Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 
New Member

NAT - config Review


I need to allow only http traffic on the natted IP ( via acl ) and block all connection initiated from outside to inside.

Only allow connection initiated from inside to outside

M i missing anything,

********Configuration ******************


ip subnet-zero

ip domain lookup source-interface FastEthernet0/0

ip name-server

interface FastEthernet0/0

description Connected to ISP

ip address

ip nat outside

ip virtual-reassembly

duplex auto

speed auto


interface FastEthernet0/1

description Connection to LAN-Switch

ip address

ip accounting output-packets

ip nat inside

ip virtual-reassembly

duplex auto

speed auto


ip classless

ip route

ip route

no ip http server

no ip http secure-server

ip nat inside source static

access-list 50 permit

access-list 50 deny any

Hall of Fame Super Blue

Re: NAT - config Review


Where is acl 50 being used ?.

Can you just clarify, you want

1) all internal clients to be allowed to initiate connections to the Internet


2) you want to allow internet access to on port 80

If this isn't what you want can you be more specific.


New Member

Re: NAT - config Review

ACL 50 was earlier used with IP NAT Pool which i removed with static NAT.

(1) all web traffic from inside goes to ISA server. so I want Microsoft ISA Server to initiate traffic from inside to Outside

(2) No traffic should initiate from Internet to Microsoft ISA Server

Since there is no firewall, I want to secure the connection as much as possible

Re: NAT - config Review


If you're wanting to allow traffic from the outside in, you can do one-to-one nat (like you are) and then block with the acl:

ip nat inside source static

ip access-list ext OUTSIDE

permit tcp any host eq 80

permit tcp any any established

deny ip any any

int fa0/0

ip access-group OUTSIDE in



HTH, John *** Please rate all useful posts ***
CreatePlease to create content