1-5
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Twice NAT
Configuring Twice NAT
Objects are required unless you specify the
any
keyword inline to represent all traffic, or for some types
of NAT, the
interface
keyword to represent the interface address. For more information about
configuring a network object or group, see the
“Configuring Network Objects and Groups” section on
.
Guidelines
•
A network object group can contain objects and/or inline addresses of either IPv4 or IPv6 addresses.
The group cannot contain both IPv4 and IPv6 addresses; it must contain one type only.
•
See the
“Guidelines and Limitations” section on page 1-2
for information about disallowed mapped
IP addresses.
•
Source Dynamic NAT:
–
You typically configure a larger group of real addresses to be mapped to a smaller group.
–
The mapped object or group cannot contain a subnet; the object must define a range; the group
can include hosts and ranges.
–
If a mapped network object contains both ranges and host IP addresses, then the ranges are used
for dynamic NAT, and the host IP addresses are used as a PAT fallback.
•
Source Dynamic PAT (Hide):
–
The mapped object or group cannot contain a subnet; a network object must define a host, or for
a PAT pool, a range; a network object group (for a PAT pool) can include hosts and ranges.
•
Source Static NAT or Static NAT with port translation:
–
The mapped object or group can contain a host, range, or subnet.
–
The static mapping is typically one-to-one, so the real addresses have the same quantity as the
mapped addresses. You can, however, have different quantities if desired. For more information,
see the
“Static NAT” section on page 1-3
.
•
Source Identity NAT
–
The real and mapped objects must match; you can use the same object for both, or you can create
separate objects that contain the same IP addresses.
•
Destination Static NAT or Static NAT with port translation (the destination translation is always
static):
–
Although the main feature of twice NAT is the inclusion of the destination IP address, the
destination address is optional. If you do specify the destination address, you can configure
static translation for that address or just use identity NAT for it. You might want to configure
twice NAT without a destination address to take advantage of some of the other qualities of
twice NAT, including the use of network object groups for real addresses, or manually ordering
of rules. For more information, see the
“Main Differences Between Network Object NAT and
Twice NAT” section on page 1-13
–
For identity NAT, the real and mapped objects must match; you can use the same object for both,
or you can create separate objects that contain the same IP addresses.
–
The static mapping is typically one-to-one, so the real addresses have the same quantity as the
mapped addresses. You can, however, have different quantities if desired. For more information,
see the
“Static NAT” section on page 1-3
.
–
For static interface NAT with port translation (routed mode only), you can specify the
interface
keyword instead of a network object/group for the mapped address. For more information, see
the
“Static Interface NAT with Port Translation” section on page 1-5
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......