Cisco ASA Series Cli Configuration Manual page 783

Software version 9.0 for the services module
Hide thumbs Also See for ASA Series:
Table of Contents

Advertisement

Chapter 1
Configuring Network Object NAT
Additional Guidelines
Default Settings
Configuring Network Object NAT
This section describes how to configure network object NAT and includes the following topics:
You can only define a single NAT rule for a given object; if you want to configure multiple NAT
rules for an object, you need to create multiple objects with different names that specify the same
IP address, for example, object network obj-10.10.10.1-01, object network obj-10.10.10.1-02,
and so on.
If you change the NAT configuration, and you do not want to wait for existing translations to time
out before the new NAT configuration is used, you can clear the translation table using the clear
xlate command. However, clearing the translation table disconnects all current connections that use
translations.
Note
If you remove a dynamic NAT or PAT rule, and then add a new rule with mapped addresses
that overlap the addresses in the removed rule, then the new rule will not be used until all
connections associated with the removed rule time out or are cleared using the clear xlate
command. This safeguard ensures that the same address is not assigned to multiple hosts.
Objects and object groups used in NAT cannot be undefined; they must include IP addresses.
You cannot use an object group with both IPv4 and IPv6 addresses; the object group must include
only one type of address.
You can use the same mapped object or group in multiple NAT rules.
The mapped IP address pool cannot include:
The mapped interface IP address. If you specify any interface for the rule, then all interface IP
addresses are disallowed. For interface PAT (routed mode only), use the interface keyword
instead of the IP address.
(Transparent mode) The management IP address.
(Dynamic NAT) The standby interface IP address when VPN is enabled.
Existing VPN pool addresses.
For application inspection limitations with NAT or PAT, see the
page 1-4
in
Chapter 1, "Getting Started with Application Layer Protocol Inspection."
(Routed mode) The default real and mapped interface is Any, which applies the rule to all interfaces.
The default behavior for identity NAT has proxy ARP enabled, matching other static NAT rules. You
can disable proxy ARP if desired. See the
information.
If you specify an optional interface, then the ASA uses the NAT configuration to determine the
egress interface, but you have the option to always use a route lookup instead. See the
Packets" section on page 1-19
Adding Network Objects for Mapped Addresses, page 1-4
"Routing NAT Packets" section on page 1-19
for more information.
Cisco ASA Series CLI Configuration Guide
Default Settings
"Default Settings" section on
for more
"Routing NAT
1-3

Advertisement

Table of Contents
loading

Table of Contents