Got it

Matching sequence of firewall security policies and NAT policies

Created: May 27, 2021 03:28:18Latest reply: Jul 20, 2021 09:43:41 196 6 1 0 0
  Rewarded HiCoins: 0 (problem resolved)

Hi community,

What is the sequence rule for matching firewall security policies and NAT policies? Does the firewall perform NAT before matching security policies or perform NAT before matching security policies?

Thanks.

Featured Answers

Best answer

Recommended answer

Popeye_Wang
Admin Created May 27, 2021 03:30:01

Hello,

According to the NAT service process:

  • Destination NAT is performed before security policy check, and therefore the destination address in the security policy must be set to the post-NAT address.

  • Source NAT is performed after security policy check, and therefore the source address in the security policy must be set to the pre-NAT address.

That is, the source and destination IP addresses specified in a security policy are the actual source and destination IP addresses.

NAT

Refer to:https://support.huawei.com/enterprise/en/doc/EDOC1100170995/7f00855d?idPath=24030814|9856724|21430823|251711411|251710381

Any further questions, please let us know.

View more
  • x
  • convention:

IndianKid
IndianKid Created May 27, 2021 05:37:20 (0) (0)
Really cool explanation, Thanks  
All Answers

Hello,

According to the NAT service process:

  • Destination NAT is performed before security policy check, and therefore the destination address in the security policy must be set to the post-NAT address.

  • Source NAT is performed after security policy check, and therefore the source address in the security policy must be set to the pre-NAT address.

That is, the source and destination IP addresses specified in a security policy are the actual source and destination IP addresses.

NAT

Refer to:https://support.huawei.com/enterprise/en/doc/EDOC1100170995/7f00855d?idPath=24030814|9856724|21430823|251711411|251710381

Any further questions, please let us know.

View more
  • x
  • convention:

IndianKid
IndianKid Created May 27, 2021 05:37:20 (0) (0)
Really cool explanation, Thanks  
Good answer
View more
  • x
  • convention:

Thanks.
View more
  • x
  • convention:

andersoncf1
andersoncf1 MVE Author Created May 28, 2021 11:07:52

Community members have already brought in accurate information.
View more
  • x
  • convention:

Helpful
View more
  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.