Create a Twice NAT Rule
Before you begin
Create a network object or network group that defines the pool of IP addresses you are going to translate to itself. For the ASA, the range of addresses can be defined by a network object that uses an IP address range, a network object that defines a subnet, or a network group object that includes all the addresses in the range.
When creating the network objects or network groups, use for instructions.
For the sake of the following procedure, we are going call the network object or network group, Site-to-Site-PC-Pool.
Procedure
1 |
In the left pane, click . |
2 |
Click the Devices tab to locate the device or the Templates tab to locate the model device. |
3 |
Click the appropriate device type tab. |
4 |
Select the device you want to create the NAT rule for. |
5 |
Click NAT in the Management pane at the right. |
6 |
Click |
7 |
In section 1, Type, select Static. Click Continue. |
8 |
In section 2, Interfaces, choose inside for the source interface and outside for the destination interface. Click Continue. |
9 |
In section 3, Packets, make these changes:
|
10 |
Skip section 4, Advanced. |
11 |
For an FDM-managed device, in section 5, Name, give the NAT rule a name. |
12 |
Click Save. |
13 |
For an ASA, create a crypto map. See CLI Book 3: Cisco ASA Series VPN CLI Configuration Guide and review the chapter on LAN-to-LAN IPsec VPNs for more information on creating a crypto map. |
14 |
Review and deploy now the changes you made, or wait and deploy multiple changes at once. |