cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
956
Views
0
Helpful
10
Replies

NAT quistion

rexpetersen
Level 1
Level 1

Hi

Hope someone can help me with the following problem.

I have an ASA 5510 that looks like this:

INTERFACE 0: DHCP (OUTSIDE)

INTERFACE 1: 10.45.0.1 255.255.255.0

INTERFACE 2: 192.168.0.1 255.255.255.0

I need to access the net (10.45.0.0 255.255.255.0) on INTERFACE 1 from all IP addresses (192.168.0.1 255.255.255.0) on INTERFACE 2

But all INTERFACE 2 addresses shall be translated to one single address (10.45.0.15) at INTERFACE 1

How can I do that ?

Thanks

Rex

10 Replies 10

rizwanr74
Level 7
Level 7

What version of your ASA ?

8.03

I am not so sure of your interface names on your FW.

but I could assume as follows, in case they are not setup on your FW, please change those are in brakets (i.e. interface names) to reflect your ASA interface names.

static (inside,dmz) 10.0.0.0 10.0.0.0 netmask 255.0.0.0

INTERFACE 2: assumed security level less than 100.

INTERFACE 1: assumed security level equal to 100.

I hope this helps.

Thanks

Rizwan Rafeek.

rizwanr74

The way you suggest nat 1 to 1  a.a.a.1 vil translatet to b.b.b.1 , a.a.a.2 translatet to b.b.b.2

The way I wan is that entire a.a.a.a network wil be translatet to one single b.b.b.b address. Like PAT.

Best regards

Rex

dmz = INTERFACE 1:

inside = INTERFACE 2:

access−list policy−nat extended permit ip 192.168.0.0 255.255.255.0 10.45.0.0 255.255.255.0


global (dmz) 45 10.45.0.15
nat (inside) 45 access-list policy−nat

Let me know, if this helps.

thanks

Hi

Back on work after a great weekend :-)

OK i get the idea to make a virtual interface.

I have now implementet it, but somehow I can't get the access-list triggered ??

Even if it try for at short test to put in: ANY ANY ... nothing triggers the access-list.

Best regards

Rex

Hi Rex,

I think that the access-list for nat is too restrictive....

try

access−list policy−nat extended permit ip 192.168.0.0 255.255.255.0 any

Regards

Amanda

Hi Amanda

Same problem ... no hits on the access-list.

Here my setup:


interface Ethernet0/0
nameif OUTSIDE
security-level 0
ip address x.x.x.154 255.255.255.240


interface Ethernet0/1.40
vlan 123
nameif KUNDENET
security-level 60

ip address 192.168.123.1 255.255.255.0


interface Ethernet0/1.60
vlan 130
nameif SAS_LAN_10
security-level 55
ip address 10.45.0.1 255.255.248.0

access-list policy-nat extended permit ip 10.45.0.0 255.255.248.0 192.168.123.0 255.255.255.0

global (KUNDENET) 45 192.168.123.121
nat (SAS_LAN_10) 45 access-list policy-nat

global (OUTSIDE) 1 interface
global (KUNDENET) 45 192.168.123.121

nat (SAS_LAN_10) 0 access-list NO_NAT
nat (SAS_LAN_10) 45 access-list policy-nat
nat (SAS_LAN_10) 1 10.45.0.0 255.255.248.0

nat (KUNDENET) 0 access-list NO_NAT
nat (KUNDENET) 1 192.168.123.0 255.255.255.0


The NO_NAT's are for some VPN tunnels

// Rex

You need an ACL permit entry to enter high security(KUNDENET) zone interface from lower security (SAS_LAN_10)

zone interface.

access−list kundenet-in extended permit ip 10.45.0.0 255.255.248.0 192.168.123.0 255.255.255.0

access-group kundenet-in in interface KUNDENET

let me know, if that helps.

thanks

Rizwan Rafeek

Hi Rex

Try a couple of things for me please.

Use the show nat command to see what NAT will be applied to the various interfaces and try setting the SAS_LAN_10 interface security level to 60.

Use the same-security-traffic permit inter-interface command.

The nat works by letting traffic from a protected interface go to a less protected or same level interface (with the command above).

Thanks very much

Regards,

Amanda Lalli-Cafini

Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community:

Review Cisco Networking products for a $25 gift card