{"id":707,"date":"2012-09-01T00:00:00","date_gmt":"2012-09-01T00:00:00","guid":{"rendered":"https:\/\/fir3netwp.gmsrrpobkbd.com\/2012\/09\/01\/cisco-asa-twice-nat\/"},"modified":"2021-07-30T13:22:15","modified_gmt":"2021-07-30T13:22:15","slug":"cisco-asa-twice-nat","status":"publish","type":"post","link":"https:\/\/www.fir3net.com\/Cisco-ASA\/cisco-asa-twice-nat.html","title":{"rendered":"Cisco ASA – Twice NAT"},"content":{"rendered":"

Twice NAT allows you to NAT both the source and destination within a single rule.<\/p>\n

Scenario<\/strong><\/h2>\n

A scenario where this type of configuration would be required is shown below. To ensure that any traffic originating from the Internet isn’t sent back out to its default gateway (asymmetrically routed) the source IP is translated to an IP within the range of the inside segment (192.168.100.0\/24). In turn ensuring the return traffic is sent back via the the Cisco ASA.<\/p>\n

 <\/p>\n

Example<\/strong><\/h2>\n

Within this example we will perform both Static PAT along with Dynamic PAT to ensure that traffic to our SMTP (192.168.100.200) server is not asymmetrically routed.<\/p>\n

Here are some more details :<\/p>\n