cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
963
Views
0
Helpful
3
Replies

identity nat vs policy nat

John Blakley
VIP Alumni
VIP Alumni

Is using identity nat as compared to nat exemption merely a preference, or are there benefits to one over the other? I've changed all of my identity nats over to policy nat, but I'm not sure (other than ease of reading and it doesn't add to the xlate table) if there are any other benefits I'm not seeing.

Thanks,

John

HTH, John *** Please rate all useful posts ***
1 Accepted Solution

Accepted Solutions

John

To be honest with you i think the terminology is way too complicated.

According the doc policy NAT is where you specify TCP/UDP ports in your acl rather than just src/dst IP's.

I tend to think of in more simple terms, perhaps because i am fundamentally quite a simple person :-).

1) Dynamic NAT with or without acl's, NAT or PAT.

2) static NAT with or without acl's.

For both of the above the acl's merely define the source IP's to be Natted.

3) Policy NAT - the ability to translate the same address to multiple different IP's based on src and dst IP and TCP/UDP port.

4) NAT exemption - don't do NAT at all.

Why the docs have to confuse things with identity NAT i don't know. I actually had to look that term up !. The above works well for me altho others may take issue with it.

As for which to use. Well if you don't want to NAT then NAT exemption saves an entry in the xlate table as you say.

Jon

View solution in original post

3 Replies 3

Jon Marshall
Hall of Fame
Hall of Fame

John

Just to clarify, what do you mean by policy NAT. Could you have a look at this document which covers policy NAT, identity NAT (both static and dynamic) and NAT exemption -

http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008046f31a.shtml

So you may be confusing policy NAT with NAT exemption. Then again you may not and it may be that is confused :-)

Personally i use policy NAT when i want to translate the same source addresses to different addresses depending on the destination address.

Jon

Jon,

I was confusing them. :)

policy nat = static (inside,dmz1)...

nat exemption = nat (inside) 0 access-list..

Is that right? I decided to take all of my statics off and move over to nat exemption, but I may go back. I'm not sure what a good deciding factor of doing one over the other is.

Thanks,

John

HTH, John *** Please rate all useful posts ***

John

To be honest with you i think the terminology is way too complicated.

According the doc policy NAT is where you specify TCP/UDP ports in your acl rather than just src/dst IP's.

I tend to think of in more simple terms, perhaps because i am fundamentally quite a simple person :-).

1) Dynamic NAT with or without acl's, NAT or PAT.

2) static NAT with or without acl's.

For both of the above the acl's merely define the source IP's to be Natted.

3) Policy NAT - the ability to translate the same address to multiple different IP's based on src and dst IP and TCP/UDP port.

4) NAT exemption - don't do NAT at all.

Why the docs have to confuse things with identity NAT i don't know. I actually had to look that term up !. The above works well for me altho others may take issue with it.

As for which to use. Well if you don't want to NAT then NAT exemption saves an entry in the xlate table as you say.

Jon

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card