17-2
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
NAT Overview
interface (outside) match a NAT rule, or processing for the packet stops. See the
“Security Level
Overview” section on page 7-1
for more information about security levels. See the
“NAT Control”
section on page 17-4
for more information about NAT control.
Note
In this document, all types of translation are referred to as NAT. When describing NAT, the terms
inside
and
outside
represent the security relationship between any two interfaces. The higher security level is
inside and the lower security level is outside. For example, interface 1 is at 60 and interface 2 is at 50;
therefore, interface 1 is “inside” and interface 2 is “outside.”
Some of the benefits of NAT are as follows:
•
You can use private addresses on your inside networks. Private addresses are not routable on the
Internet. See the
“Private Networks” section on page D-2
for more information.
•
NAT hides the real addresses from other networks, so attackers cannot learn the real address of a
host.
•
You can resolve IP routing problems such as overlapping addresses.
See
Table 25-1 on page 25-3
for information about protocols that do not support NAT.
NAT in Routed Mode
Figure 17-1
shows a typical NAT example in routed mode, with a private network on the inside. When
the inside host at 10.1.1.27 sends a packet to a web server, the real source address, 10.1.1.27, of the
packet is changed to a mapped address, 209.165.201.10. When the server responds, it sends the response
to the mapped address, 209.165.201.10, and the security appliance receives the packet. The security
appliance then changes the translation of the mapped address, 209.165.201.10 back to the real address,
10.1.1.1.27 before sending it to the host.
Figure 17-1
NAT Example: Routed Mode
Web Server
www.cisco.com
Outside
Inside
209.165.201.2
10.1.2.1
10.1.2.27
130023
Translation
209.165.201.10
10.1.2.27
Originating
Packet
Undo Translation
209.165.201.10
10.1.2.27
Responding
Packet
Security
Appliance
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......