Create a Twice NAT Rule
Before you begin
Create a network object or network group that defines the pool of IP addresses you are going to translate to itself. For the ASA, the range of addresses can be defined by a network object that uses an IP address range, a network object that defines a subnet, or a network group object that includes all the addresses in the range. For the FTD, the range of addresses can be defined by a network object that defines a subnet or a network group object that includes all the addresses in the range.
When creating the network objects or network groups, use Create or Edit a Firepower Network Object or Network Group for instructions.
For the sake of the following procedure, we are going call the network object or network group, Site-to-Site-PC-Pool.
Procedure
1 |
In the left pane, click . |
2 |
Click the Devices tab to locate the device or the Templates tab to locate the model device. |
3 |
Click the appropriate device type tab. |
4 |
Select the device you want to create the NAT rule for. |
5 |
Click NAT in the Management pane at the right. |
6 |
Click |
7 |
In section 1, Type, select Static. Click Continue. |
8 |
In section 2, Interfaces, choose inside for the source interface and outside for the destination interface. Click Continue. |
9 |
In section 3, Packets, make these changes:
|
10 |
Skip section 4, Advanced. |
11 |
For an FDM-managed device, in section 5, Name, give the NAT rule a name. |
12 |
Click Save. |
13 |
For an ASA, create a crypto map. See CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide and review the chapter on LAN-to-LAN IPsec VPNs for more information on creating a crypto map. |
14 |
Review and deploy now the changes you made, or wait and deploy multiple changes at once. |