<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Inspection for inbound traffic (out&amp;gt;in) with Static NAT in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987181#M924851</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have question regarding Global Packet Inspection on a Cisco ASA.&lt;/P&gt;&lt;P&gt;So, since by default all traffic from higher security Interface is allowed towards a lower security interface but NOT the other way around, traffic is inspected in&amp;gt;out to create a stateful entry to dynamically allow inbound traffic out&amp;gt;in.&lt;/P&gt;&lt;P&gt;Now in case of Static 1 to 1 NAT. i.e.&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.1.1.1 133.133.133.133&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In ext permit ip any host 10.1.1.1&lt;/P&gt;&lt;P&gt;Since there is an ACL on the outside interface that is explicitly allowing any outside host inbound towards the inside host, once that ACE is matched, will the packet be inspected inbound aswell? or will it skip inspection as the traffic is already allowed inbound via the ACL.&lt;/P&gt;&lt;P&gt;To recap the question is, whether inspection is performed for inbound traffic (out&amp;gt;in) if it is already allowed in an inbound ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 17:42:34 GMT</pubDate>
    <dc:creator>Jay47110</dc:creator>
    <dc:date>2020-02-21T17:42:34Z</dc:date>
    <item>
      <title>ASA Inspection for inbound traffic (out&gt;in) with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987181#M924851</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have question regarding Global Packet Inspection on a Cisco ASA.&lt;/P&gt;&lt;P&gt;So, since by default all traffic from higher security Interface is allowed towards a lower security interface but NOT the other way around, traffic is inspected in&amp;gt;out to create a stateful entry to dynamically allow inbound traffic out&amp;gt;in.&lt;/P&gt;&lt;P&gt;Now in case of Static 1 to 1 NAT. i.e.&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static 10.1.1.1 133.133.133.133&lt;/P&gt;&lt;P&gt;access-list Outside_Access_In ext permit ip any host 10.1.1.1&lt;/P&gt;&lt;P&gt;Since there is an ACL on the outside interface that is explicitly allowing any outside host inbound towards the inside host, once that ACE is matched, will the packet be inspected inbound aswell? or will it skip inspection as the traffic is already allowed inbound via the ACL.&lt;/P&gt;&lt;P&gt;To recap the question is, whether inspection is performed for inbound traffic (out&amp;gt;in) if it is already allowed in an inbound ACL.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:42:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987181#M924851</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2020-02-21T17:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Inspection for inbound traffic (out&gt;in) with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987339#M924853</link>
      <description>&lt;P&gt;Hi Jay actually the incoming traffic from outside to inside network matching the outside_in acl will also be inspected. since its applied globally. you could also double check this performing packet-tracer from any address from the outside interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 16:17:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987339#M924853</guid>
      <dc:creator>lwilfredoflor</dc:creator>
      <dc:date>2019-11-21T16:17:41Z</dc:date>
    </item>
    <item>
      <title>Re: ASA Inspection for inbound traffic (out&gt;in) with Static NAT</title>
      <link>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987739#M924854</link>
      <description>Thanks &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/294678"&gt;@lwilfredoflor&lt;/a&gt; that was helpful.</description>
      <pubDate>Fri, 22 Nov 2019 08:57:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-inspection-for-inbound-traffic-out-gt-in-with-static-nat/m-p/3987739#M924854</guid>
      <dc:creator>Jay47110</dc:creator>
      <dc:date>2019-11-22T08:57:15Z</dc:date>
    </item>
  </channel>
</rss>

