10-10
Cisco ASA Series Firewall CLI Configuration Guide
Chapter 10 NAT Examples and Reference
NAT in Routed and Transparent Mode
NAT in Routed Mode
The following figure shows a typical NAT example in routed mode, with a private network on the inside.
Figure 10-8
NAT Example: Routed Mode
1.
When the inside host at 10.1.2.27 sends a packet to a web server, the real source address of the
packet, 10.1.2.27, is changed to a mapped address, 209.165.201.10.
2.
When the server responds, it sends the response to the mapped address, 209.165.201.10, and the
ASA receives the packet because the ASA performs proxy ARP to claim the packet.
3.
The ASA then changes the translation of the mapped address, 209.165.201.10, back to the real
address, 10.1.2.27, before sending it to the host.
NAT in Transparent Mode
Using NAT in transparent mode eliminates the need for the upstream or downstream routers to perform
NAT for their networks.
NAT in transparent mode has the following requirements and limitations:
•
Because the transparent firewall does not have any interface IP addresses, you cannot use interface
PAT.
•
ARP inspection is not supported. Moreover, if for some reason a host on one side of the ASA sends
an ARP request to a host on the other side of the ASA, and the initiating host real address is mapped
to a different address on the same subnet, then the real address remains visible in the ARP request.
•
Translating between IPv4 and IPv6 networks is not supported. Translating between two IPv6
networks, or between two IPv4 networks is supported.
The following figure shows a typical NAT scenario in transparent mode, with the same network on the
inside and outside interfaces. The transparent firewall in this scenario is performing the NAT service so
that the upstream router does not have to perform NAT.
We
b
S
erver
www.ci
s
co.com
O
u
t
s
ide
In
s
ide
209.165.201.2
10.1.2.1
10.1.2.27
130023
Tr
a
n
s
l
a
tion
209.165.201.10
10.1.2.27
Origin
a
ting
P
a
cket
Undo Tr
a
n
s
l
a
tion
209.165.201.10
10.1.2.27
Re
s
ponding
P
a
cket
S
ec
u
rity
Appli
a
nce
Summary of Contents for ASA 5508-X
Page 11: ...P A R T 1 Access Control ...
Page 12: ......
Page 157: ...P A R T 2 Network Address Translation ...
Page 158: ......
Page 233: ...P A R T 3 Service Policies and Application Inspection ...
Page 234: ......
Page 379: ...P A R T 4 Connection Management and Threat Detection ...
Page 380: ......