I have ASA 5520 running 8.3.2 with the following interfaces. All that I need is the best practice so that host in each network can communicate to other networks vise-versa. I want the networks to communicate bidirectional to each other. And the users in the internal network be able to reach all the networks. No port restriction at this point and all communication is network based not specific server or users for testing purposes.
You actually don´t need NAT, on OS version 8.3 or prior NAT control does not exist.
Clear config NAT
Routing between interfaces would be based on security levels, so for traffic to route from a higher security level interface to a lower security level interface there is an implicit allow and from lower security interface to higher there is an implicit deny.
If you are not filtering any traffic all you need to configure are the next rules:
access-list internal permit ip any any
access-group internal in interface Internal
access-list outside permit ip any any
access-group outside in interface outside
Make sure that you configure the security level on the interface that you named Internal to the security level that you placed on the diagram (security-level 75).
I was trying to do something different in case I want to NAT traffic on 8.3.2, but you pointed me to the right direction that no NAT feature on 8.3 version. I am still researching on how I can NAT if I want to on version 8.3.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...