the server will accept the connection on the port you want to use it will work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Where as the first statement is more for security purposes or needing to re use that public IP for other static translations.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 15:26:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286179#M858882</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-06T15:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286180#M858883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope, no default redirection. 80 always goes to 80, 443 always goes to 443, if the service is unavailable (blocked by ACL), the service just fails and does not redirect to any other port.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 15:26:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286180#M858883</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-06T15:26:29Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286181#M858884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;fine..so specifying redirection with respect to port only serves me from security viewpoint, but even if i dont specify the port explicity , request should go to the appropriate service.&lt;/P&gt;&lt;P&gt;No hindrance to service.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 15:45:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286181#M858884</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2009-07-06T15:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286182#M858885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeh pretty much but it can still be secure when forwarding all ports as long as your acl is configured correctly.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 15:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286182#M858885</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-06T15:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286183#M858886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok..that helps..&lt;/P&gt;&lt;P&gt;Now what if i use the first statement but i have two services http &amp;amp; https both listening on the internal server.&lt;/P&gt;&lt;P&gt;Would this cause a problem by not explicitly writing them in rules.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 16:09:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286183#M858886</guid>
      <dc:creator>suthomas1</dc:creator>
      <dc:date>2009-07-06T16:09:54Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286184#M858887</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have to create the rules and the statics. The statics build the road and the ACLs are the cops on the road, determining who is allowed on or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 16:16:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286184#M858887</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2009-07-06T16:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall static statements</title>
      <link>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286185#M858888</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as it's configured correctly it should work with no problems as below just like Colin wrote&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 75.50.95.73 80 192.168.1.5 80 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) tcp 75.50.95.73 443 192.168.1.5 443 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR you can forward all ports and use the acl to specify which ports the server can be accessed on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside) 75.50.95.73 192.168.1.5 netmask 255.255.255.255 &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Jul 2009 16:18:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-static-statements/m-p/1286185#M858888</guid>
      <dc:creator>kwillacey</dc:creator>
      <dc:date>2009-07-06T16:18:09Z</dc:date>
    </item>
  </channel>
</rss>

