• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 679
  • Last Modified:

Configuring Dynamic NAT, PAT, or Identity NAT

Hello Experts

To configure a dynamic NAT, PAT, or identity NAT rule, I need to perform the following steps:

Step 1 From the Configuration > Firewall > NAT Rules pane, choose Add > Add Dynamic NAT Rule.
 
The Add Dynamic NAT Rule dialog box appears.


However, when I click on Add I don't get the option to Add Dynamic Nat Rule

To see the options I get please see attachment.

Can someone please explain what I'm missing.

The following is a capture of the show version:

ciscoasa# show ver

Cisco Adaptive Security Appliance Software Version 8.4(2) <system>
Device Manager Version 6.4(1)

Compiled on Wed 15-Jun-11 18:17 by builders
System image file is "Unknown, monitor mode tftp booted image"
Config file at boot was "startup-config"

ciscoasa up 16 mins 57 secs

Hardware:   ASA 5520, 1024 MB RAM, CPU Pentium II 1000 MHz
Internal ATA Compact Flash, 256MB
BIOS Flash unknown @ 0x0, 0KB


 0: Ext: GigabitEthernet0    : address is 00ab.a72f.0100, irq 0
 1: Ext: GigabitEthernet1    : address is 00ab.a72f.0101, irq 0
 2: Ext: GigabitEthernet2    : address is 0000.ab6d.9802, irq 0
 3: Ext: GigabitEthernet3    : address is 0000.abd4.8803, irq 0
 4: Ext: GigabitEthernet4    : address is 0000.abe3.8804, irq 0
 5: Ext: GigabitEthernet5    : address is 0000.abb8.a605, irq 0

Licensed features for this platform:
Maximum Physical Interfaces       : Unlimited      perpetual
Maximum VLANs                     : 100            perpetual
Inside Hosts                      : Unlimited      perpetual
Failover                          : Active/Active  perpetual
VPN-DES                           : Enabled        perpetual
VPN-3DES-AES                      : Enabled        perpetual
Security Contexts                 : 2              perpetual
GTP/GPRS                          : Disabled       perpetual
AnyConnect Premium Peers          : 5000           perpetual
AnyConnect Essentials             : Disabled       perpetual
Other VPN Peers                   : 5000           perpetual
Total VPN Peers                   : 0              perpetual
Shared License                    : Disabled       perpetual
AnyConnect for Mobile             : Disabled       perpetual
AnyConnect for Cisco VPN Phone    : Disabled       perpetual
Advanced Endpoint Assessment      : Disabled       perpetual
UC Phone Proxy Sessions           : 2              perpetual
Total UC Proxy Sessions           : 2              perpetual
Botnet Traffic Filter             : Disabled       perpetual
Intercompany Media Engine         : Disabled       perpetual

This platform has an ASA 5520 VPN Plus license.

Serial Number: 123456789AB
Running Permanent Activation Key: 0x4a3ec071 0x0d86fbf6 0x7cb1bc48 0x8b48b8b0 0xf317c0b5
Configuration register is 0x0
Configuration has not been modified since last system restart.
ciscoasa#

Cheers

Carlton
ciscoasa2.jpg
0
cpatte7372
Asked:
cpatte7372
1 Solution
 
ArneLoviusCommented:
I think you are confusing how this would work on versions prior to 8.3 and post 8.3 in ASDM

On versions post 8.3 the NAT type is determined in the NAT rule itself.
0
 
cpatte7372Author Commented:
Cheers
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now