[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1308
  • Last Modified:

ASA-NAT-Control feature

Hi,

I am getting confuse about NAT-Control feature..
What is basic poins about NAT-Control.
I have  read that it is disabled by default in ASA box.If i disable this feature with no-form how the ASA behaviour changes

Give me the difference btn Nat-control and no-nat control features in a understanble manner
to me with any simple example

Regards
ramu
0
RAMU CH
Asked:
RAMU CH
  • 3
  • 3
4 Solutions
 
Ernie BeekCommented:
As per cisco:

The nat-control command on the PIX/ASA specifies that all traffic through the firewall must have a specific translation entry (nat statement with a matching global or a static statement) for that traffic to pass through the firewall. The nat-control command ensures that the translation behavior is the same as PIX Firewall versions earlier than 7.0. The default configuration of PIX/ASA version 7.0 and later is the specification of the no nat-control command. With PIX/ASA version 7.0 and later, you can change this behavior when you issue the nat-control command.

With nat-control disabled, the PIX/ASA forwards packets from a higher-security interface to a lower one without a specific translation entry in the configuration. In order to pass traffic from a lower security interface to a higher one, use access lists to permit the traffic. The PIX/ASA then forwards the traffic. This document focuses on the PIX/ASA security appliance behavior with nat-control enabled.

Note: If you want to remove or disable the nat-control statement in the PIX/ASA, you need to remove all NAT statements from the security appliance. In general, you need to remove the NAT before you turn off NAT control. You have to reconfigure the NAT statement in PIX/ASA to work as expected.


Source: http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml#backinfo
0
 
RAMU CHAuthor Commented:
Hi Erniebeek,

What is Twic NAT.
Whar is Identity NAt and what conditions we use Twice NAT & identity NAT

Regards
ramu
0
 
Ernie BeekCommented:
Hi Ramu,

Twice NAT lets you identify both the source and destination address in a single rule.
The destination address is optional. If you specify the destination address, you can either map it to itself
(identity NAT), or you can map it to a different address. The destination mapping is always a static
mapping.

Have a look at:
http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_rules.pdf
0
The IT Degree for Career Advancement

Earn your B.S. in Network Operations and Security and become a network and IT security expert. This WGU degree program curriculum was designed with tech-savvy, self-motivated students in mind – allowing you to use your technical expertise, to address real-world business problems.

 
RAMU CHAuthor Commented:
Hi eriebeek,

Will you clarify me more as i am not getting what is the diffrence between normat NAT nadd Twice NAT.

Regards
ramu
0
 
Ernie BeekCommented:
Ok,

Main Differences Between Network Object NAT and Twice NAT
The main differences between these two NAT types are:
• How you define the real address.
– Network object NAT—You define NAT as a parameter for a network object; the network object
definition itself provides the real address. This method lets you easily add NAT to network
objects. The objects can also be used in other parts of your configuration, for example, for
access rules or even in twice NAT rules.
– Twice NAT—You identify a network object or network object group for both the real and
mapped addresses. In this case, NAT is not a parameter of the network object; the network object
or group is a parameter of the NAT configuration. The ability to use a network object group for
the real address means that twice NAT is more scalable.
• How source and destination NAT is implemented.
– Network object NAT— Each rule can apply to either the source or destination of a packet. So
two rules might be used, one for the source IP address, and one for the destination IP address.
These two rules cannot be tied together to enforce a specific translation for a source/destination
combination.
– Twice NAT—A single rule translates both the source and destination. A matching packet only
matches the one rule, and further rules are not checked. Even if you do not configure the
optional destination address for twice NAT, a matching packet still only matches one twice NAT
rule. The source and destination are tied together, so you can enforce different translations
depending on the source/destination combination. For example, sourceA/destinationA can have
a different translation than sourceA/destinationB.
• Order of NAT Rules.
– Network object NAT—Automatically ordered in the NAT table.
– Twice NAT—Manually ordered in the NAT table (before or after network object NAT rules).
See the “NAT Rule Order” section on page 27-19 for more information.
We recommend using network object NAT unless you need the extra features that twice NAT provides.
Network object NAT is easier to configure, and might be more reliable for applications such as Voice
over IP (VoIP). (For VoIP, because twice NAT is applicable only between two objects, you might see a
failure in the translation of indirect addresses that do not belong to either of the objects.)

Got that from:
http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.pdf
0
 
RAMU CHAuthor Commented:
Thanks
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

  • 3
  • 3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now