INE Live Webinar : Understanding and Implementing NAT on Cisco ASA Firewall

preview_player
Показать описание
Working towards your CCIE Security Lab certification? Want to learn how NAT works or how to configure NAT on a Cisco ASA firewall? If so, join INE instructor Rohit Pardasani for an interactive session on Understanding and Implementing NAT on a Cisco ASA firewall. Rohit will lead you through configuring Dynamic NAT, Static NAT and Twice NAT. Familiarity with ASA is advised, but not required to join this session.

Рекомендации по теме
Комментарии
Автор

Ok, i found my instructor for Security, and I have to say, it is a relaxing feeling to watch someone just sit back and teach the material. Thank you, this is the type of training that I do and it works. You my friend are going to be sharing alot of late nights indirectly with security. Thank you for doing this in a way that is relatable. This lesson alone lets me know that I need to revisit the ASA. I got a job working in the SOC (first time working in security) and have been trying to change from ROUTE/SWITCH into a different realm and security wins the election. Finding an instructor that I relate to is hard and you, my friend, are it. Thank you so much.

kielmartin
Автор

Rohit !!! You are my path to the CCIE Security Destiny... Thank You .. Excellent Work!

jaradsamraj
Автор

Thank you, This was a really good session. You made NAT easy to understand, very concise and clear. I can’t thank you enough, I will definitely be looking at your courses on INE.

seand
Автор

Thank you very much Rohit, again very excellent way of teaching NAT on ASA.

CristopherCayabyab
Автор

Thankyou for sharing great information & detail explanation @INEtraining

yogeshnegi
Автор

Excellent ...Loved it ...way you teach is Exemplary

RahulSharma-qth
Автор

Great video, you definitely made things for easy me. Thanks!

JameelAhmed-pbii
Автор

gr8 explanation u have made NAT easy to Thanks for session ..

vivektherockstar
Автор

Excellent, clear and succinct Explanation of a much messed up topic on ASA.

Two Quick questions

@14:30. Wouldn't it consume more ASA resources if you place most general rules in the bottom of section-3, as for every LAN IP ASA will have to start looking for a rule from the top of section-1 until it finds a rule at the bottom of Section-3 ?

Second, What is it called, and how could we NAT Multiple Inside Servers with single Public IP Address ?

asadarain
Автор

Excellent explanation.. Thank you.. You have cleared many of my questions today..

ameenahmedu
Автор

Rohit you're great at Explaining technologies. Thanks for your videos!!! Can you please do a video about FHRP that would be really helpful?

techleo
Автор

Thank you so much, Rochit, awsome awesome explanation !!!

gabizhum
Автор

execellent tutor !! great demo and explanation

umiseaz
Автор

Have been looking at a number of NAT articles - in vain - this is the first time I feel I understand how it really works. Thanks a lot. Could you please do a feature on NAT when having VPN access to the Inside network ? - Split tunneling under anyconnect vs. NAT - we need both (I think) ?

bodstrup
Автор

This is really create explanation, Thanks a lot!

saadtalani
Автор

This was a nice refresher. Thanks Rohit. So just one thing, if I do a source nat (inside, outside) src-object dst-object - is this bidirectional automatically assuming I have the access-rules set up on my outside interface to allow the DNAT?

SApcGUY
Автор

great explation n detail thanks for sharing knowledge : QN can i know in old asa code & new asa code how acls and nat behave as u alredy mentioned can u explain that

vijays
Автор

With Manual NAT, isnt NAT Divert a consideration? For instance, at the end of the lesson Manual Rule 1 would cause all traffic that sources from Webserver2 (inside) to be immediately diverted to the Outside interface, even if it was trying to contact a device on another interface right? In this case shouldnt we put an identity NAT in there to avoid that situation? This is why you have to be careful with Manual NAT because you can inadvertently divert traffic because the NAT rules override the global routing table.

ccsmooth
Автор

if you just have on public adress on the outside interface and you have many server in DMZ that needs to be reachable from outside ? you said that static pat is not bidirectional

oskarnorman
Автор

INE, I hope you are listening. Please have Rohit do the Advanced technologies class for the new CCIE security exam. Please no more European instructors with bad accent.

aries