Solved

CISCO ASA 5520

Posted on 2013-10-29
2
393 Views
Last Modified: 2013-10-30
Prior to release 8.3 it was my understanding that in order to allow traffic from the outside interface through to the inside interface it was necessary to configure a static NAT entry and then an access list to complete the policy.  Is this correct...if not, how is it accomplished.  Effectively can you allow access without the NAT enry????
0
Comment
Question by:sectel
2 Comments
 
LVL 18

Expert Comment

by:fgasimzade
ID: 39609626
Yes, of course, if dont want to configure NAT, you can just allow traffic using access-lists
0
 
LVL 20

Accepted Solution

by:
rauenpc earned 500 total points
ID: 39609980
the main reason NAT is "required" is because the devices on the inside of the firewall are usually privately addressed and can't speak directly on the internet. If you have public IP addresses assigned to the inside and outside of the firewall, and your inside devices have public IP's, then NAT is not necessary. By default prior to 8.3, nat-control is enabled which does require a nat statement to be in place. Disabling nat-control should remove this requirement, or you could create a nat 0 statement to exempt all traffic.
ASA's in transparent mode have different rules as well regarding nat or lack thereof.

However, most cases involve private IP addresses on the inside which does require NAT to access internet resources.
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
Occasionally, we encounter connectivity issues that appear to be isolated to cable internet service.  The issues we typically encountered were reset errors within Internet Explorer when accessing web sites or continually dropped or failing VPN conne…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question