11.4 思科ASA:ASA8.3之前的NAT转换

11.4 思科ASA:ASA8.3之前的NAT转换

NATASA8.3及后续版本引入了统一NAT表(Unified NAT table)的概念,这种统一NAT表让管理员能够决定转换策略的执行次序。

这些策略会根据各个NAT条目的具体内容来执行(在统一NAT表中按照从上到下的哺育进行匹配),只要策略中出现了第一条匹配设备就不会继续进行处理。

8.3及后续版本中不能使用staticglobal命令。

 

NetworkObject NAT配置介绍

1.DynamicNAT(动态NAT,动态一对一)

   实例一:

   传统配置方法:

   nat (Inside) 1 10.1.1.0255.255.255.0

   global (Outside) 1202.100.1.100-202.100.1.200

 

   新配置方法(Network ObjectNAT

   object networkOutside-Nat-Pool

    range 202.100.1.100 202.100.1.200

   object networkInside-Network

    subnet 10.1.1.0 255.255.255.0

   object networkInside-Network

    nat (Inside,Outside) dynamic Outside-Nat-Pool

 

   实例二:

   object networkOutside-Nat-Pool

    range 202.100.1.100 202.100.1.200

   object networkOutside-PAT-Address

    host 202.100.1.201

   object-group networkOutside-Address

    network-object object Outside-Nat-Pool

    network-object object Outside-PAT-Address

  object network Inside-Network

(先100-200动态一对一,然后202.100.1.201动态PAT,最后使用接口地址动态PAT

    nat(Inside,Outside) dynamic Outside-Address interface

新的NAT命令绑定了源接口和目的接口,所以不会出现传统配置影响DMZ的问题(当时需要nat0+ acl来旁路)

 

2.DynamicPAT (Hide)(动态PAT,动态多对一)

   传统配置方式:

   nat (Inside) 1 10.1.1.0255.255.255.0

   global(outside) 1202.100.1.101

 

   新配置方法(Network ObjectNAT 

   object networkInside-Network

    subnet 10.1.1.0 255.255.255.0

   object networkOutside-PAT-Address

    host 202.100.1.101

   object networkInside-Network

    nat (Inside,Outside) dynamic Outside-PAT-Address

    or

    nat (Inside,Outside) dynamic 202.100.1.102

 

3.StaticNAT or Static NAT with PortTranslation(静态一对一转换,静态端口转换)

  实例一:(静态一对一转换)

   传统配置方式:

   static (Inside,outside)202.100.1.101 10.1.1.1

   新配置方法(Network ObjectNAT 

   object networkStatic-Outside-Address

    host 202.100.1.101

   object networkStatic-Inside-Address

    host 10.1.1.1

   object networkStatic-Inside-Address

    nat (Inside,Outside) static Static-Outside-Address

    or

    nat (Inside,Outside) static 202.100.1.102<dns>

 

   实例二:(静态端口转换)

   传统配置方式:

   static (inside,outside) tcp202.100.1.102 2323 10.1.1.1 23

 

 新配置方法(Network Object NAT

   object networkStatic-Outside-Address

    host 202.100.1.101

   object networkStatic-Inside-Address

    host 10.1.1.1

 object network Static-Inside-Address

     nat (Inside,Outside) static Static-Outside-Address service tcptelnet 2323

     or

     nat(Inside,Outside) static 202.100.1.101 service tcp telnet 2323

 

4.IdentityNAT

   传统配置方式:

   nat (inside) 0 10.1.1.1255.255.255.255

 

 新配置方法(Network Object NAT

   object networkInside-Address

    host 10.1.1.1

   object networkInside-Address

    nat (Inside,Outside) static Inside-Address

    or

    nat (Inside,Outside) static 10.1.1.1

 

Twice NAT(类似于PolicyNAT

实例一:

传统配置:

access-list inside-to-1 permit ip 10.1.1.0 255.255.255.0 host1.1.1.1

access-list inside-to-202 permit ip 10.1.1.0 255.255.255.0 host202.100.1.1

nat (inside) 1 access-list inside-to-1

nat (inside) 2 access-list inside-to-202

global(outside) 1 202.100.1.101

global(outside) 2 202.100.1.102

 

新配置方法(Twice NAT:

object network dst-1

 host 1.1.1.1

object network dst-202

 host 202.100.1.1

object network pat-1

 host 202.100.1.101

object network pat-2

 host 202.100.1.102

object network Inside-Network

 subnet 10.1.1.0 255.255.255.0

 

nat (Inside,Outside) source dynamic Inside-Network pat-1destination static dst-1 dst-1

nat (Inside,Outside) source dynamic Inside-Network pat-2destination static dst-202 dst-202

 

 

实例二:

传统配置:

access-list inside-to-1 permit ip 10.1.1.0 255.255.255.0 host1.1.1.1

access-list inside-to-202 permit ip 10.1.1.0 255.255.255.0 host202.100.1.1

nat (inside) 1 access-list inside-to-1

nat (inside) 2 access-list inside-to-202

global(outside) 1 202.100.1.101

global(outside) 2 202.100.1.102

static (outside,inside) 10.1.1.101 1.1.1.1

static (outside,inside) 10.1.1.102 202.100.1.1

 

新配置方法(Twice NAT:

object network dst-1

 host 1.1.1.1

object network dst-202

 host 202.100.1.1

object network pat-1

 host 202.100.1.101

object network pat-2

 host 202.100.1.102

object network Inside-Network

 subnet 10.1.1.0 255.255.255.0

object network map-dst-1

 host 10.1.1.101

object network map-dst-202

 host 10.1.1.102

 

nat (Inside,Outside) source dynamic Inside-Network pat-1destination static map-dst-1 dst-1

nat (Inside,Outside) source dynamic Inside-Network pat-2destination static map-dst-202 dst-202

 

实例三:

传统配置:

access-list inside-to-1 permit tcp 10.1.1.0 255.255.255.0 host1.1.1.1 eq 23

access-list inside-to-202 permit tcp 10.1.1.0 255.255.255.0 host202.100.1.1 eq 3032

nat (inside) 1 access-list inside-to-1

nat (inside) 2 access-list inside-to-202

global(outside) 1 202.100.1.101

global(outside) 1 202.100.1.102

 

新配置方法(Twice NAT:

object network dst-1

 host 1.1.1.1

object network dst-202

 host 202.100.1.1

object network pat-1

 host 202.100.1.101

object network pat-2

 host 202.100.1.102

object network Inside-Network

 subnet 10.1.1.0 255.255.255.0

object service telnet23

 service tcp destination eq telnet

object service telnet3032

 service tcp destination eq 3032

 

nat (Inside,Outside) source dynamic Inside-Network pat-1destination static dst-1 dst-1 service telnet23 telnet23

nat (Inside,Outside) source dynamic Inside-Network pat-2destination static dst-202 dst-202 service telnet3032telnet3032




思科Cisco ASA防火墙(列表、list、全)asalist、防火墙list
http://www.zh-cjh.com/wenzhangguilei/2594.html
文章归类、所有文章列表、LISTLIST
http://www.zh-cjh.com/wangzhangonggao/2195.html


1、本站资源长期持续更新。
2、本资源基本为原创,部分来源其他付费资源平台或互联网收集,如有侵权请联系及时处理。
3、本站大部分文章的截图来源实验测试环境,请不要在生产环境中随意模仿,以免带来灾难性后果。

转载请保留出处:  www.zh-cjh.com珠海陈坚浩博客 » 11.4 思科ASA:ASA8.3之前的NAT转换

作者: cjh


手机扫一扫,手机上查看此文章:

一切源于价值!

其他 模板文件不存在: ./template/plugins/comment/pc/index.htm

未雨绸缪、居安思危!

数据安全、有备无患!

注意操作、数据无价!

一切源于价值!