Customizing NAT Rules for Multiple Devices
Because the NAT policy is shared, you can assign a given policy to more than one device. However, you can configure at most one auto NAT rule for a given object. Thus, if you want to configure different translations for an object based on the specific device doing the translation, you need to carefully configure the interface objects (security zones or interface groups) and define network object overrides for the translated address.
The interface objects determine on which devices a rule gets configured. The network object overrides determine what IP addresses are used by a given device for that object.
Consider the following scenario:
-
FTD-A and FTD-B have inside networks 192.168.1.0/24 attached to the interface named “inside.”
-
On FTD-A, you want to translate all 192.168.1.0/24 addresses to a NAT pool in the 10.100.10.10 - 10.100.10.200 range when going to the “outside” interface.
-
On FTD-B, you want to translate all 192.168.1.0/24 addresses to a NAT pool in the 10.200.10.10 - 10.200.10.200 range when going to the “outside” interface.
To accomplish the above, you would do the following. Although this example rule is for dynamic auto NAT, you can generalize the technique for any type of NAT rule.
Procedure
Step 1 | Create the security zones for the inside and outside interfaces. |
Step 2 | Create the network object for the original inside network on the Object Management page. |
Step 3 | Create the network object for the translated NAT pool and define overrides. |
Step 4 | Configure the NAT rule. |