Solved

CISCO ASA 5520

Posted on 2013-10-29
2
384 Views
Last Modified: 2013-10-30
Prior to release 8.3 it was my understanding that in order to allow traffic from the outside interface through to the inside interface it was necessary to configure a static NAT entry and then an access list to complete the policy.  Is this correct...if not, how is it accomplished.  Effectively can you allow access without the NAT enry????
0
Comment
Question by:sectel
2 Comments
 
LVL 18

Expert Comment

by:fgasimzade
Comment Utility
Yes, of course, if dont want to configure NAT, you can just allow traffic using access-lists
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 500 total points
Comment Utility
the main reason NAT is "required" is because the devices on the inside of the firewall are usually privately addressed and can't speak directly on the internet. If you have public IP addresses assigned to the inside and outside of the firewall, and your inside devices have public IP's, then NAT is not necessary. By default prior to 8.3, nat-control is enabled which does require a nat statement to be in place. Disabling nat-control should remove this requirement, or you could create a nat 0 statement to exempt all traffic.
ASA's in transparent mode have different rules as well regarding nat or lack thereof.

However, most cases involve private IP addresses on the inside which does require NAT to access internet resources.
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now