Guest_imported
New member
- Jan 1, 1970
- 0
This is a basic question but recent happenings on a new installation have made me question my understanding of NAT.
My understanding is that all inside traffic is allowed out by default as long as there exists a translation rule, but no inbound traffic from the internet is permitted unless specifically granted in an access list applied on the outside interface.
Hence a translation like:
nat inside 1 10.1.80.0 255.255.255.0 0 0
would permit all people on the 10.1.80.0 network to access the internet, say for http, but if there were no e.g. access-list 101 permit tcp any host 10.1.80.0 255.255.255.0 eq would not get a reply.
Is this correct?
I have internal users who have access to the internet when my feeling is that they shouldn't.
There may however be some interaction between the access list I have on the outside interface and the one I have on the dmz interface.
Many thanks
Rob
My understanding is that all inside traffic is allowed out by default as long as there exists a translation rule, but no inbound traffic from the internet is permitted unless specifically granted in an access list applied on the outside interface.
Hence a translation like:
nat inside 1 10.1.80.0 255.255.255.0 0 0
would permit all people on the 10.1.80.0 network to access the internet, say for http, but if there were no e.g. access-list 101 permit tcp any host 10.1.80.0 255.255.255.0 eq would not get a reply.
Is this correct?
I have internal users who have access to the internet when my feeling is that they shouldn't.
There may however be some interaction between the access list I have on the outside interface and the one I have on the dmz interface.
Many thanks
Rob