static (dmz,outside) 200.147.90.89 172.17.1.3 netmask 255.255.255.255
There is a special situation come up today. When 172.17.1.3 access to another site 200.200.200.200 , it has to be nat-ed to different ip address 200.147.90.83
1. ![]()
NAT exemption (nat 0 access-list)—In order, until the first match. Identity NAT is not included in this category; it is included in the regular static NAT or regular NAT category. We do not recommend overlapping addresses in NAT exemption statements because unexpected results can occur.
2. ![]()
Static NAT and Static PAT (regular and policy) (static)—In order, until the first match. Static identity NAT is included in this category.
3. ![]()
Policy dynamic NAT (nat access-list)—In order, until the first match. Overlapping addresses are allowed.
4. ![]()
Regular dynamic NAT (nat)—Best match. Regular identity NAT is included in this category. The order of the NAT commands does not matter; the NAT statement that best matches the real address is used. For example, you can create a general statement to translate all addresses (0.0.0.0) on an interface. If you want to translate a subset of your network (10.1.1.1) to a different address, then you can create a statement to translate only 10.1.1.1. When 10.1.1.1 makes a connection, the specific statement for 10.1.1.1 is used because it matches the real address best. We do not recommend using overlapping statements; they use more memory and can slow the performance of the adaptive security appliance.
The tricky part is #2 contains NAT and PAT as well as regular and policy. So there are 4 iterations in that one section. The go in the order they were entered into the config.
"
Last step, adjust the order of NAT, put Policy NAT before regular static NAT. Everything works like a charm!!
本文详细阐述了如何在Cisco ASA设备上通过调整NAT配置顺序,解决特定情况下IP地址重叠导致的连接问题。通过将策略NAT放置在常规静态NAT之前,实现了目标系统的正常访问。

被折叠的 条评论
为什么被折叠?



