Solved

policy and static NAT

Posted on 2013-10-25
3
528 Views
Last Modified: 2013-11-09
Experts,

NAT on an ASA 8.2.5 code.

I have a policy based NAT below that translates 50.50.50.13 to appear as 10.20.20.20 when it initiates traffic to 10.10.10.10

access-list nat123 extended permit ip host 50.50.50.13 host 10.10.10.10
nat (dmz) 1005 access-list nat123
global (inside) 1005 10.20.20.20

I have the below static NAT that translates the destination of 10.20.20.20 to 50.50.50.13 when traffic is received on the inside interface.

static (dmz,inside) 10.20.20.20 50.50.50.13 netmask 255.255.255.255

My question, is there a way I can accomplish both with just 1 STATIC NAT? Can I add something to the end of the static NAT to make it apply the other way (when 50.50.50.13 initiates the traffic)?  Or would both be needed to do the source and destination NAT. Assume that I can't route 50.50.50.13 in my internal network and that's why I am doing this.
0
Comment
Question by:trojan81
  • 2
3 Comments
 

Author Comment

by:trojan81
ID: 39603291
anyone?
0
 
LVL 18

Expert Comment

by:fgasimzade
ID: 39604957
Take a look here, this is called Twice NAT, the one you are looking for

http://www.cisco.com/en/US/docs/security/asa/asa84/asdm64/configuration_guide/nat_rules.html#wp1132640
0
 
LVL 18

Accepted Solution

by:
fgasimzade earned 500 total points
ID: 39604963
By the way, your static NAT works both ways by default

static (dmz,inside) 10.20.20.20 50.50.50.13 netmask 255.255.255.255

You just need a policy static NAT


access-list nat123 extended permit ip host 50.50.50.13 host 10.10.10.10
static (inside,dmz) 10.20.20.20 access-list nat123

This one will work both ways with your policy (traffic from 50.50.50.13 to 10.10.10.10)
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cisco Pix/ASA hairpinning The term, hairpinning, comes from the fact that the traffic comes from one source into a router or similar device, makes a U-turn, and goes back the same way it came. Visualize this and you will see something that looks …
From Cisco ASA version 8.3, the Network Address Translation (NAT) configuration has been completely redesigned and it may be helpful to have the syntax configuration for both at a glance. You may as well want to read official Cisco published AS…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
Both in life and business – not all partnerships are created equal. Spend 30 short minutes with us to learn:   • Key questions to ask when considering a partnership to accelerate your business into the cloud • Pitfalls and mistakes other partners…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now