17-24
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
Using Dynamic NAT and PAT
•
Policy NAT:
hostname(config)#
nat
(
real_interface
)
nat_id
access-list
acl_name
[
dns
] [
outside
]
[
norandomseq
] [[
tcp
]
tcp_max_conns
[
emb_limit
]] [
udp
udp_max_conns
]
You can identify overlapping addresses in other
nat
commands. For example, you can identify
10.1.1.0 in one command, but 10.1.1.1 in another. The traffic is matched to a policy NAT
command
in order, until the first match, or for regular NAT, using the best match.
The options for this command are as follows:
–
access-list
acl_name
—Identify the real addresses and destination addresses using an extended
access list. Create the extended access list using the
access-list extended
command (see the
“Adding an Extended Access List” section on page 16-5
). This access list should include only
permit
ACEs. You can optionally specify the real and destination ports in the access list using
the
eq
operator. Policy NAT does not consider the
inactive
or
time-range
keywords; all ACEs
are considered to be active for policy NAT configuration.
–
nat_id
—An integer between 1 and 65535. The NAT ID should match a
global
command NAT
ID. See the
“Dynamic NAT and PAT Implementation” section on page 17-17
for more
information about how NAT IDs are used.
0
is reserved for NAT exemption. (See the
“Configuring NAT Exemption” section on page 17-33
for more information about NAT
exemption.)
–
dns
—If your
nat
command includes the address of a host that has an entry in a DNS server, and
the DNS server is on a different interface from a client, then the client and the DNS server need
different addresses for the host; one needs the mapped address and one needs the real address.
This option rewrites the address in the DNS reply to the client. The translated host needs to be
on the same interface as either the client or the DNS server. Typically, hosts that need to allow
access from other interfaces use a static translation, so this option is more likely to be used with
the
static
command. (See the
“DNS and NAT” section on page 17-15
for more information.)
–
outside
—If this interface is on a lower security level than the interface you identify by the
matching
global
statement, then you must enter
outside
to identify the NAT instance as
outside NAT.
–
norandomseq
,
tcp
tcp_max_conns
,
udp
udp_max_conns
, and
emb_limit
—These keywords set
connection limits. However, we recommend using a more versatile method for setting
connection limits; see the
“Configuring Connection Limits and Timeouts” section on
page 23-14
.
•
Regular NAT:
hostname(config)#
nat
(
real_interface
)
nat_id
real_ip
[
mask
[
dns
] [
outside
]
[
norandomseq
] [[
tcp
]
tcp_max_conns
[
emb_limit
]] [
udp
udp_max_conns
]]
The
nat_id
argument is an integer between 1 and 2147483647. The NAT ID must match a
global
command NAT ID. See the
“Dynamic NAT and PAT Implementation” section on page 17-17
for
more information about how NAT IDs are used.
0
is reserved for identity NAT. See the
“Configuring
Identity NAT” section on page 17-30
for more information about identity NAT.
See the preceding policy NAT command for information about other options.
Step 2
To identify the mapped address(es) to which you want to translate the real addresses when they exit a
particular interface, enter the following command:
hostname(config)#
global (
mapped_interface
)
nat_id
{
mapped_ip
[
-
mapped_ip
] |
interface
}
This NAT ID should match a
nat
command NAT ID. The matching
nat
command identifies the addresses
that you want to translate when they exit this interface.
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......