Central DNAT
Central NAT allows for the central configuration of SNAT (source NAT) and DNAT (destination NAT).
To enable central NAT in the GUI:
-
Go to System > Settings.
-
In the System Operation Settings, enable Central SNAT.
-
Click Apply.
To enable central NAT in the CLI:
config system settings set central-nat {enable | disable} end
When central NAT is enabled, virtual IPs (VIPs) are not configured in the firewall policy. The VIPs are configured as separate objects where their status must be enabled.
This option is only available for IPv4 VIP and VIP46 objects. |
Configuring a DNAT and VIP object in central NAT mode is similar to configuring a VIP when central NAT is disabled. See Static virtual IPs for more information on each setting.
VIP objects can carry over when switching from non-central NAT mode to central NAT mode or vice-versa. However, if a VIP is assigned to a firewall policy in non-central NAT mode, it must be unassigned before switching to central NAT mode.
In this example, a DNAT and VIP are configured to forward traffic from 10.1.100.130 to 172.16.200.44. This example assumes that the firewall address, Addr_172.16.200.44/32, has already been configured.
To configure DNAT and a VIP in the GUI:
-
Configure the VIP:
-
Go to Policy & Objects > DNAT & Virtual IPs and click Create New > DNAT & Virtual IP.
-
Enter a name (test-vip44-1).
-
Set the External IP address/range to 10.1.100.130.
-
Set the Map to IPv4 address/range to 172.16.200.44.
-
Click OK.
-
-
Configure a firewall policy that allows traffic in the direction of the VIP:
-
Go to Policy & Objects > Firewall Policy and click Create New.
-
Configure the following settings:
Name
VIP-port2toport3
Source
all
Destination
Addr_172.16.200.40
Schedule
always
Service
ALL
Action
ACCEPT
-
Configure the other settings as needed. There is no SNAT configuration section, so central SNAT policies will be applied.
-
Click OK.
-
To configure DNAT and a VIP in the CLI:
- Configure the VIP:
config firewall vip edit "test-vip44-1" set extip 10.1.100.130 set mappedip "172.16.200.44" set extintf "any" set status enable next end
- Configure a firewall policy that allows traffic in the direction of the VIP:
config firewall policy edit 3 set name "VIP-port2toport3" set srcintf "port2" set dstintf "port3" set action accept set srcaddr "all" set dstaddr "Addr_172.16.200.40" set schedule "always" set service "ALL" next end
To verify the DNAT and VIP:
If the VIP status is enabled, it will appear in the VIP table:
# diagnose firewall iprope list 100000 policy index=7 uuid_idx=625 action=accept flag (8000104): f_p nat pol_stats cos_fwd=0 cos_rev=0 group=00100000 av=00000000 au=00000000 split=00000000 host=0 chk_client_info=0x0 app_list=0 ips_view=0 misc=0 zone(1): 0 -> zone(1): 0 source(1): 0.0.0.0-255.255.255.255, uuid_idx=0, dest(1): 10.1.100.130-10.1.100.130, uuid_idx=625, service(1): [0:0x0:0/(0,0)->(0,0)] helper:auto nat(1): flag=0 base=10.1.100.130:0 172.16.200.44-172.16.200.44(0:0)
If the VIP status is disabled, it will not appear in the VIP table.
In this example, a one-to-one static NAT is enabled. Send a ping to 10.1.100.130, and the traffic will be forwarded to the destination 172.16.200.44.