Category: Deploying a File Policy

  • Verifying the Operation: Outside to DMZ – Cisco Network Address Translation (NAT)

    Verifying the Operation: Outside to DMZ This section demonstrates the operation of a static Auto NAT rule on a threat defense. As in the previous exercise, this one also uses the SSH service to generate traffic. However, unlike in the previous exercise, the SSH connection is initiated by an external…

  • Verifying the Operation: Inside to Outside – Cisco Network Address Translation (NAT)

    Verifying the Operation: Inside to Outside This section describes how to verify the NAT operation on a threat defense. To demonstrate the translation process, this example uses SSH traffic. Let’s initiate a connection from an internal host 192.168.1.10 to an external SSH server 203.0.113.10. If NAT is operational on the…

  • NAT Essentials – Cisco Network Address Translation (NAT)

    NAT Essentials NAT enables a threat defense to translate an internal IP address into an address from a different subnet. The NAT process is transparent to both internal and external hosts. When NAT is in action, an internal host is unaware that its original IP address is being translated or…

  • Configuring a Dynamic NAT Rule – Cisco Network Address Translation (NAT)

    Configuring a Dynamic NAT Rule The management center offers two types of NAT policies: the Firepower NAT Policy and Threat Defense NAT Policy. The former is used to enable NAT on classic hardware models, such as the 7000 and 8000 Series. To enable NAT on a threat defense, you need…