cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

VIDEO: Cisco ASA version 8.3 and 8.4 NAT Configuration Example

94332
Views
45
Helpful
23
Comments

The video below provides a basic command line configuration example  of Network Address Translation (NAT) on the CIsco ASA Version 8.3. See  below for links to more information about NAT Configuration on version  8.3

ASA 8.3 Command Line Configuration Guide; Configuring NAT:

http://www.cisco.com/en/US/docs/security/asa/asa83/configuration/guide/nat_overview.html

ASA Pre-8.3 to 8.3 NAT configuration examples:

https://supportforums.cisco.com/docs/DOC-9129

Comments
Beginner

Thanks, its been a while since i did ASAs great help. One thing though last time I checked 10.1.0.0/16 etc would still be a class A address

Cisco Employee

Yeah, I should have said "slash-16"

Beginner

The video is well presented and provides a fairly good summary. I'd like to see the nat command explained in a little more detail. Of course I really wish they hadn't gone this route with the nat configuration.

Beginner

This was a big help to me.  I was told to upgrade this 5505 before I deployed it today so I was not familiar with these new changes, I saw there were notes and instructions but I needed to understand it quickly.  This was very straight forward and I was able to figure it out from here without spending too much time reading.  Now when I go back and read I'll have a better understanding of the changes.


Sometimes I feel like I have to read this stuff over and over before I comprehend it, I didn't have to do that this time!

Cisco Employee

Thanks, I'm very glad the video helped!

Beginner

Great video Jay! Thanks

//JimiSweden

Beginner

Excellent video. Real help with setting up NAT statements in 8.4. Picture is worth a thousand words and this video is worth a million. Thanks!

Beginner

Hello Jay,

Thank you for the great video!

I have a quick question that I would like to ask you!

With the [real-ip] feature, does it mean that the packet processing steps changed, that is, NAT is performed before Access-list?

Scenario to clarify, if we have Inside users going to the internet, and we have an Inside interface IN access-list, should we allow REAL ip addresses here or NATed IPs?

Thanks!

Ahmad

Cisco Employee

All ACLs (applied in any direction on any interface) should refer to the local (or real) ip addresses of the hosts in question.

So, for your ACL applied to the inside interface, the lines should permit or deny traffic from the real ip addresses of the hosts on the inside network, and not the translated addresses for those hosts.

http://www.cisco.com/en/US/docs/security/asa/asa83/upgrading/migrating.html#wp40036

https://supportforums.cisco.com/docs/DOC-12690#ACL_Changes

Beginner

Thank u Jay

Beginner

Hi jay,

Nice to hear new things from you

Thanks

Roopesh M N

Community Member

Video is not working, please someone send me the video link.

Cisco Employee

For some reason the video is not loading in Chrome, but does work in Firefox. Can you try Firefox?

Beginner

Thanks Jay!!!

Beginner

Excellent video, thank you.