Cisco Systems and the ASA Services Module Manual De Usuario

Descargar
Página de 712
 
4-3
Cisco ASA Series Firewall CLI Configuration Guide
 
Chapter 4      Configuring Network Object NAT
  Default Settings
Additional Guidelines
You can only define a single NAT rule for a given object; if you want to configure multiple NAT 
rules for an object, you need to create multiple objects with different names that specify the same 
IP address, for example, object network obj-10.10.10.1-01object network obj-10.10.10.1-02
and so on.
If you change the NAT configuration, and you do not want to wait for existing translations to time 
out before the new NAT configuration is used, you can clear the translation table using the clear 
xlate
 command. However, clearing the translation table disconnects all current connections that use 
translations.
Note
If you remove a dynamic NAT or PAT rule, and then add a new rule with mapped addresses 
that overlap the addresses in the removed rule, then the new rule will not be used until all 
connections associated with the removed rule time out or are cleared using the clear xlate 
command. This safeguard ensures that the same address is not assigned to multiple hosts.
Objects and object groups used in NAT cannot be undefined; they must include IP addresses.
You cannot use an object group with both IPv4 and IPv6 addresses; the object group must include 
only one type of address.
You can use the same mapped object or group in multiple NAT rules.
The mapped IP address pool cannot include:
The mapped interface IP address. If you specify any interface for the rule, then all interface IP 
addresses are disallowed. For interface PAT (routed mode only), use the interface keyword 
instead of the IP address.
(Transparent mode) The management IP address.
(Dynamic NAT) The standby interface IP address when VPN is enabled.
Existing VPN pool addresses.
For application inspection limitations with NAT or PAT, see the 
Default Settings
(Routed mode) The default real and mapped interface is Any, which applies the rule to all interfaces.
The default behavior for identity NAT has proxy ARP enabled, matching other static NAT rules. You 
can disable proxy ARP if desired. See the 
 for more 
information.
If you specify an optional interface, then the ASA uses the NAT configuration to determine the 
egress interface, but you have the option to always use a route lookup instead. See th
 for more information.