cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
377
Views
0
Helpful
3
Replies

NAT - Understanding

edw
Level 1
Level 1

Hi,

I have been running a PIX 520 with 6.3. Now coding a PIX515E with 7.1. I decided to read a manual ;)

Now I was amazing at the different NAT and policies.

What is the best way to do things - on my old firewall I just had access lists binded to my interfaces. SHould I continue this or should I use policy NAT style ??

Also with vlan - should I just let the flow of the main interface or is it more secure to create vlan interfaces ??

Thanks for any pointers

Ed

3 Replies 3

gaetan.allart
Level 1
Level 1

Hi,

Nat policies have to be designed according to what you want to do...

Remember that access-lists are not especially lminked to nat rules.

Purpose of VLAN is to spare interfaces. 515E has 6 FE. If you don't need 100Mb for your subnet and if you plan to connect many (>6) subnets on thix PIX, I suggest using Vlans...

Regards,

Gaetan

Thanks for the reply.

I'm using vlan for the DMZ thou its on one FE. I using a vlan for the public traffic and one for managment - is this correct way to proceed.

So there is no greater security by using policy nat comparared to just binding ACL's to the interface ??

At present I have about 3 or 4 vlans inside going through the PIX to public router. I dont have it vlans in the PIX it comes in gets NAT'ed and then leaves without a segragation in terms of vlan. Security wise this is fine...?

Thanks

Ed

NAT is just a way to translate addresses. It will never replace filtering with ACLs.

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card