- play_arrow Juniper Web Device Manager
- play_arrow Getting Started
-
- play_arrow Dashboard
- play_arrow J-Web Dashboard
-
- play_arrow Monitor
- play_arrow Network
- play_arrow Logs
- play_arrow Maps and Charts
- play_arrow Statistics
- play_arrow Reports
-
- play_arrow Device Administration
- play_arrow Basic Settings
- play_arrow Cluster Management
- play_arrow User Management
- play_arrow Multi Tenancy—Resource Profiles
- play_arrow Multi Tenancy—Interconnect Ports
- play_arrow Multi Tenancy—Logical Systems
- play_arrow Multi Tenancy—Tenants
- play_arrow Certificate Management—Device Certificates
- play_arrow Certificate Management—Trusted Certificate Authority
- About the Trusted Certificate Authority Page
- Generate Default Trusted Certificate Authorities
- Enroll a CA Certificate
- Import a CA Certificate
- Add a Certificate Authority Profile
- Edit a Certificate Authority Profile
- Delete Certificate Authority Profile
- Search Text in the Trusted Certificate Authority Table
- play_arrow Certificate Management—Certificate Authority Group
- play_arrow License Management
- play_arrow ATP Management
- play_arrow Operations
- play_arrow Software Management
- play_arrow Configuration Management
- play_arrow Alarm Management
- play_arrow RPM
- play_arrow Tools
- play_arrow Reset Configuration
-
- play_arrow Security Policies and Objects
- play_arrow Security Policies
- play_arrow Zones/Screens
- play_arrow Zone Addresses
- play_arrow Global Addresses
- play_arrow Services
- play_arrow Dynamic Applications
- play_arrow Application Tracking
- play_arrow Schedules
- play_arrow Proxy Profiles
-
- play_arrow Security Services
- play_arrow UTM Default Configuration
- play_arrow UTM Antivirus Profiles
- play_arrow UTM Web Filtering Profiles
- play_arrow UTM Web Filtering Category Update
- play_arrow UTM Antispam Profiles
- play_arrow UTM Content Filtering Profiles
- play_arrow UTM Custom Objects
- play_arrow UTM Policies
- play_arrow IPS Signature Update
- play_arrow IPS Sensor
- play_arrow IPS Policy
- play_arrow ALG
- play_arrow Advanced Threat Prevention
- play_arrow SSL Initiation Profiles
- play_arrow SSL Proxy Profiles
- play_arrow Firewall Authentication—Access Profile
- play_arrow Firewall Authentication—Address Pools
- play_arrow Firewall Authentication Settings
- play_arrow Firewall Authentication—UAC Settings
- play_arrow Firewall Authentication—Active Directory
- play_arrow Firewall Authentication—Local Authentication
- play_arrow Firewall Authentication—Authentication Priority
- play_arrow Firewall Authentication—Identity Management
- play_arrow ICAP Redirect
-
Create a Source NAT
You are here: Network > NAT > Policies.
To create a source NAT:
Field | Description |
---|---|
Rule Name > Name | Enter a unique source NAT rule name. |
Source Ingress | |
Select Sources | |
Source ingress type | Select an option from the list for ingress traffic that originates from inside the network:
|
Zone | Select the source zones in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select source ingress type as Zone. |
Interface | Select the source interfaces in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select source ingress type as Interface. |
Routing instance | Select the source routing instances in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select source ingress type as Routing Instance. |
Addresses | Select the source addresses in the Available column and use the right arrow to move them to the Selected column. To create a new address:
|
Ports/Port range | Click + to enter port number or port range (for example, 1-5) with minimum and maximum values for source. Range: 0 through 65535. To edit a port number or port range, select it and click the pencil icon. To delete a port number or port range, select it and click the delete icon. |
Destination Egress | |
Select Destination | |
Destination egress type | Select an option from the list for outgoing traffic that originates from inside of the device network:
|
Zone | Select the destination zones in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select destination egress type as Zone. |
Interface | Select the destination interfaces in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select destination egress type as Interface. |
Routing instance | Select the destination routing instances in the Available column and use the right arrow to move them to the Selected column. Note: This option is available only if you select destination egress type as Routing Instance. |
Addresses | Select the destination addresses in the Available column and use the right arrow to move them to the Selected column. To create a new address:
|
Ports/Port range | Click + to enter port number or port range (for example, 1-5) with minimum and maximum values for destination. Range: 0 through 65535. To edit a port number or port range, select it and click the pencil icon. To delete a port number or port range, select it and click the delete icon. |
Applications | |
Select Applications | |
Applications | Select an application option:
|
Protocols | |
Select Protocols | |
Protocols | Select the protocols in the Available column and use the right arrow to move them to the Selected column. |
Add Protocol | Click + and enter a protocol number to associate with the NAT policy. Range is 0 through 255. |
Actions | |
Actions | |
Translation type | Select an option:
|
Source pool | Select a source pool from the list. Click Add New to create a new source NAT pool. For more information on field options, see Create a Source NAT Pool. |
Persistent | Enable this option for mapping all requests from the same internal transport address to the same reflexive transport address. |
Persistent NAT type | Select an option from the list:
|
Inactivity timeout | Enter the amount of time that the persistent NAT binding remains in the sites memory when all the sessions of the binding entry have ended. Range is 60 through 7200 seconds. |
Maximum session number | Enter the maximum number of sessions with which a persistent NAT binding can be associated. Range is 8 through 65536 |
Description | Enter the description for the source NAT. |