Add and Deploy NAT Policies
CSO supports source NAT, destination NAT, and static NAT. In addition, CSO supports persistent NAT depending on the type of source and destination address. In addition, during the addition of an SD-WAN on-premise spoke site and an enterprise hub site, you can trigger the automatic creation of source NAT rules for local breakout traffic. For more information about NAT in CSO, see NAT Policies Overview in the CSO Customer Portal User Guide (available on the CSO Documentation page).
To add and deploy a NAT policy:
Field |
Guideline |
---|---|
Name |
Enter the name of NAT policy. The name can contain alphanumeric characters, colons, periods, hyphens, and underscores. No spaces are allowed and the maximum length is 255 characters. |
Description |
Enter a description for the NAT policy. |
Manage Auto-Proxy ARP |
Click the toggle button to enable or disable automatic proxy Address Resolution Protocol (ARP). This field is disabled by default. Typically, when an interface receives an ARP request, it responds with its MAC address only then the ARP request corresponds to the interface’s IP address. However, when you enable this field, the interface also acts as a proxy and responds to ARP requests for IP addresses other than its own. Note:
Proxy ARP management applies to translated addresses in a source NAT rule or to a destination address in a destination NAT rule:
|
Sites Applied On |
Select the sites on which you want to apply the NAT policy and click the right arrow (>). |
Sequence No. |
Click Select Policy Sequence link if you want to reorder this NAT policy among the existing NAT policies. If you deploy more than one NAT policy on a site, the policy sequence number determines the order in which the policies (and therefore the NAT rules) are deployed. The Select Policy Sequence page appears, displaying all NAT policies. Select the policy you want to reorder and click Move Policy Up or Move Policy Down to reorder your NAT policy among the existing policies. |
Field |
Guideline |
---|---|
Name |
You can use the default name (that CSO generates automatically) for the NAT rule or enter a unique name. |
Description |
Enter a description for the NAT rule. |
Source |
Specify one or more of the following source endpoints:
Note:
You must specify at least one zone, interface, or VRF group as a source endpoint and specify at least one address for the source or destination endpoints. |
Destination |
Specify one or more of the following destination endpoints:
Note:
You must specify at least one zone, interface, or VRF group as a destination endpoint and specify at least one address for the source or destination endpoints. |
Translation |
Select the type of translation to apply to the traffic:
|
[Advanced Settings] |
If you selected interface or pool as the translation type, you can specify additional settings by clicking the gear icon. The Advanced Settings page appears. See Table 3for an explanation of the fields. |
Field |
Description |
Translation Type |
---|---|---|
Persistent |
Click the toggle button to enable persistence, which ensures that all requests from the same internal transport address are mapped to the same reflexive transport address. Note:
For persistence to be applicable for the NAT policy, ensure that port overloading is turned off for the device to which the NAT policy is applicable. Use the following command to turn off port overloading for a device: [Edit mode] set security nat source interface port-overloading off |
Interface Pool |
Persistent NAT Type |
Select the type of persistent NAT mapping to use:
|
Interface Pool |
Inactivity Timeout |
Enter the period (in seconds) for which the persistent NAT binding remains in the device’s memory when all the sessions of the binding entry have ended. When the configured timeout is reached, the binding is removed from memory. Range: 60 through 7,200 seconds. Default: 60 seconds. |
Interface Pool |
Maximum Session Number |
Enter the maximum number of sessions with which a persistent NAT binding can be associated. For example, if the maximum session number of the persistent NAT rule is 2000, then a 2001st session cannot be established if that session uses the persistent NAT binding created from the persistent NAT rule. Range: 8 through 65,536 |
Interface Pool |
Address Mapping |
Allows requests from a specific internal IP address to be mapped to the same reflexive IP address (the public IP address created by the NAT device closest to the STUN server); internal and external ports can be any ports. An external host using any port can send a packet to the internal host by sending the packet to the reflexive IP address (with a configured incoming policy that allows external to internal traffic). If this option is not configured, the persistent NAT binding is for specific internal and reflexive transport addresses. |
Pool |
Pool Address |
Displays the name of the NAT pool that you previously added. You cannot modify this field. |
Pool |
Host Address Base |
Displays the base address of the original source IP address range for the NAT pool that you previously added. The host address base is used for IP address shifting. You cannot modify this field. |
Pool |
Port Translation |
Displays whether port translation is enabled or disabled for the NAT pool that you previously added. You cannot modify this field. |
Pool |
Overflow Pool Type |
Displays the source pool to be used when the address pool is exhausted. You cannot modify this field. |
Pool |
Overflow Pool Name |
Displays the name of the overflow pool. You cannot modify this field. |
Pool |
Field |
Guideline |
---|---|
Name |
You can use the default name (that CSO generates automatically) for the NAT rule or enter a unique name. |
Description |
Enter a description for the NAT rule. |
Source |
Specify one or more of the following source endpoints:
Note:
You must specify at least one zone, interface, or VRF group as a source endpoint. |
Destination |
Specify one or more of the following destination endpoints:
|
Translation |
Select the type of translation to apply to the traffic:
|
[Advanced Settings] |
You can specify additional settings by clicking the gear icon. The Advanced Settings page appears. See Table 5 for an explanation of the fields. |
Field |
Description |
Translation Type |
---|---|---|
Mapped Port Type |
Specify the type of port mapping to use:
|
Address |
Routing Instance |
Select the routing instance to use for NAT or select None not to use a routing instance. Note:
If you’re configuring the NAT policy for a site with SD-WAN capability, then you must select the routing instance corresponding to the translation address |
Address Overlapping IPv4 Address |
Port |
Enter the port number to be used for port mapping. Range: 0 through 65,535. |
Address |
Start |
Enter the starting port number of the port range to be used for port mapping. Range: 0 through 65,535. |
Address |
End |
Enter the ending port number of the port range to be used for port mapping. Range: 0 through 65,535. |
Address |
Field |
Guideline |
---|---|
Name |
You can use the default name (that CSO generates automatically) for the NAT rule or enter a unique name. |
Description |
Enter a description for the NAT rule. |
Source |
Specify one or more of the following source endpoints:
Note:
You must specify at least one zone, interface, or VRF group as a source endpoint. |
Destination |
Specify one or more of the following destination endpoints:
Note:
When you add a destination NAT rule for traffic arriving on an interface that terminates a VPN link, the translation process might break the VPN link if the destination addressis specified only as the WAN-facing IP address of the interface. For example, in the following NAT rule, any traffic destined to WAN IP address is translated to the destination pool, which breaks the functionality of the VPN link packets terminating on the interface. [Any.Address] --> [Wan.IP] :: [Dest-Pool-1] Therefore, we recommend that you specify both the address and port number as the destination endpoint: [Any.Address] --> [Wan.IP + Port] :: [Dest-Pool-1] |
Translation |
Select the type of translation to apply to the traffic:
Note:
For sites with SD-WAN capability, the destination NAT pool selected must be configured with a site and a routing instance corresponding to the pool address. For example, if a webserver with IP address IP-Addr-1 is running in the HR department of a site called Site-A. To add a destination NAT pool corresponding to this webserver IP address, you must specify the following mandatory fields while adding the NAT pool:
|