
2-29
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 2 Establishing Connectivity
Basic Configuration Examples
Figure 2-6 Two Interfaces with NAT or PAT
Internet
Intranet
Outside
192.168.3.1
209.165.201.1
209.165.201.3
34784
The following steps show how to change the example given in “Two Interfaces Without NAT or PAT”
for enabling NAT and PAT:
Step 1 Identify the IP addresses for each interface:
ip address outside 209.165.201.3 255.255.255.224
ip address inside 192.168.3.1 255.255.255.0
This step differs from “Two Interfaces Without NAT or PAT” because the inside IP addresses in this
example are unregistered.
Step 2 Enter the following command to enable NAT and PAT:
nat (inside) 1 0 0
This permits all inside users to start outbound connections using the translated IP addresses from a global
pool. This command replaces the command in
Step 10 in “Two Interfaces Without NAT or PAT.”
Step 3 Create a pool of global addresses that translated addresses use when they exit the PIX Firewall from the
protected networks to the unprotected networks:
global (outside) 1 209.165.201.10-209.165.201.30
global (outside) 1 209.165.201.8
The global command statement is associated with a nat command statement by the NAT ID, which in
this example is 1. Because there are limited IP addresses in the pool, a PAT external (global) address is
added to handle overflow.
Example 2-3 shows the complete configuration for configuring two interfaces with NAT.
Example 2-3 Two Interfaces with NAT
nameif ethernet0 outside security0
nameif ethernet1 inside security100
interface ethernet0 100basetx
interface ethernet1 100basetx
ip address outside 209.165.201.3 255.255.255.224
ip address inside 192.168.3.1 255.255.255.0
hostname pixfirewall
arp timeout 14400
Komentarze do niniejszej Instrukcji