NAT Policies Overview
Network Address Translation (NAT) is a form of network masquerading where you can hide devices or sites between zones or interfaces. A trusted zone is a segment of a network on which security measures are applied. It is usually assigned to the internal LAN. An example of an untrusted zone is the internet. NAT modifies the IP addresses of the packets moving between the trusted and untrusted zones.
Whenever a packet exits a NAT device (when traversing from the internal LAN to the external WAN), the device performs a translation on the packet's IP address. The packet's IP address rewritten with an IP address that was specified for external use. After translation, the packet appears to have originated from the gateway rather than from the original device within the network. This process hides your internal IP addresses from the other networks and keeps your network secure.
Using NAT also enables you to use more internal IP addresses. As these IP addresses are hidden, there is no risk of conflict with an IP address from a different network. This helps you conserve IP addresses.
Use the NAT Policies page to create, modify, clone, and delete NAT policies and policy rules. You can filter and sort this information to get a better understanding of what you want to configure.
To access the page, select SRX > NAT > NAT Policies.
Click on a NAT policy to view the rules associated with it. The NAT policy rules page displays the NAT rules associated with the NAT policy and keep track of the number and order of rules for each policy.
Supported NAT Types
Juniper Security Director Cloud supports configuring three types of NAT on the SRX Series Firewalls:
-
Source NAT—Translates the source IP address of a packet leaving a trust zone (outbound traffic). It translates the traffic originating from the device in the trust zone. The source IP address of the traffic (which is a private IP address), is translated to a public IP address that can be accessed by the destination device specified in the NAT rule. The destination IP address is not translated.
The following uses cases show the support for source NAT translation between IPv6 and IPv4 address domains:
-
Translation from one IPv6 subnet to another IPv6 subnet without Network Address Port Translation (NAPT), also known as Port Address Translation (PAT).
-
Translation from IPv4 addresses to IPv6 prefixes along with IPv4 address translation.
-
Translation from IPv6 hosts to IPv6 hosts with or without NAPT.
-
Translation from IPv6 hosts to IPv4 hosts with or without NAPT.
-
Translation from IPv4 hosts to IPv6 hosts with or without NAPT.
-
-
Destination NAT—Translates the destination IP address of a packet. Using destination NAT, an external device can send packets to a hidden internal device. As an example, consider the case of a webserver behind a NAT device. Traffic to the WAN-facing public IP address (the destination IP address) is translated to the internal webserver private IP address.
The following uses cases show the support for destination NAT translation between IPv6 and IPv4 address domains:
-
Mapping of one IPv6 subnet to another IPv6 subnet
-
Mapping between one IPv6 host and another IPv6 host
-
Mapping of one IPv6 host (and optional port number) to another special IPv6 host (and optional port number)
-
Mapping of one IPv6 host (and optional port number) to another special IPv4 host (and optional port number)
-
Mapping of one IPv4 host (and optional port number) to another special IPv6 host (and optional port number)
-
-
Static NAT—Always translates a private IP address to the same public IP address. It translates traffic from both sides of the network (both source and destination). For example, a web-server with a private IP address can access the Internet using a static, one-to-one address translation. In this case, outgoing traffic from the web-server undergoes source NAT translation, and incoming traffic to the web-server undergoes destination NAT translation.
The following uses cases show the support for static NAT translation between IPv6 and IPv4 address domains:
-
Mapping of one IPv6 subnet to another IPv6 subnet.
-
Mapping between one IPv6 host and another IPv6 host.
-
Mapping between IPv4 address a.b.c.d and IPv6 address Prefix::a.b.c.d.
-
Mapping between IPv4 hosts and IPv6 hosts.
-
Mapping between IPv6 hosts and IPv4 hosts.
-
Juniper Security Director Cloud also supports configuring persistent NAT where address translations are maintained in the database for a configurable amount of time after a session ends.
Source NAT Address |
Translated Address |
Destination NAT Address |
Persistent NAT Support |
---|---|---|---|
IPv4 |
IPv6 |
IPv4 |
No |
IPv4 |
IPv6 |
IPv6 |
No |
IPv6 |
IPv4 |
IPv4 |
Yes |
IPv6 |
IPv6 |
IPv6 |
No |
Source NAT Address |
Destination Address |
Pool Address |
---|---|---|
IPv4 |
IPv4 |
IPv4 |
IPv4 |
IPv6 - Subnet must be greater than 96 |
IPv6 |
IPv6 |
IPv4 |
IPv4 |
IPv6 |
IPv6 |
IPv6 |
Source NAT Address |
Destination Address |
Pool Address |
---|---|---|
IPv4 |
IPv4 |
IPv4 or IPv6 |
IPv4 |
IPv6 - Subnet must be greater than 96 |
IPv4 or IPv6 |
IPv6 |
IPv4 |
IPv4 |
IPv6 |
IPv6 |
IPv4 or IPv6 |
-
For source NAT, the proxy Neighbor Discovery Protocol (NDP) is available for NAT pool addresses. For the destination NAT and the static NAT, the proxy NDP is available for destination NAT addresses.
-
A NAT pool can have a single IPv6 subnet or multiple IPv6 hosts.
-
You cannot configure the overflow pool if the address type is IPv6.
-
NAT pools permit the address entries of only one version type: IPv4 or IPv6.
Field Descriptions - NAT Policies Page
Field |
Description |
---|---|
Seq. |
Order number for the NAT policy. |
Name |
Displays the name of the NAT policy. |
Rules |
Number of rules assigned to the NAT policy. |
Devices |
Device on which the NAT policy will be deployed. |
Status |
Deployment status for the NAT policy. |
Modified By |
The user who modified the policy. |
Last Modified |
The date and time when the policy was modified. |
Description |
Description of the NAT policy. |
Field Descriptions - NAT Policy Rules Page
Field |
Description |
---|---|
Seq. |
Order number for the NAT policy. |
Rule Name |
NAT policy rule name. |
Type |
Type of the NAT rule such as source, destination, or static. |
Sources |
Displays the source endpoints on which the NAT policy applies. A source endpoint can be zone, interface, routing instance, zone, addresses or ports. |
Destinations |
Displays the destination endpoints on which the NAT policy applies. A destination endpoint can be zone, interface, routing instance, zone, addresses or ports. |
Services/Protocols |
Services and protocols to permit or deny for the source and destination type NAT rules. |
Translation |
Displays the translation type applied on the incoming or outgoing traffic. |
The Total Rules field on the top right corner of the page displays the total number of rules associated with the NAT policy. The Deploy pending field displays the deploy status of the rules associated with the NAT policy.