cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
825
Views
5
Helpful
3
Replies

Static Nat range ports ASA 8.2.

Lucio Garrido
Level 1
Level 1

Hello Cisco Community,

    Guys, I need your support and comment about how stablish one Static Nat range port on the ASA 5520 IOS 8.2.

Example:

Private IP 10.1.1.1 ports 4000 - 4500

Public  IP 200.100.10.1 ports 4000 - 4500

Regards and thanks!

1 Accepted Solution

Accepted Solutions

Hi Lucio,

You can create a static NAT in 8.2 and permit only the set of ports using the access list to allow it. 

For example

static (inside,outside) <public IP> <Private IP> netmask 255.255.255.255

Now create access list for thsi traffic.

access-list outside_in extended permit tcp any host <public IP> range 4000 5000

access-group outside_in in interface outside

Or you can upgrade the device to version above 8.3.

Thanks,
Shivapramod M
Please remember to select a correct answer and rate helpful posts

View solution in original post

3 Replies 3

Shivapramod M
Level 1
Level 1

Hi Lucio,

We can not create static NAT for range of ports in 8.2 version, Need to write multiple Statements or perform a Static one-to-one NAT.. This can be done in versions above 8.3 where there is change in the configuration of the NAT. 

Please refer "Static NAT for a Range of Ports" section

https://supportforums.cisco.com/document/33921/asa-pre-83-83-nat-configuration-examples

Thanks,
Shivapramod M
Please remember to select a correct answer and rate helpful posts

Hello Shivapramod M,

Thank you for your prompt response, so my only option is an upgrade to version IOS 8.3(4) or write line for line. Thanks again for your support and resolve my questions.

Regards!

Hi Lucio,

You can create a static NAT in 8.2 and permit only the set of ports using the access list to allow it. 

For example

static (inside,outside) <public IP> <Private IP> netmask 255.255.255.255

Now create access list for thsi traffic.

access-list outside_in extended permit tcp any host <public IP> range 4000 5000

access-group outside_in in interface outside

Or you can upgrade the device to version above 8.3.

Thanks,
Shivapramod M
Please remember to select a correct answer and rate helpful posts

Review Cisco Networking for a $25 gift card