17-28
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
Using Static PAT
Figure 17-23
shows a typical static PAT scenario. The translation is always active so both translated and
remote hosts can originate connections, and the mapped address and port is statically assigned by the
static
command.
Figure 17-23
Static PAT
For applications that require application inspection for secondary channels (for example, FTP and VoIP),
the security appliance automatically translates the secondary ports.
Do not use a mapped address in the
static
command that is also defined in a
global
command for the
same mapped interface.
For more information about static PAT, see the
“Static PAT” section on page 17-9
.
Note
If you remove a
static
command, existing connections that use the translation are not affected. To remove
these connections, enter the
clear local-host
command.
You cannot clear static translations from the translation table with the
clear xlate
command; you must
remove the
static
command instead. Only dynamic translations created by the
nat
and
global
commands
can be removed with the
clear xlate
command.
To configure static PAT, enter one of the following commands.
•
For policy static PAT, enter the following command:
hostname(config)#
static (
real_interface
,
mapped_interface
)
{
tcp
|
udp
}
{
mapped_ip
|
interface
}
mapped_port
access-list
acl_name
[
dns
]
[
norandomseq
]
[[
tcp
]
tcp_max_conns
[
emb_limit
]] [
udp
udp_max_conns
]
Identify the real addresses and destination/source addresses using an extended access list. Create the
extended access list using the
access-list extended
command (see the
“Adding an Extended Access
List” section on page 16-5
). The protocol in the access list must match the protocol you set in this
command. For example, if you specify
tcp
in the
static
command, then you must specify
tcp
in the
access list. Specify the port using the
eq
operator.
The first address in the access list is the real address; the second address is either the source or
destiniation address, depending on where the traffic originates. For example, to translate the real
address 10.1.1.1/Telnet to the mapped address 192.168.1.1/Telnet when 10.1.1.1 sends traffic to the
209.165.200.224 network, the
access-list
and
static
commands are:
hostname(config)#
access-list TEST extended tcp host 10.1.1.1 eq telnet
209.165.200.224 255.255.255.224
hostname(config)#
static (inside,outside) tcp 192.168.1.1 telnet access-list TEST
10.1.1.1:23
209.165.201.1:23
Inside
Outside
10.1.1.2:8080
209.165.201.2:80
130044
Security
Appliance
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......