<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Passing traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190563#M875199</link>
    <description>&lt;P&gt;I have a Cisco PIX 525 with 5 interfaces.  1 is the outside interface with a public address, and there is another public network in the DMZ.  Now there are no translations between the DMZ and outside as both contain routable addresses.  Now I have created the ACLS, for the outside to get to the DMZ and the traffic works fine.  My question is do I need to allow the traffic back from the DMZ or will the traffic be allowed to return due to it being an SPI firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also do I need a NAT 0 statement for traffic passing from the DMZ to the outside?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:03:04 GMT</pubDate>
    <dc:creator>networker99</dc:creator>
    <dc:date>2019-03-11T15:03:04Z</dc:date>
    <item>
      <title>Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190563#M875199</link>
      <description>&lt;P&gt;I have a Cisco PIX 525 with 5 interfaces.  1 is the outside interface with a public address, and there is another public network in the DMZ.  Now there are no translations between the DMZ and outside as both contain routable addresses.  Now I have created the ACLS, for the outside to get to the DMZ and the traffic works fine.  My question is do I need to allow the traffic back from the DMZ or will the traffic be allowed to return due to it being an SPI firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also do I need a NAT 0 statement for traffic passing from the DMZ to the outside?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:03:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190563#M875199</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2019-03-11T15:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190564#M875201</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lewis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not sure what you mean by no NAT translations. Have you turned NAT off ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even using public IP addresses on the DMZ you still need to have a NAT rule for traffic to be allowde from a lower to higher security interface eg. something like &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,outside) 195.17.10.0 195.17.10.0 netmask 255.255.255.240&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So have you turned NAT off or do you have a statement like the one above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have turned NAT off nothing is needed on DMZ interface ie. no nat statement and no acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you have a static statement like the one given above then you don't need to do anything else.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:05:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190564#M875201</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-11T13:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190565#M875202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a NO NAT statement for the DMZ subnet going anywhere&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:24:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190565#M875202</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2009-03-11T13:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190566#M875203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Lewis&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What is the actual config to do this on your firewall ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you experiencing any connectvity problems ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for the acl you don't one on the DMZ as return traffic from the DMZ to outside will be allowed due to the stateful nature of the firewall and connections from the DMZ can be initiated to a lower security interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Only if you wanted to &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a) restrict outbound traffic from DMZ &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;b) allow traffic from DMZ to a higher security interface such as the inside &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would you need an acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190566#M875203</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-11T13:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190567#M875204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've got it thanks.. I have one other question if you dont mind.  We also have an ASA set up with 2 interfaces one with 192.168.1.x and the other with 10.1.10.x, now we have the ACLs configured and traffic can pass between subnets without any NAT statement.. how is this possible?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:37:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190567#M875204</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2009-03-11T13:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190568#M875205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It may well be that you have nat-control turned off. If you have then you don't need NAT to allow traffic from lower to higher security interface but you still need acl.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:43:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190568#M875205</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-11T13:43:03Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190569#M875206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there is nothing to say it is switched off.  This is an ASA running v8.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 13:56:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190569#M875206</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2009-03-11T13:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190570#M875207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's because nat-control is disabled by default on ASA with v8.x software - &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="https://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/no.html#wp1753422" target="_blank"&gt;https://www.cisco.com/en/US/docs/security/asa/asa80/command/reference/no.html#wp1753422&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 14:00:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190570#M875207</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2009-03-11T14:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Passing traffic</title>
      <link>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190571#M875208</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Mar 2009 14:02:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/passing-traffic/m-p/1190571#M875208</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2009-03-11T14:02:58Z</dc:date>
    </item>
  </channel>
</rss>

