Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

CISCO ASA 5520

Posted on 2013-10-29
2
Medium Priority
?
406 Views
Last Modified: 2013-10-30
Prior to release 8.3 it was my understanding that in order to allow traffic from the outside interface through to the inside interface it was necessary to configure a static NAT entry and then an access list to complete the policy.  Is this correct...if not, how is it accomplished.  Effectively can you allow access without the NAT enry????
0
Comment
Question by:sectel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Expert Comment

by:fgasimzade
ID: 39609626
Yes, of course, if dont want to configure NAT, you can just allow traffic using access-lists
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 2000 total points
ID: 39609980
the main reason NAT is "required" is because the devices on the inside of the firewall are usually privately addressed and can't speak directly on the internet. If you have public IP addresses assigned to the inside and outside of the firewall, and your inside devices have public IP's, then NAT is not necessary. By default prior to 8.3, nat-control is enabled which does require a nat statement to be in place. Disabling nat-control should remove this requirement, or you could create a nat 0 statement to exempt all traffic.
ASA's in transparent mode have different rules as well regarding nat or lack thereof.

However, most cases involve private IP addresses on the inside which does require NAT to access internet resources.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question