17-20
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
Using Dynamic NAT and PAT
Figure 17-17
Different NAT IDs
See the following commands for this example:
hostname(config)#
nat (inside) 1 10.1.2.0 255.255.255.0
hostname(config)#
nat (inside) 2 192.168.1.0 255.255.255.0
hostname(config)#
global (outside) 1 209.165.201.3-209.165.201.10
hostname(config)#
global (outside) 2 209.165.201.11
You can enter multiple
global
commands for one interface using the same NAT ID; the security
appliance uses the dynamic NAT
global
commands first, in the order they are in the configuration, and
then uses the PAT
global
commands in order. You might want to enter both a dynamic NAT
global
command and a PAT
global
command if you need to use dynamic NAT for a particular application, but
want to have a backup PAT statement in case all the dynamic NAT addresses are depleted. Similarly, you
might enter two PAT statements if you need more than the approximately 64,000 PAT sessions that a
single PAT mapped statement supports (see
Figure 17-18
).
Web Server:
www.cisco.com
Outside
Inside
Global 1: 209.165.201.3-
209.165.201.10
Global 2: 209.165.201.11
NAT 1: 10.1.2.0/24
NAT 2: 192.168.1.0/24
10.1.2.27
192.168.1.14
Translation
209.165.201.3
10.1.2.27
Translation
209.165.201.11:4567
192.168.1.14
130025
Security
Appliance
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......