We're Sorry, Full Content Access is for Members Only...

If you like to keep on reading, Become a Member Now! Here is why:

  • Learn any CCNA, CCNP and CCIE R&S Topic. Explained As Simple As Possible.
  • Try for Just $1. The Best Dollar You've Ever Spent on Your Cisco Career!
  • Full Access to our 644 Lessons. More Lessons Added Every Week!
  • Content created by Rene Molenaar (CCIE #41726)

460 Sign Ups in the last 30 days

satisfaction-guaranteed
100% Satisfaction Guaranteed!
You may cancel your monthly membership at any time.
No Questions Asked!

Tags: ,


Forum Replies

  1. Hi Rene,

    I dont know exactly what topic to place this question in thats why i am placing it here
    i got an opportunity for 3 days to work under a CCIE who was very rude and did not bother to ask him any questions as i knew he was not interested in explaining

    i was able to understand all bits till core SW through knowledge of your tutorials on VLAN and routing ,However cannot understand few bits in design at this point

    They got a public IP block from ISP lets say 90.81.31.128/27 30 host count

    Now the way the IP are assigned is as - 90.81.3.157 => ISP router LAN

    ... Continue reading in our forum

  2. ASA1(config)# object network INSIDE
    ASA1(config-network-object)# subnet 192.168.1.0 255.255.255.0
    ASA1(config-network-object)# nat (INSIDE,OUTSIDE) dynamic 192.168.2.253
    
    this tells our firewall to translate traffic from the 192.168.1.0 /24 subnet headed towards the OUTSIDE to IP address 192.168.2.253. If you configure the IP address like this then it has to be an IP address that is not in use on the interface. For example, when I try to use 192.168.2.254 (that’s the IP address on the OUTSIDE interface) then I will get an error

    Hi Rene,

    Can you please explain f

    ... Continue reading in our forum

  3. Hello Ajith

    The order of operation depends on if the NAT involved is source NAT or destination NAT. Specifically:

    For ASA versions before AND after 8.3 with SOURCE NAT, the order of operation does NOT change. That is:

    1 Routing, 2 Inbound ACL, 3 NAT

    For ASA versions BEFORE 8.3 and DESTINATION NAT, the order of operation is as follows:

    1 ACL 2 Destination NAT 3 Routing

    For ASA versions AFTER 8.3 and DESTINATION NAT, the order of operation is as follows:

    1 Destination NAT/Partial routing* 2 ACL

    *Partial routing refers to the determination of the exit interface

    ... Continue reading in our forum

  4. thanks its clear now

  5. Thanks Laz, I’ll give it a shot!

15 more replies! Ask a question or join the discussion by visiting our Community Forum