Using Dynamic NAT and PAT
Figure 16-18
10.1.2.28
See the following commands for this example:
hostname(config)# nat (inside) 1 10.1.2.0 255.255.255.0
hostname(config)# global (outside) 1 209.165.201.3-209.165.201.4
hostname(config)# global (outside) 1 209.165.201.5
For outside NAT (from outside to inside), you need to use the outside keyword in the nat command. If
you also want to translate the same traffic when it accesses an outside interface (for example, traffic on
a DMZ is translated when accessing the Inside and the Outside interfaces), then you must configure a
separate nat command without the outside option. In this case, you can identify the same addresses in
both statements and use the same NAT ID. (See
to Inside interface), the inside host uses a static command to allow outside access, so both the source
and destination addresses are translated.
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
16-24
NAT and PAT Together
Translation
10.1.2.27
209.165.201.3
Translation
209.165.201.4
Web Server:
www.cisco.com
Outside
Global 1: 209.165.201.3-
209.165.201.4
Global 1: 209.165.201.5
10.1.2.29
NAT 1: 10.1.2.0/24
Inside
10.1.2.27
10.1.2.29
10.1.2.28
Figure
16-19.) Note that for outside NAT (DMZ interface
Chapter 16
Configuring NAT
Translation
209.165.201.5:6096
OL-20748-01