I have done this exercise long time ago but I can't recollect how this was done and I was wondering if somebody could shed some ideas.
I have a machine in LAN with 10.10.x.xxx address scheme. I like to translate this address to another private address in 192.168.x.xxx subnet and map a public address to this NAT'd address. So it will look like:
Cloud > Public Address> Firewall> 192.168.x.xxx > 10.10.x.xxx.
Machine is physically placed in 10.10.x.xxx subnet and I like the firewall to route requests coming from cloud > public address > 192.168.x.xxx >10.10.x.xxx without physically placing the server in 192.168.x.xxx subnet.
I have a machine located in LAN with Class C private address. I have a perimeter network with its own address scheme.
I like to have the machine in LAN do a static mapping with the DMZ address, and then do a static mapping of DMZ address to the public address. I don't want to expose the machine identification by translating the internal address to public address. I want packets going out from DMZ address to Internet.
LAN > DMZ
DMZ > Public address
Public address > Internet
There won't be a physical machine located in DMZ. I like to have ASA perform all the translations and routing. If required, I can plug in an entry for DNS.
We are pleased to announce availability of Beta software for 16.6.3. 16.6.3 will be the second rebuild on the 16.6 release train targeted towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are looking for early feedback from custome...