Cisco PIX 525 Spezifikationen Seite 101

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 466
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 100
2-41
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Policy NAT
The NAT command for outside NAT, which translates the outside hosts from 192.168.100.0/24 into
209.165.201.0/24 on the inside network, is as follows:
static (outside, inside) 209.165.201.0 192.168.100.0 netmask 255.255.255.0
In addition, the following routes need to be added in the PIX Firewall:
route outside 192.168.100.128 255.255.255.128 209.165.200.225 2
route outside 192.168.100.0 255.255.255.128 209.165.200.225 2
Note Splitting the netmask is required because an overlapping route cannot exist with a connected route.
Policy NAT
Policy NAT lets you identify local traffic for address translation by specifying the source and destination
addresses (or ports) in an access list. Regular NAT uses source addresses/ports only, whereas policy NAT
uses both source and destination addresses/ports.
Note All types of NAT support policy NAT, except for NAT exemption. NAT exemption uses an access list to
identify the local addresses, but differs from policy NAT in that the ports are not considered.
With policy NAT, you can create multiple NAT or static statements that identify the same local address
as long as the source/port and destination/port combination is unique for each statement. You can then
match different global addresses to each source/port and destination/port pair.
Seitenansicht 100
1 2 ... 96 97 98 99 100 101 102 103 104 105 106 ... 465 466

Kommentare zu diesen Handbüchern

Keine Kommentare