<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Explanation of static line in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065899#M893615</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;allows the dmz to see inside hosts as 192.168.0.0/24 and it also allows the return traffic as 192.168.0.0/24, right? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really hope so. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely spot on ie. the return traffic is directed to 192.168.0.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm just trying to figure out what scenario would require you to go the other direction (dmz, inside). Or if there is such a beast. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oops, maybe i didn't explain myself well enough in previous post -:).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon! Get some rest! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yep, will do. Appreciate the ratings and always happy to try and help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Nov 2008 22:36:13 GMT</pubDate>
    <dc:creator>Jon Marshall</dc:creator>
    <dc:date>2008-11-13T22:36:13Z</dc:date>
    <item>
      <title>Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065892#M893608</link>
      <description>&lt;P&gt;Let's say that I have three subnets:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;45.11.22.33 - outside&lt;/P&gt;&lt;P&gt;192.168.1.1 - dmz&lt;/P&gt;&lt;P&gt;10.200.5.0 - inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know that by default on an ASA/PIX, I have to have a static and acl to allow traffic in from outside-dmz, dmz-inside, outside-inside. Right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My statics could look like&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,outside)45.11.22.34 192.168.1.50 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outside permit tcp any host 45.11.22.34 eq 25&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far so good. Now, I've seen some configs, and here's my question, that has the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this disables translation for dmz into the inside, but does it automatically do it vice versa, or does one need to be created like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static(dmz,inside) 10.200.5.0 10.200.5.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I needed a DMZ host to connect to a host on the inside to a sql server, I would need to add in the dmz acl:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;permit tcp host 192.168.1.0 host 10.200.5.50 eq 1433&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For a host on the inside to connect to a web server on the dmz, I wouldn't need an access-list (unless I've already got one, and then I have to add an entry to allow the traffic out from inside to dmz).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess main question is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does the static(anywhere,anywhere) private network private network netmask mask line do really?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 14:12:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065892#M893608</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2019-03-11T14:12:51Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065893#M893609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It basically negates NAT to all intents and purposes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.10.0 192.168.10.10 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means traffic originated from inside client of 192.168.10.5 to DMZ will appear as 192.168.10.5 on the DMZ. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It also means traffic can be originated from the DMZ to any host on the inside using the inside addresses of 192.168.10.x.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 21:29:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065893#M893609</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-11-13T21:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065894#M893610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So if my interfaces were:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dmz: 192.168.1.1&lt;/P&gt;&lt;P&gt;inside: 10.10.10.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My static would look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this would allow my dmz hosts to look like inside hosts?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would I need to create a static going the opposite direction for this type of scenario?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 10.10.10.0 192.168.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does that work for both directions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 21:33:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065894#M893610</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-11-13T21:33:21Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065895#M893611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 10.10.10.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this would allow my dmz hosts to look like inside hosts? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Well yes it would but you need to be aware of the 192.168.1.x addresses already in use on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit - sorry i'm having a few drinks tonight. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.0 10.10.10.0 netmask 255.255.255.0 would make DMZ hosts appear as inside hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static statements are bi-directional so you do not need corresponding statements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 21:41:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065895#M893611</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-11-13T21:41:08Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065896#M893612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Bidirectional meaning that:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside, dmz) 192.168.1.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dmz 192.168.1.0 -- looks like -- 10.10.10.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and from the same line&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;inside 10.10.10.0 -- looks like -- 192.168.1.0?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that's the case, what determines which direction you generally want to use? Why would I choose to use (inside,dmz) vs (dmz,inside)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 21:46:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065896#M893612</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-11-13T21:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065897#M893613</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;John&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry mate but it's been a very boozy day. Much as i enjoy our discussions this is going to have be my last post of today &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.1.0 10.10.10.0 netmask 255.255.255.0 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means a host on the inside of 10.10.10.x will appear as 192.168.1.x on the dmz.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (dmz,inside) 192.168.1.0 10.10.10.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;means a host on the DMZ of 10.10.10.x will appear of 192.168.1.x on the inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll reread this tomorrow - really hope i got this right.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 22:19:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065897#M893613</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-11-13T22:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065898#M893614</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got it! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;static (inside,dmz) 192.168.0.0 192.168.0.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;allows the dmz to see inside hosts as 192.168.0.0/24 and it also allows the return traffic as 192.168.0.0/24, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really hope so. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm just trying to figure out what scenario would require you to go the other direction (dmz, inside). Or if there is such a beast. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon! Get some rest!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--John&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 22:30:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065898#M893614</guid>
      <dc:creator>John Blakley</dc:creator>
      <dc:date>2008-11-13T22:30:07Z</dc:date>
    </item>
    <item>
      <title>Re: Explanation of static line</title>
      <link>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065899#M893615</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;allows the dmz to see inside hosts as 192.168.0.0/24 and it also allows the return traffic as 192.168.0.0/24, right? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really hope so. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Absolutely spot on ie. the return traffic is directed to 192.168.0.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now I'm just trying to figure out what scenario would require you to go the other direction (dmz, inside). Or if there is such a beast. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oops, maybe i didn't explain myself well enough in previous post -:).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Jon! Get some rest! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yep, will do. Appreciate the ratings and always happy to try and help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 22:36:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/explanation-of-static-line/m-p/1065899#M893615</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2008-11-13T22:36:13Z</dc:date>
    </item>
  </channel>
</rss>

