Got it

Understand Firewall NAT Server & Source NAT Using the CLI - In Practice

Latest reply: Feb 3, 2022 14:16:57 622 26 23 0 0

Understand Firewall NAT Server & Source NAT Using the CLI - In Practice


Hello guys!


Today, I would like to present an introduction to Firewall NAT Server & Source NAT in practice.


About This Experiment


After NAT is configured on the firewall connecting an intranet to the Internet, multiple users on the intranet can access the Internet at the same time by using a small number of public IP addresses. In addition, users on the Internet can access the intranet server through specific IP addresses.


Objectives:


  • Understand the application scenario and mechanism of Source NAT.

  • Understand the application scenario and mechanism of NAT Server.

  • Configure NAT Server and Source NAT on the CLI and web UI.


Experiment Networking


1


Figure 1 - Topology for configuring NAT Server and Source NAT on a firewall


Experiment Planning


A security device USG is deployed on a service node. The upstream and downstream devices of the USG are switches.


Device NamePort
IP Address
Zone
FW1G1/0/010.1.1.1DMZ
G1/0/510.1.2.100Trust
G1/0/620.1.2.100Untrust
PC1E/0/0/110.1.2.100
Trust
PC2E/0/0/120.1.2.100Untrust
ServerE/0/0/110.1.1.100DMZ

Table 1 - Port addresses and zones


Experiment Tasks


No.TaskSubtaskDescription
1Complete basic configurations.Configure security zones.Add interfaces to security zones.
Configure a security policy.

Permit the packets from the Trust zone to the Untrust zone.

2
Configure Source NAT.Configure a NAT address pool.Create a public address pool.
Configure a NAT policy.Configure a NAT policy for packets from the Trust zone to the Untrust zone.



Experiment Task Configuration (Source NAT)


Configuration Roadmap


1. Configure IP addresses for interfaces and add the interfaces to security zones. Configure a security policy to permit packets from the Trust zone to the Untrust zone.

2. Create a NAT address pool.

3. Configure a NAT policy.


Configuration Procedure on the CLI


Step 1 Complete the configuration of the upstream and downstream service interfaces on the USG. Configure IP addresses for the interfaces and add the interfaces to security zones.


2

3


Step 2 Configure a security policy to permit packets from the Trust zone to the Untrust zone.


2


Step 3 Configure a NAT address pool and set the public address range to 2.2.2.2-2.2.2.5.


3


Step 4 Configure a NAT policy.


4


Step 5 - Configure IP address on PCs.


5

6

7


Verification


Checking the Ping Result and Firewall Session Table


Run the ping 20.1.2.100 command on PC1 to check whether PC1 can ping through PC2.


8


Run the display firewall session table command to check the NAT results.


9


With that our practical example was completed.


Cheers,


Good one
View more
  • x
  • convention:

good guide, thanks for sharing
View more
  • x
  • convention:

Very informative and useful post
View more
  • x
  • convention:

Thanks for sharing
View more
  • x
  • convention:

Diego.Silva
MVE Author Created Jan 10, 2022 13:52:04

Thanks for sharing
View more
  • x
  • convention:

Vlada85
MVE Author Created Jan 10, 2022 15:20:33

Nice
View more
  • x
  • convention:

Very informative and useful post
View more
  • x
  • convention:

zaheernew
MVE Author Created Jan 10, 2022 16:51:02

useful info
View more
  • x
  • convention:

Great, thank you for sharing!
View more
  • x
  • convention:

123
Back to list

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.