Cisco ASA Dynamic NAT With DMZ
Cisco ASA Dynamic NAT With DMZ
In a previous lesson I explained how to configure dynamic NAT from the inside to the outside. In
this lesson we add a DMZ and some more NAT translations. Heres the topology that we will
use:
In this example we have our INSIDE, OUTSIDE and DMZ interfaces. The security levels of
these interfaces are:
INSIDE: 100
OUTSIDE: 0
DMZ: 50
We can go from a high security level to a low security level so this means that hosts from the
INSIDE can reach the DMZ and OUTSIDE. Hosts from the DMZ will also be able to reach the
OUTSIDE. We will configure NAT for the following traffic patterns:
Traffic from hosts on the INSIDE to the OUTSIDE, well use a public pool for
this.
Traffic from hosts on the INSIDE to the DMZ, well use a DMZ pool for this.
Traffic from hosts on the DMZ to the OUTSIDE, well use the same public pool
for this.
ASA1(config-if)#
ASA1(config-if)#
ASA1(config-if)#
ASA1(config-if)#
nameif DMZ
security-level 50
ip address 192.168.3.254 255.255.255.0
no shutdown
The INSIDE and OUTSIDE security levels have a default value, the DMZ I configured to 50
myself. Now lets look at the dynamic NAT configuration
PUBLIC_POOL
range 192.168.2.100 192.168.2.200
DMZ_POOL
range 192.168.3.100 192.168.3.100
I will use a range of IP addresses from the subnet that is configured on the OUTSIDE and DMZ
interface. Now we can create some network objects for the NAT translations: