Chapter 17 Applying Nat - Cisco FirePOWER ASA 5500 series Configuration Manual

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 17
Applying NAT
Figure 17-1
10.1.2.27
See the following commands for this example:
hostname(config)# nat (inside) 1 10.1.2.0 255.255.255.0
hostname(config)# global (outside) 1 209.165.201.1-209.165.201.15
NAT Control
NAT control requires that packets traversing from an inside interface to an outside interface match a NAT
rule; for any host on the inside network to access a host on the outside network, you must configure NAT
to translate the inside host address (see
Figure 17-2
10.1.1.1
10.1.2.1
OL-10088-01
NAT Example
Originating
Packet
Translation
209.165.201.10
NAT Control and Outbound Traffic
Security
Appliance
209.165.201.1
NAT
No NAT
Inside
Outside
Web Server
www.cisco.com
Outside
209.165.201.2
Security
Appliance
209.165.201.10
10.1.2.1
Inside
10.1.2.27
Figure
17-2).
Cisco Security Appliance Command Line Configuration Guide
NAT Overview
Responding
Packet
Undo Translation
10.1.2.27
17-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents