NAT Configure (NGP)

Here is a short explanation of their use :

Rule Common Name Description
DNAT Destination NAT A DNAT rule is an incoming rule. It is used to route a packet arriving on a public interface from a certain IP or network to a VM on a private network.
In practice the destination IP address of the packet will be replaced by another IP address.
To illustrate, DNAT is used when communication is made FROM a Public network TO a Private network.
SNAT Source NAT An SNAT rule is an outgoing rule. It is used to route a packet arriving on a private interface from a certain private IP or a private network that wants to communicate with an external (Public) network.
To illustrate, SNAT is used when communication is made FROM a Private network TO a Public network.

NAT and Firewall rules combined can create confusion when we try to determine the correct IP address to which to apply the Firewall rule.

The diagram below summarizes the FW/NAT rule association.

Diagram showing the association between FW and NAT rules

Managing NAT rules

Access the Advanced Services of your T1 Edge from the Networking / Edge Gateways / NAT / NEW tab

DNAT rule

  • Name your rule
  • Add a description if needed
  • Choose DNAT
  • Enter the External IP (Generally a public IP)
  • Configure the External Port if needed
  • Enter the Internal IP (Local – RFC 1918). This can also be a subnet.
  • Define on which Port the rule will apply (Application), otherwise the rule will apply to all ports (any to any rule)
  • Define the Priority of the rule (0 being the highest priority)

You can enable or disable the rule, enable logging, match the firewall to the External IP and SAVE

SNAT rule

  • Name your rule
  • Add a description if needed
  • Choose SNAT
  • Enter the External IP (Generally a public IP)
  • Enter the Internal IP (Local – RFC 1918). This can also be a subnet.
  • Enter a Destination IP address if needed (If the NAT should apply only for a specific destination).
  • You can enable or disable the rule and logging
  • Define the Priority of the rule (0 being the highest priority)
  • You can match the firewall to the Internal IP