could anyone confirm if doing the NAT in the router is better that doing it in a firewall?because someone told me this is the best practice from cisco.
My topology below:
CoreSwitch==>edge switch-->ASA-->Boarder router
Note: i have server in dmz configured in ASA and accessible thru internet.
configuring policy nat, dynamic nat, nat exemption, outside nat, destination nat, static 1-1, policy static all of these can be easily done on the ASA.
I would say do the nat on the ASA and let the router do what is is betst to do which is routing.
I guess it really depends on what you will be using the NAT for, as there is a number of application inspection that ASA is more superior of.
You are NATing your FTP server, and ASA is configured to inspect FTP traffic so it will dynamically open a pin hole for the FTP data connection.
If you perform the same on the router, first of all, for tighter security, you would need to create access-list, and then either CBAC or ZBFW to inspect the traffic. Router main functionality is performing routing, with the above example, you have just added security feature on the router which is not very efficient since you already have ASA firewall.
Hope that helps.