cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
579
Views
0
Helpful
4
Replies

NAT Question?

dianewalker
Level 1
Level 1

We have ASA 5540.  After setting up one-to-one nat, do I need to do anything else?

static (Inside,Outside) public ip address private ip address netmask 255.255.255.255

Thanks.

Diane

1 Accepted Solution

Accepted Solutions

static (Inside,Outside) 209.147.10.16 172.16.100.110 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.17 216.132.251.25 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.18 216.16.251.20 netmask 255.255.255.255

access-list acl_out extended permit tcp any host 209.147.10.16 eq smtp
access-list acl_out extended permit tcp any host 209.147.10.17 eq ftp
access-list acl_out extended permit tcp any host 209.147.10.18 eq ftp

You have to apply this ACL to the outside interface, so the source is any and the destination is the public IP that you define on the static NAT.

Remember the access group

access-group acl_out in interface outside

View solution in original post

4 Replies 4

if this NAT is for outbound traffic you don't need anything else. If your intention is to allow traffic from outside to inside you will need to add the necessary ACLs to allow the traffic.

Thanks for your prompt response.

Can you give me a sample ACLs to allow traffic from outside to inside?  I would like to allow ftp and smtp traffic.

thanks.

Diane

Does it looks right to you to allow traffic from outside to inside?   The IP addresses are not real.  The 216.132.251.XXX are the inside IP addresses.  The 209.147.10.XXX is the outside IP addresses.

static (Inside,Outside) 209.147.10.16 172.16.100.110 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.17 216.132.251.25 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.18 216.16.251.20 netmask 255.255.255.255

access-list acl_out extended permit tcp any host 216.132.251.25 eq smtp
access-list acl_out extended permit tcp any host 216.132.251.20 eq ftp
access-list acl_out extended permit tcp any host 172.16.100.110 eq ftp

Thanks.

Diane

static (Inside,Outside) 209.147.10.16 172.16.100.110 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.17 216.132.251.25 netmask 255.255.255.255
static (Inside,Outside) 209.147.10.18 216.16.251.20 netmask 255.255.255.255

access-list acl_out extended permit tcp any host 209.147.10.16 eq smtp
access-list acl_out extended permit tcp any host 209.147.10.17 eq ftp
access-list acl_out extended permit tcp any host 209.147.10.18 eq ftp

You have to apply this ACL to the outside interface, so the source is any and the destination is the public IP that you define on the static NAT.

Remember the access group

access-group acl_out in interface outside