<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Too Many NAT Statements? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068858#M399567</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Justin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create 2147483647 translation on ASA, which is sufficient for your network setup, however the limit applies to number of ACL's that you can apply and it is platform dependent. &lt;/P&gt;&lt;P&gt;Notice that&amp;nbsp; xlate consumes memory of ASA, so depending upon the RAM available, you could create xlates. Ideally, 256 Bytes are taken per xlate. So, for example, if you have 512 MB on ASA, you could create 262144 xlates. &lt;/P&gt;&lt;P&gt;let me know if you have any questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Sep 2012 15:37:29 GMT</pubDate>
    <dc:creator>gurpsin2</dc:creator>
    <dc:date>2012-09-10T15:37:29Z</dc:date>
    <item>
      <title>Too Many NAT Statements?</title>
      <link>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068857#M399566</link>
      <description>&lt;P&gt;Is there a cisco best practice on the maximum number of NAT statements on a Cisco ASA? We have a 5520 and a coworker is adding static NAT policies so a vendor can monitor around 1,029 nodes. The problem is each node inside is a 10.X.X.X and to keep the IPs from overlapping with other customers the vendor monitors they would like us to NAT to a 172.16.X.X scheme.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 00:49:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068857#M399566</guid>
      <dc:creator>Justin Lenhart</dc:creator>
      <dc:date>2019-03-26T00:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Too Many NAT Statements?</title>
      <link>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068858#M399567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Justin, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can create 2147483647 translation on ASA, which is sufficient for your network setup, however the limit applies to number of ACL's that you can apply and it is platform dependent. &lt;/P&gt;&lt;P&gt;Notice that&amp;nbsp; xlate consumes memory of ASA, so depending upon the RAM available, you could create xlates. Ideally, 256 Bytes are taken per xlate. So, for example, if you have 512 MB on ASA, you could create 262144 xlates. &lt;/P&gt;&lt;P&gt;let me know if you have any questions. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Gurpreet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2012 15:37:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068858#M399567</guid>
      <dc:creator>gurpsin2</dc:creator>
      <dc:date>2012-09-10T15:37:29Z</dc:date>
    </item>
    <item>
      <title>Too Many NAT Statements?</title>
      <link>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068859#M399568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Perfect. Thank you!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Sep 2012 17:56:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068859#M399568</guid>
      <dc:creator>Justin Lenhart</dc:creator>
      <dc:date>2012-09-10T17:56:15Z</dc:date>
    </item>
    <item>
      <title>Too Many NAT Statements?</title>
      <link>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068860#M399569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are configuring a setup with a L2L VPN between you and the vendor for example and you need to NAT your LAN IP addresses to another private IP range you dont necesarily have to do NAT statements for every single device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you only had a /24 network full of nodes that need to be monitored, you could for example just NAT 10.10.10.0/24 to for example 172.30.50.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This would mean that 10.10.10.1 would translate to 172.30.50.1. IP address 10.10.10.2 would translate to 172.30.50.2 and so on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From your original post I got the impression that you were going to do a Static NAT command for each of the host when possibly the same could be achieved with a single NAT command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The format of the NAT commands ofcourse depends on what software you are running on the ASA (software 8.2 and before OR 8.3 and after)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Sep 2012 06:49:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/too-many-nat-statements/m-p/2068860#M399569</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2012-09-11T06:49:56Z</dc:date>
    </item>
  </channel>
</rss>

