NAT configuration of the ASA/PIX Firewall
1. configure a public address pool for NAT translation nat (inside) 1 10.0.0.0 255.255.255.0global (outside) 1 222.172.200.20-222.172.200.30 // can this command be unavailable? And the tab key are incomplete, but you don't have to worry about it. Just press it to finish. Or global (outside) 1 222.172.200.20 2. NAT for a public network with only one fixed IP address is converted to nat (inside) 1 10.0.0.0 255.255.255.0global (outside) 1 222.172.200.68 // specify a public IP address as a network segment. 3. PAT conversion. Suitable for nat (inside) 1 10.0.0.0 255.255.255.0global (outside) scenarios without fixed IP addresses) 1 interface 4. Static route and default route outside 2.2.2.0 route 255.255.0 202.103.10.1 // point to the static route inside 192.168.1.0 255.255.255.0 192.168.0.1 // point to the static route inside 0 0 172.16.0.1 on the Intranet // pointing to the Intranet default route outside 0 0 222.172.2.1 // pointing to the Internet default route 5. When configuring NAT, use the DEBUG command clear configure all // clear all configurations show conn // view internal connections show xlate // view the address translation table clear xlate // clear the address translation entry show run nat // view nat Information