17-33
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 17 Configuring NAT
Bypassing NAT
Configuring NAT Exemption
NAT exemption exempts addresses from translation and allows both real and remote hosts to originate
connections. NAT exemption lets you specify the real and destination addresses when determining the
real traffic to exempt (similar to policy NAT), so you have greater control using NAT exemption than
identity NAT. However unlike policy NAT, NAT exemption does not consider the ports in the access list.
Use static identity NAT to consider ports in the access list.
Figure 17-26
shows a typical NAT exemption scenario.
Figure 17-26
NAT Exemption
Note
If you remove a NAT exemption configuration, existing connections that use NAT exemption are not
affected. To remove these connections, enter the
clear local-host
command.
To configure NAT exemption, enter the following command:
hostname(config)#
nat
(
real_interface
)
0
access-list
acl_name
[
outside
]
Create the extended access list using the
access-list extended
command (see the
“Adding an Extended
Access List” section on page 16-5
). This access list can include both
permit
ACEs and
deny
ACEs. Do
not specify the real and destination ports in the access list; NAT exemption does not consider the ports.
NAT exemption also does not consider the
inactive
or
time-range
keywords; all ACEs are considered
to be active for NAT exemption configuration.
By default, this command exempts traffic from inside to outside. If you want traffic from outside to
inside to bypass NAT, then add an additional
nat
command and enter
outside
to identify the NAT
instance as outside NAT. You might want to use outside NAT exemption if you configure dynamic NAT
for the outside interface and want to exempt other traffic.
For example, to exempt an inside network when accessing any destination address, enter the following
command:
hostname(config)#
access-list EXEMPT permit ip 10.1.2.0 255.255.255.0 any
hostname(config)#
nat (inside) 0 access-list EXEMPT
To use dynamic outside NAT for a DMZ network, and exempt another DMZ network, enter the following
command:
hostname(config)#
nat (dmz) 1 10.1.2.0 255.255.255.0 outside dns
hostname(config)#
global (inside) 1 10.1.1.45
hostname(config)#
access-list EXEMPT permit ip 10.1.3.0 255.255.255.0 any
hostname(config)#
nat (dmz) 0 access-list EXEMPT
209.165.201.1
209.165.201.1
Inside
Outside
209.165.201.2
209.165.201.2
130036
Security
Appliance
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......