02-04-2009 11:39 PM - edited 03-11-2019 07:46 AM
hi,
Could you please let me know how to do source address NAT'ing on FWSM.
Source IP: 1.1.1.1
Ingress interface: DMZ1
Ingress subnet: 1.1.1.0/24
Egress interface: DMZ2
Egress subnet: 2.2.2.0/24
The Source IP 1.1.1.1 initiated from DMZ1 should be natted to 3.3.3.1 upon exiting the Egress interface DMZ2.
Thanks.
02-06-2009 05:15 AM
nat-control means all packets that flow through the Security Appliance require a NAT rule, or the packets will be denied access through the appliance.
This is not the intention. I do not want all the traffic going thru the appliance to be NAT'ed.
So as long as the NAT rule exists, natting should take place even if the nat-control is disabled.
02-06-2009 05:22 AM
Mate,
Can you please send me a link that explains this? As this is the 1st time to hear this.
I believe that if nat-control is disabled, no nat is going to take place on the firewall.
However, if nat-control is enabled and yet, some IP addresses need not to be natted, you may use nat exclude.
Cheers mate.
02-06-2009 05:43 AM
The link is as follows
http://www.cisco.com/en/US/docs/security/fwsm/fwsm31/configuration/guide/intfce_f.pdf
Please see page 6-1.
02-06-2009 05:42 AM
Mate,
Lets sum things up, your requirement is that when a host in DMZ1 (1.1.1.0/24) connects to a host in DMZ2 (2.2.2.0/24), the IP address of the host from DMZ1 (1.1.1.0/24) is NATed to 3.3.3.1?
02-06-2009 05:47 AM
Minor correction..
Host in DMZ1 connects to any host routed through DMZ2 (i.e. could be multiple hops away), the IP address of the host from DMZ1 should be NAT'ed to for e.g. 3.3.3.1
Also, I would like the NAT to occur on network level and not host.
Similar example in router IOS would be
ip nat inside source static network 192.168.10.0 172.16.1.0 /24
This caters to bi-directional NAT'ing. I would like to achieve the same in FWSM.
02-06-2009 06:57 AM
What are the network IPs used for DMZ1, DMZ2? And to what do you want DMZ1 to be NATed to? (please use X.X.X.0/24 for any with public IPs)
I also need the current static NAT configs on your FWSM.
02-06-2009 07:53 AM
DMZ1, DMZ2 subnet are for db server communications. As mentioned, DMZ1 should be NAT'ed to 3.3.3.0/24
There are no public IPs involved. Its all internal NAT'ing.
Currently there are no NAT configs on FWSM. Plain and simple case.
The example I gave of Router IOS was for some other network (just used as an example).
02-06-2009 08:07 AM
Configure static NAT on the firewall, ping any host in DMZ 2 from DMZ 1, and let us see the output of the "show log" command.
02-06-2009 10:04 AM
static (DMZ2,DMZ1) tcp 1.1.1.120 ftp 2.2.2.120 ftp netmask 255.255.255.255
> show log
%FWSM-6-305011: Built static tcp translation from DMZ2:2.2.2.120/21 to DMZ1:1.1.1.120/21
%FWSM-6-302013: Built inbound TCP connection 145674682330124245 for DMZ1:1.1.1.10/36217 (1.1.1.10/36217) to DMZ2:1.1.1.120/21 (2.2.2.120/21)
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide