Cisco PIX 525 Spezifikationen Seite 256

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 604
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 255
14-30
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 14 Applying NAT
Bypassing NAT
Configuring Static Identity NAT
Static identity NAT translates the real IP address to the same IP address. The translation is always active,
and both “translated” and remote hosts can originate connections. Static identity NAT lets you use
regular NAT or policy NAT. Policy NAT lets you identify the real and destination addresses when
determining the real addresses to translate (see the “Policy NAT” section on page 14-9 for more
information about policy NAT). For example, you can use policy static identity NAT for an inside address
when it accesses the outside interface and the destination is server A, but use a normal translation when
accessing the outside server B.
Figure 14-24 shows a typical static identity NAT scenario.
Figure 14-24 Static Identity NAT
Note If you remove a static command, existing connections that use the translation are not affected. To remove
these connections, enter the clear local-host command.
You cannot clear static translations from the translation table with the clear xlate command; you must
remove the static command instead. Only dynamic translations created by the nat and global commands
can be removed with the clear xlate command.
To configure static identity NAT, enter one of the following commands:
To configure policy static identity NAT, enter the following command:
hostname(config)# static (
real_interface
,
mapped_interface
)
real_ip
access-list
acl_id
[dns] [norandomseq] [[tcp]
tcp_max_conns
[
emb_limit
]] [udp
udp_max_conns
]
Create the access list using the access-list command (see the Adding an Extended Access List”
section on page 13-9). This access list should include only permit ACEs. Make sure the source
address in the access list matches the real_ip in this command. Policy NAT does not consider the
inactive or time-range keywords; all ACEs are considered to be active for policy NAT
configuration. See the “Policy NAT” section on page 14-9 for more information.
See the “Configuring Dynamic NAT or PAT” section on page 14-22 for information about the other
options.
To configure regular static identity NAT, enter the following command:
hostname(config)# static (
real_interface
,
mapped_interface
)
real_ip real_ip
[netmask
mask
] [dns] [norandomseq] [[tcp]
tcp_max_conns
[
emb_limit
]] [udp
udp_max_conns
]
Specify the same IP address for both real_ip arguments.
See the “Configuring Dynamic NAT or PAT” section on page 14-22 for information about the other
options.
209.165.201.1 209.165.201.1
Inside Outside
209.165.201.2 209.165.201.2
130036
Security
Appliance
Seitenansicht 255
1 2 ... 251 252 253 254 255 256 257 258 259 260 261 ... 603 604

Kommentare zu diesen Handbüchern

Keine Kommentare