<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: FWSM: no nat-control or nat-control in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122356#M915229</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there another way&lt;/P&gt;&lt;P&gt;also try and see it&lt;/P&gt;&lt;P&gt;let say ur inside network is &lt;/P&gt;&lt;P&gt;192.168.1.0/24&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list 100&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.1.1-.192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rate if helpful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 05 Aug 2008 23:49:39 GMT</pubDate>
    <dc:creator>Marwan ALshawi</dc:creator>
    <dc:date>2008-08-05T23:49:39Z</dc:date>
    <item>
      <title>FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122353#M915224</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We'r using FWSM with 2.3(4) s/w&lt;/P&gt;&lt;P&gt;We intend to do no nat-control. &lt;/P&gt;&lt;P&gt;However, Version3.2 apparently can do this. How do we enable no nat-control or a similar function on v2.3?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More requirement, ideally we would want no nat control on some dmz1s/out paths and nat control on some dmz2s/out path.&lt;/P&gt;&lt;P&gt;Is this acheivable in both 2.3 and 3.2?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;SS&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:25:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122353#M915224</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2019-03-11T13:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122354#M915225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;instead of playing with nat control do the following&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;lets say ur dmz1 subnet is 172.16.1.0 /24&lt;/P&gt;&lt;P&gt;and u wanna u se this subnet from the outside interface as there is no nat&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do:&lt;/P&gt;&lt;P&gt;static (dmz1, outside) 172.16.1.0 172.16.1.0 netmask 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then make the permit ACL&lt;/P&gt;&lt;P&gt;because in FWSM not like ASA traffic denied by default even from higher security level to less&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then if u  have device on dmz1 with ip 172.16.1.5 u gonna see it from outside as 172.16.1.5&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and this can be don between any two interfaces u want&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;good luck &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;please, if helpful rate&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2008 14:39:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122354#M915225</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-05T14:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122355#M915228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We'r trying to initiate (say ping for now) connections from inside to unknown/dynamically known outsides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can use 0.0.0.0 as outside to test. should the (outside, dmz1) work, if reversed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this directional change make any difference. In the mean time i'm going to (again!) test your suggestion.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2008 15:01:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122355#M915228</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2008-08-05T15:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122356#M915229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there another way&lt;/P&gt;&lt;P&gt;also try and see it&lt;/P&gt;&lt;P&gt;let say ur inside network is &lt;/P&gt;&lt;P&gt;192.168.1.0/24&lt;/P&gt;&lt;P&gt;access-list 100 permit ip 192.168.1.0 255.255.255.0 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 access-list 100&lt;/P&gt;&lt;P&gt;global (outside) 1 192.168.1.1-.192.168.1.254&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rate if helpful&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 05 Aug 2008 23:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122356#M915229</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-05T23:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122357#M915231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nat (inside) 0&lt;/P&gt;&lt;P&gt;nat (outside) 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried the above and working ok for now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will try the suggestion when we need to mix and match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks you Marwanshawi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Aug 2008 07:40:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122357#M915231</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2008-08-06T07:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122358#M915233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i glad its working because when i see the rateing 3 i though didnt&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cool:)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Aug 2008 07:56:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122358#M915233</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-06T07:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122359#M915235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, it works with nat0&lt;/P&gt;&lt;P&gt;I'll be trying with nat1 later.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also have another question, with v2.3, would nat 0 on one FWSM context and nat 1 on another context, but for the same interface/s work?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Aug 2008 17:10:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122359#M915235</guid>
      <dc:creator>s.srivas</dc:creator>
      <dc:date>2008-08-06T17:10:03Z</dc:date>
    </item>
    <item>
      <title>Re: FWSM: no nat-control or nat-control</title>
      <link>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122360#M915237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sure u can because they are in defrent context then the source will be deffrent&lt;/P&gt;&lt;P&gt;and the nat policy will work independatly in each context&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Aug 2008 01:23:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/fwsm-no-nat-control-or-nat-control/m-p/1122360#M915237</guid>
      <dc:creator>Marwan ALshawi</dc:creator>
      <dc:date>2008-08-07T01:23:00Z</dc:date>
    </item>
  </channel>
</rss>

