Firewall
Configuring the NAT Rules to Securely Access a Remote Network
Cisco ISA500 Series Integrated Security Appliance Administrator Guide
194
6
Configuring Static NAT Rules
Static NAT creates a fixed translation of a real address to a mapped address.
Because the mapped address is the same for each consecutive connection, static
NAT allows bidirectional connection initiation, both to and from the host (if a
firewall access rule allows it). With dynamic PAT, on the other hand, each host uses
a different address or port for each subsequent translation, so bidirectional
initiation is not supported.
NOTE
The security appliance supports up to 128 Static NAT mapping rules.
NOTE
You must create a firewall access rule to allow the access so that the Static NAT
rule can function properly.
STEP 1
Click
Firewall
->
NAT -> Static NAT
.
The Static NAT window opens.
STEP 2
To add a static NAT rule, click
Add
.
Other options:
To edit an entry, click
Edit
. To delete an entry, click
Delete
. To
delete multiple entries, check the boxes of multiple entries and click
Delete
Selection
.
After you click Add or Edit, the Static NAT - Add/Edit
window opens.
STEP 3
Enter the following information:
•
WAN:
Choose either WAN1 or WAN2 as the WAN interface for the static NAT
rule.
•
Public IP:
Choose an IP address object as the public IP address.
•
Private IP:
Choose an IP address object as the private IP address.
If the IP address you want is not in the list, choose
Create an IP Address
to
create a new IP address object. To maintain the IP address objects, go to the
Networking -> Address Object Management
page. See
.
STEP 4
Click
OK
to save your settings.