35-20
Cisco ASA 5500 Series Configuration Guide using ASDM
Chapter35 Configuring NAT (ASA 8.2 and Earlier)
Using Dynamic NAT
Figure35-17 NAT and PAT Together
Outside NAT
If a NAT rule translates addresses from an outside interface to an inside interface, then the rule is an
outside NAT rule, and you need to specify that it translates inbound traffic. If you also want to translate
the same traffic when it accesses a lower security interface (for example, traffic on a DMZ is translated
when accessing the Inside and the Outside interfaces), then you can create a second NAT rule using the
same NAT ID (see Figure35-18), but specifying outbound. Note that for outside NAT (DMZ interface
to Inside interface), the inside host uses a static rule to allow outside access, so both the source and
destination addresses are translated.
Web Server:
www.cisco.com
Outside
Inside
Global 1: 209.165.201.3-
209.165.201.4
Global 1: 209.165.201.5
NAT 1: 10.1.2.0/24
10.1.2.27
10.1.2.28
10.1.2.29
132928
Translation
209.165.201.310.1.2.27
Translation
209.165.201.410.1.2.28
Translation
209.165.201.5:609610.1.2.29