Overlapping Networks - Cisco FirePOWER ASA 5500 series Configuration Manual

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Chapter 17
Applying NAT

Overlapping Networks

In
Figure
Figure 17-26
192.168.100.2
192.168.100.1
Two networks use an overlapping address space (192.168.100.0/24), but hosts on each network must
communicate (as allowed by access lists). Without NAT, when a host on the inside network tries to access
a host on the overlapping DMZ network, the packet never makes it past the security appliance, which
sees the packet as having a destination address on the inside network. Moreover, if the destination
address is being used by another host on the inside network, that host receives the packet.
To solve this problem, use NAT to provide non-overlapping addresses. If you want to allow access in
both directions, use static NAT for both networks. If you only want to allow the inside interface to access
hosts on the DMZ, then you can use dynamic NAT for the inside addresses, and static NAT for the DMZ
addresses you want to access. This example shows static NAT.
To configure static NAT for these two interfaces, perform the following steps. The 10.1.1.0/24 network
on the DMZ is not translated.
Translate 192.168.100.0/24 on the inside to 10.1.2.0 /24 when it accesses the DMZ by entering the
Step 1
following command:
hostname(config)# static (inside,dmz) 10.1.2.0 192.168.100.0 netmask 255.255.255.0
Translate the 192.168.100.0/24 network on the DMZ to 10.1.3.0/24 when it accesses the inside by
Step 2
entering the following command:
hostname(config)# static (dmz,inside) 10.1.3.0 192.168.100.0 netmask 255.255.255.0
Configure the following static routes so that traffic to the dmz network can be routed correctly by the
Step 3
security appliance:
hostname(config)# route dmz 192.168.100.128 255.255.255.128 10.1.1.2 1
hostname(config)# route dmz 192.168.100.0 255.255.255.128 10.1.1.2 1
OL-10088-01
17-26, the security appliance connects two private networks with overlapping address ranges.
Using Outside NAT with Overlapping Networks
inside
192.168.100.0/24
192.168.100.3
outside
10.1.1.2
10.1.1.1
Cisco Security Appliance Command Line Configuration Guide
NAT Examples
192.168.100.2
dmz
192.168.100.0/24
192.168.100.3
17-33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents