NAT: Source NAT: If my internal address is getting translated, regardless of the direction of the access, it is called source nat. The word source is “YOU” or “MY” address translation. 99% of the time you will be doing source NAT. Destination NAT: If the External / Remote / Foreign address changes, it is called destination NAT. The word destination is “Them”. --------------------------------------------------------------------------------------------------------------------------Source Dynamic Nat: Allows internal users to go out using a public address from a pool defined on the firewall. This is also referred to as object Nat or Auto-Nat. 1.Define pool Object network pool1 Range 192.1.20.101 192.1.20.200 2. Specify the address that can use the pool Object network INS-NET Subnet 10.11.11.0 255.255.255.0 Nat (Inside,outside) dynamic pool1 ----------------------------------------------------------------------------------------------------------------------------Source Static NAT: Translates an Internal address on the Outside. This is done statically so that an entry is created in the translation table. You still need to allow access from low to high. Translation entry is created as soon as we configure the static Nat on the Firewall. !Web server Object network www1 Host 192.168.1.11 Nat (dmz,outside) static 192.1.20.21 !E-mail server Object network Email1 Host 192.168.1.12 Nat (dmz,outside) static 192.1.20.22 !DNS server Object network dns1 Host 192.168.1.13 Nat (dmz,outside) static 192.1.20.23 !R3 Object network R3 Host 192.168.1.3 Nat (dmz,outside) static 192.1.20.24 Access-list OUTSIDE permit tcp any host 192.168.1.11 eq 80 Access-list OUTSIDE permit tcp any host 192.168.1.11 eq 443 Access-list OUTSIDE permit tcp any host 192.168.1.11 eq 25 Access-list OUTSIDE permit tcp any host 192.168.1.3 eq 80 Access-list OUTSIDE permit udp any host 192.168.1.13 eq 53 ! Access-group OUTSIDE in interface Outside. Show xlate ! static nat takes precedence over dynamic nat. !Clear xlate !Clear configure object !Source PAT: !1.Dynamic PAT using the Outside interface Object network INS-NET Subnet 10.11.11.0 255.255.255.0 Nat (Inside.outside) dynamic interface Or !2.Dynamic PAT using ip address !A. Create an object of the ip address or pool of the ip address Object network PAT Host 192.1.20.5 !B. create the inside network and specify to use the pool for PAT. Object network INS-NET Subnet 10.11.11.0 255.255.255.0 Nat (Inside,outside) dynamic pat-pool PAT Sh xlate (For verification) Static PAT Object network www1 Host 192.168.1.11 Nat (dmz,outside) static 192.1.20.11 service tcp 80 80 ! Object network Email1 Host 192.168.1.12 Nat (Dmz,outside) static 192.1.20.11 service tcp 25 25 ! Object network dns1 Host 192.168.1.13 Nat (dmz,outside) static 192.1.20.11 service udp 53 53 (Note : this is called port forwarding) ! Object network R3 Host 192.168.1.3 Nat (dmz,outside) static 192.1.20.11 service tcp 23 2311 (Note: this is called port redirection) !Destination Nat Object network H199 Host 199.1.1.1 Nat (outside,dmz) static 192.168.1.177 -------------------------------------------------------------------------------------------------------------------------------------!Twice NAT/ Manual NAT It allows you to change the source as well as the destination in a single Nat statement. This is also known as Manual-Nat. Preference Twice NAT -> Auto-NAT(Static Nat) -> Auto-NAT (Dynamic) 1.Create object for all the addresses involved Object network R3-D Host 192.168.1.3 Object network R3-O Host 192.1.20.20 ! Object network H199-O Host 199.1.1.1 Object network H199-D Host 192.168.1.79 2. Create the Twice-Nat/Manual-Nat statement Nat (dmz,outside) source static R3-D R3-O destination static H199-D H199-O Analyze traffic flows From: 1. High security level to low security level 2. Low security level to high security level 3. Same security level interfaces 1 High Security Level to low security level By default, all the traffic is allowed to flow from a high security level to low security level interface towards a low security as long as the routing information is available. Although, all traffic is allowed to flow from high security level to a low security level, only TCP and UDP traffic is inspected.