Source NAT
Source NAT Rule & Settings
Last updated
Was this helpful?
Source NAT Rule & Settings
Last updated
Was this helpful?
Source NAT is the translation of the source IP address of a packet. It changes the source IP address of the packets which are passing through the Link Load Balancing Device. This rule helps you to set the SNAT rule by specifying the rule name, Incoming and Outgoing Interface, Source and Destination IP, Protocol, ARP Reply, Preserve Secure Port, Translation, Translate IP Range, and Port Mapping.
In static SNAT all internal IP addresses are always mapped to the same public IP address.
Select Source NAT rule.
Click Add Rule button.
Configure your settings.
Click Save.
Rule Name
Specify Rule Name
Blank (mandatory)
Rule Message
User Friendly Message for rule
Blank (mandatory)
Rule Priority
Integer
0
Enabled
Boolean
True
Incoming Interface
Incoming Interface Name
Blank (mandatory)
Outgoing Interface
Outgoing Interface Name
Blank (mandatory)
Source IP
Source IP address with CIDR
Blank
Destination IP
Destination IP add. with CIDR
Blank
Protocol
Select the protocol
Blank
ARP reply
Boolean
False
Preserve Source Port
Boolean
False
Translation
Drop Down
Overload (mandatory)
Translate IP Range
Integer
Integer (mandatory)
Port Mapping
Boolean
False
This option allows the user to select desired rule name.
This option allows users to use specifies the custom message for the rule.
This option allows the user to set rule priority. The rule with lower Priority Value will be prioritized.
It specifies rule is enabled or disabled. By default, this option is enabled.
This option allows the user to set Incoming Interface. Every data packet entered from Incoming Interface will be inspected and mapped to translation IPs.
This option allows the user to select the Outgoing Interface from the list of interfaces. data packets that are mapped will move outside from Outgoing Interface.
This option allows the user to set the source IP range with a CIDR value. The data packets are inspected and data packets that match with a mentioned source IP address will be translated according to the Translate IP Range.
This option allows the user to set the destination IP range with a CIDR value. The data packets are inspected and data packets that match with a mentioned destination IP address will be translated according to the Translate IP Range.
This option allows the user to set the protocol for the rule. The data packets are inspected and data packets that match with the mentioned protocol will be translated according to the Translate IP Range
This option allows the user to get an ARP reply from the next hop.
Preserve Source Port keeps the same source port for services that expect traffic to come from a specific source port. This option allows the user to select the preserved source port. It maps the source port for outgoing traffic through which it came from.
It allows users to select the type of translation. By default, Overload is selected.
In Haltdos LLB, we have three types of NAT translation which are mentioned below;
a)Overload: SNAT maps the private IP addresses to the first available public address from a pool of addresses. An IP pool defines a single IP address or a range of IP addresses to be used as the source address for the duration of the session. If
The Users need to define an external IP range that contains one or more IP addresses. For example, assume, we have defined an overload type IP pool with two external IP addresses (172.16.200.1—172.16.200.2), since there are 60,416 available port numbers per IP, this IP pool can handle 60,416*2 internal IP addresses.
c) Fixed port range: If this is selected as a translation method, all internal traffic will not be affected. Users can manually define the Source IP range and translation IP range. it will automatically bind the source IP with the translation IP.
Users can specify the translation IP or IP address range. If the user selects overload as translation type, another option will be shown there for translation IP or IP address range. Translation IP can be written as 192.168.1.1/24 or 192.168.1.5-192.168.1.25.
It allows users to enable port mapping.
Go to > > Rules.