Cisco FirePOWER ASA 5500 series Configuration Manual page 310

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Using Dynamic NAT and PAT
Figure 17-17
10.1.2.28
See the following commands for this example:
hostname(config)# nat (inside) 1 10.1.2.0 255.255.255.0
hostname(config)# global (outside) 1 209.165.201.3-209.165.201.4
hostname(config)# global (outside) 1 209.165.201.5
For outside NAT, you need to identify the nat command for outside NAT (the outside keyword). If you
also want to translate the same traffic when it accesses an inside interface (for example, traffic on a DMZ
is translated when accessing the Inside and the Outside interfaces), then you must configure a separate
nat command without the outside option. In this case, you can identify the same addresses in both
statements and use the same NAT ID (see
Inside interface), the inside host uses a static command to allow outside access, so both the source and
destination addresses are translated.
Cisco Security Appliance Command Line Configuration Guide
17-20
NAT and PAT Together
Translation
10.1.2.27
209.165.201.3
Translation
209.165.201.4
Web Server:
www.cisco.com
Outside
Global 1: 209.165.201.3-
209.165.201.4
Global 1: 209.165.201.5
10.1.2.29
NAT 1: 10.1.2.0/24
Inside
10.1.2.27
10.1.2.29
10.1.2.28
Figure
17-18). Note that for outside NAT (DMZ interface to
Chapter 17
Applying NAT
Translation
209.165.201.5:6096
OL-10088-01

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents