17-32
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
Bypassing NAT
hostname(config)#
static (
real_interface
,
mapped_interface
)
real_ip
access-list
acl_id
[
dns
]
[
norandomseq
]
[[
tcp
]
tcp_max_conns
[
emb_limit
]] [
udp
udp_max_conns
]
Create the extended access list using the
access-list extended
command (see the
“Adding an
Extended Access List” section on page 16-5
). This access list should include only
permit
ACEs.
Make sure the source address in the access list matches the
real_ip
in this command. Policy NAT
does not consider the
inactive
or
time-range
keywords; all ACEs are considered to be active for
policy NAT configuration. See the
“Policy NAT” section on page 17-10
for more information.
See the
“Configuring Dynamic NAT or PAT” section on page 17-23
for information about the other
options.
•
To configure regular static identity NAT, enter the following command:
hostname(config)#
static (
real_interface
,
mapped_interface
)
real_ip real_ip
[
netmask
mask
] [
dns
]
[
norandomseq
]
[[
tcp
]
tcp_max_conns
[
emb_limit
]] [
udp
udp_max_conns
]
Specify the same IP address for both
real_ip
arguments.
See the
“Configuring Dynamic NAT or PAT” section on page 17-23
for information about the other
options.
For example, the following command uses static identity NAT for an inside IP address (10.1.1.3) when
accessed by the outside:
hostname(config)#
static (inside,outside) 10.1.1.3 10.1.1.3 netmask 255.255.255.255
The following command uses static identity NAT for an outside address (209.165.201.15) when accessed
by the inside:
hostname(config)#
static (outside,inside) 209.165.201.15 209.165.201.15 netmask
255.255.255.255
The following command statically maps an entire subnet:
hostname(config)#
static (inside,dmz) 10.1.2.0 10.1.2.0 netmask 255.255.255.0
The following static identity policy NAT example shows a single real address that uses identity NAT
when accessing one destination address, and a translation when accessing another:
hostname(config)#
access-list NET1 permit ip host 10.1.2.27 209.165.201.0 255.255.255.224
hostname(config)#
access-list NET2 permit ip host 10.1.2.27 209.165.200.224
255.255.255.224
hostname(config)#
static (inside,outside) 10.1.2.27 access-list NET1
hostname(config)#
static (inside,outside) 209.165.202.130 access-list NET2
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......