Related Topics
Configure Static NAT
Static NAT, also known as port forwarding, is a port-to-host NAT. With static NAT, when a host sends a packet from a network to a port on an external or optional interface, static NAT changes the destination IP address to an IP address and port behind the firewall. If a software application uses more than one port and the ports are selected dynamically, you must either use 1-to-1 NAT, or check whether a proxy on your Firebox manages this kind of traffic. Static NAT also operates on connections from networks that your Firebox protects.
You can configure static NAT for connections to an external or optional Firebox interface. Static NAT for an optional interface is supported in Fireware OS v11.8.1 and higher. You cannot configure static NAT for connections to a trusted or custom interface. You cannot configure static NAT for BOVPN or mobile VPN connections.
You cannot configure static NAT for an optional interface in a Device Configuration Template. For more information about how to configure an SNAT action in a Device Configuration Template, see Configure an SNAT Action.
When you use static NAT, connections to an internal server can be addressed to a Firebox interface IP address, instead of to the actual IP address of the server. For example, you can put your SMTP email server behind your Firebox with a private IP address and configure static NAT in your SMTP policy. Your Firebox then receives connections on port 25 and sends any SMTP connections to the real address of the SMTP server behind the Firebox.
If your device runs Fireware OS v11.0-v11.3.x, the steps to configure static NAT in Policy Manager are different. For more information, see About Static NAT in the Fireware XTM WatchGuard System Manager v11.3.x Help.
When you add a static NAT action, you can optionally specify a source IP address in the action. Then, when a connection that matches the parameters in your static NAT action is received by your Firebox, it changes the source IP address to the IP address that you specify. You can specify a different source IP address for each SNAT member.
You can also enable port address translation (PAT) in a static NAT action. When you enable PAT, you can change the packet destination to specify a different internal host and a different port.
For a demonstration of how to configure static NAT, see the Video Tutorial Getting Started with NAT.
Add a Static NAT Action
In Fireware Web UI, you must define the static NAT action before you can use it in one or more policies.
- Select Firewall > SNAT.
The SNAT page appears. - Click Add.
The Add SNAT page appears.
- In the Name text box, type a name for this SNAT action.
- (Optional) In the Description text box, type a description for this SNAT action.
- Select Static NAT.
This is the default selection. - Click Add.
The Add Member dialog box appears.
- From the External/Optional IP Address drop-down list, select the IP address or alias of an external or optional interface to use in this action.
For example, to use static NAT for packets addressed to only one external IP address, select that external IP address or alias. Or, to use static NAT for packets addressed to any optional IP interface, select the Any-Optional alias.
- To specify the source IP address for this static NAT action, select the Set source IP check box. In the adjacent text box, type the source IP address.
- In the Internal IP Address text box, type the destination on the trusted or optional network.
- To enable port address translation (PAT), select the Set internal port to a different port check box. In the adjacent text box, type or select the port number.
If you use an SNAT action in a policy that allows a connection type other than TCP or UDP, the internal port setting is not used for that connection.
- Click OK.
The static NAT route appears in the SNAT Members list. - To add another member to this action, click Add and repeat Steps 7–12.
- Click Save.
The new SNAT action appears in the SNAT page.
In Policy Manager, you can create a static NAT action and then add it to a policy, or you can create the static NAT action from within a policy configuration.
- Select Setup > Actions > SNAT.
The SNAT dialog box appears. - Click Add.
The Add SNAT dialog box appears.
- In the SNAT Name text box, type a name for this SNAT action.
- (Optional) In the Description text box, type a description for this SNAT action.
- Select Static NAT.
This is the default selection. - Click Add.
The Add Static NAT dialog box appears.
- From the External/Optional IP Address drop-down list, select the IP address or alias of an external or optional interface to use in this action.
For example, to use static NAT for packets addressed to only one external IP address, select that external IP address or alias. Or, to use static NAT for packets addressed to any optional IP interface, select the Any-Optional alias.
- To specify the source IP address for this static NAT action, select the Set source IP check box. In the adjacent text box, type the source IP address.
- In the Internal IP Address text box, type the destination on the trusted or optional network.
- To enable port address translation (PAT), select the Set internal port to a different port check box. In the adjacent text box, type or select the port number.
If you use an SNAT action in a policy that allows connections other than TCP or UDP, the internal port setting is not used for that connection.
- Click OK.
The static NAT route appears in the SNAT Members list. - To add another member to this action, click Add and repeat Steps 7–12.
- Click OK.
The new SNAT action appears in the SNAT dialog box.
Add a Static NAT Action to a Policy
After you add a SNAT action, you can use it in one or more policies.
- Select Firewall > Firewall Policies.
- Click the name of a policy to edit it.
- From the Connections are drop-down list, select Allowed.
To use static NAT, the policy must allow incoming connections. - In the To section, click Add.
The Add Member dialog box appears.
- From the Member Type drop-down list, select Static NAT.
A list of the configured Static NAT Actions appears. - Select the static NAT action to add to this policy. Click OK.
The static NAT route appears in the To section of the policy configuration. - Click Save.
- Double-click a policy to edit it.
- From the Connections are drop-down list, select Allowed.
To use static NAT, the policy must allow incoming connections. - In the To section, click Add.
The Add Address dialog box appears. - Click Add SNAT.
The SNAT dialog box appears, with a list of the configured static NAT and Server Load Balancing actions.
- Select the configured SNAT action to add. Click OK.
Or, click Add to define a new static NAT action. Follow the steps in the Configure Static NAT section to configure the static NAT action. - Click OK to close the SNAT dialog box.
The static NAT route appears in the Selected Members and Addresses list.
- Click OK to close the Add Address dialog box.
- Click OK to close the Policy Properties dialog box.
Edit or Remove a Static NAT Action
You can edit an SNAT action from the SNAT action list.
- Select Firewall > SNAT.
The SNAT page appears. - Select an SNAT action.
- Click Edit.
The Edit SNAT page appears. - Modify the SNAT action.
When you edit an SNAT action, any changes you make apply to all policies that use that SNAT action. - Click Save.
- Select Setup > Actions > SNAT.
The SNAT dialog box appears. - Select an SNAT action.
- Click Edit.
The Edit SNAT page appears. - Modify the SNAT action.
When you edit an SNAT action, any changes you make apply to all policies that use that SNAT action. - Click OK.
In Policy Manager, you can also edit an SNAT action when you edit a policy.
- Double-click a policy to edit it.
The Edit Policy Properties dialog box appears, with the Policy tab selected. - In the To section, select the SNAT action you want to edit.
- Click Edit.
The Edit SNAT dialog box appears. - Modify the SNAT action.
When you edit an SNAT action in a policy, the changes apply to all policies that use that SNAT action. - Click OK.
You can remove any SNAT action that is not used by a policy.
- Select Firewall > SNAT.
The SNAT page appears - Select an SNAT action.
- Click Remove.
A confirmation dialog box appears. - Click OK to confirm that you want to remove the SNAT action.
- Select Setup > Actions > SNAT.
The SNAT dialog box appears. - Select an SNAT action.
- Click Remove.
A confirmation dialog box appears. - Click Yes to confirm that you want to remove the SNAT action.
- Click OK.
Change Static NAT Global Settings
By default, the Firebox does not clear active connections when you modify a static NAT action. You can change the global SNAT setting so that the Firebox clears active connections that use an SNAT action you modify.
To change the global SNAT setting in Fireware Web UI or Policy Manager:
- Select Setup > Global Settings.
- Select System > Global Settings.
- Select the Networking tab.
- In the Traffic Flow section, select the When an SNAT action changes, clear active connections that use that SNAT action check box.
See Also
Configure Policy-Based Dynamic NAT
Configuration Example — Public Web Server Behind an XTM Device
Example Configuration Files — Public Web Server Behind an XTM Device