I'm trying to make a double nat to change the source and destination origin be any internet source but switch to your destination 172.31.89.5 and 172.31.65.5, this second NAT and what I have, but I have no idea how do any NAT
I am afraid that I still didnt quite get the whole situation yet.
You do mention that you want to do double NAT? This is something that would be way more easier in the ASA firewalls with newer software. Both your firewall and its software are very old.
But for examples sake, lets say that you have a Static NAT for some of your internal host/server. Lets also say that you want to NAT all incoming traffic destined to that Static NAT IP address of the server to a single IP address, then you would probably have to use Static NAT + Dynamic Policy PAT
It might look something like this
access-list DYNAMIC-POLICYPAT permit ip any host 18.104.22.168
To my understanding the above should do so that when traffic from "any" source address behind "outside" is coming towards the IP address 22.214.171.124 THEN the source addresses would be Dynamic PATed to IP address 126.96.36.199 and the IP 188.8.131.52 would be untranslated to the real IP address of 184.108.40.206
Real Source Address: any
Mapped Source Address: 220.127.116.11
Mapped Destination Address: 18.104.22.168
Real Destination Address: 22.214.171.124
But again it is hard to say if this is the configuration type you are looking for based on your earlier reply.
BenefitsDocumentationPrerequisiteImage Download LinksLimitationsSupported PlatformsLicense RequirementsTopologyStep-By-Step ConfigurationConfigure Virtual ServiceActivate the virtual service and configure guest IPsConfiguring UTD (Service Plane)Configurin...
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...