Solved

CISCO ASA 5520

Posted on 2013-10-29
2
401 Views
Last Modified: 2013-10-30
Prior to release 8.3 it was my understanding that in order to allow traffic from the outside interface through to the inside interface it was necessary to configure a static NAT entry and then an access list to complete the policy.  Is this correct...if not, how is it accomplished.  Effectively can you allow access without the NAT enry????
0
Comment
Question by:sectel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Expert Comment

by:fgasimzade
ID: 39609626
Yes, of course, if dont want to configure NAT, you can just allow traffic using access-lists
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 500 total points
ID: 39609980
the main reason NAT is "required" is because the devices on the inside of the firewall are usually privately addressed and can't speak directly on the internet. If you have public IP addresses assigned to the inside and outside of the firewall, and your inside devices have public IP's, then NAT is not necessary. By default prior to 8.3, nat-control is enabled which does require a nat statement to be in place. Disabling nat-control should remove this requirement, or you could create a nat 0 statement to exempt all traffic.
ASA's in transparent mode have different rules as well regarding nat or lack thereof.

However, most cases involve private IP addresses on the inside which does require NAT to access internet resources.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question