05-22-2012 07:04 AM - edited 03-11-2019 04:09 PM
SNAT as in "Source NAT". I'm trying to setup dual firewalls and want to use both concurrently while I transition my inbound NAT rules to the ASA. However, the default route on the core switch prohibits me from doing this since it only knows about the old firewall. A couple of possible workarounds are SNAT or Policy Based Routing on the core switch. Can the ASA perform SNAT like F5? i.e, Can it use its internal address as the "source" for anything destined to an internal web server? That way the web server would attempt to return the packet back to the ASA instead of using the default route, which is the old firewall. I've attached a simplified diagram of what I'm trying to accomplish. Thanks!
Solved! Go to Solution.
05-22-2012 08:52 PM
Hello David,
Thanks for taking the time to let the forum about this resolution
Now please mark the question as answered so future users can learn as you did
Have a wonderful night
Julio
05-22-2012 12:00 PM
One of the TAC guys helped me wth this. The answer is YES! The following line did the trick for me.
nat (outside,inside) source dynamic any interface destination static "Your Public mapped IP address here" "Your Internal real www server IP address here"
05-22-2012 08:52 PM
Hello David,
Thanks for taking the time to let the forum about this resolution
Now please mark the question as answered so future users can learn as you did
Have a wonderful night
Julio
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide