17-3
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
NAT Overview
See the following commands for this example:
hostname(config)#
nat (inside) 1 10.1.2.0 255.255.255.0
hostname(config)#
global (outside) 1 209.165.201.1-209.165.201.15
NAT in Transparent Mode
Using NAT in transparent mode eliminates the need for the upstream or downstream routers to perform
NAT for their networks. For example, a transparent firewall security appliance is useful between two
VRFs so you can establish BGP neighbor relations between the VRFs and the global table. However,
NAT per VRF might not be supported. In this case, using NAT in transparent mode is essential.
NAT in transparent mode has the following requirements and limitations:
•
When the mapped addresses are not on the same network as the transparent firewall, then on the
upstream router, you need to add a static route for the mapped addresses that points to the
downstream router (through the security appliance).
•
If the real destination address is not directly-connected to the security appliance, then you also need
to add a static route on the security appliance for the real destination address that points to the
downstream router. Without NAT, traffic from the upstream router to the downstream router does not
need any routes on the security appliance because it uses the MAC address table. NAT, however,
causes the security appliance to use a route lookup instead of a MAC address lookup, so it needs a
static route to the downstream router.
•
The
alias
command is not supported.
•
Because the transparent firewall does not have any interface IP addresses, you cannot use interface
PAT.
•
ARP inspection is not supported. Moreover, if for some reason a host on one side of the firewall
sends an ARP request to a host on the other side of the firewall, and the initiating host real address
is mapped to a different address on the same subnet, then the real address remains visible in the ARP
request.
Figure 17-2
shows a typical NAT scenario in transparent mode, with the same network on the inside and
outside interfaces. The transparent firewall in this scenario is performing the NAT service so that the
upstream router does not have to perform NAT. When the inside host at 10.1.1.27 sends a packet to a web
server, the real source address of the packet, 10.1.1.27, is changed to a mapped address, 209.165.201.10.
When the server responds, it sends the response to the mapped address, 209.165.201.10, and the security
appliance receives the packet because the upstream router includes this mapped network in a static route
directed through the security appliance. The security appliance then undoes the translation of the
mapped address, 209.165.201.10 back to the real address, 10.1.1.1.27. Because the real address is
directly-connected, the security appliance sends it directly to the host.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......