[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

Sonicwall Source NAT

Posted on 2011-05-11
3
Medium Priority
?
596 Views
Last Modified: 2012-05-11
Hello all,

I'm trying to figure out how to do sourceNAT on a Sonicwall NSA-2400, SonicOS Enhanced 5.6.0.10-52o

On the LAN side I've got 5 vlans coming in on a trunk on interface X5:
X5:VLAN25: 10.25.1.0/24
X5:VLAN26: 10.26.1.0/24
X5:VLAN27: 10.27.1.0/24
X5:VLAN28: 10.28.1.0/24
X5:VLAN29: 10.29.1.0/24

on the WAN side I've got interface X1 connected to 100.100.100.24/29
100.100.100.25 is X1 IP
100.100.100.30 is gateway

I would like:
VLAN25 to use 100.100.100.25 for WAN traffic
VLAN26 to use 100.100.100.26 for WAN traffic
VLAN27 to use 100.100.100.27 for WAN traffic
VLAN28 to use 100.100.100.28 for WAN traffic
VLAN29 to use 100.100.100.29 for WAN traffic

How do I configure NAT policies on the Sonicwall for this scenario?
0
Comment
Question by:MIkael Schütt
  • 2
3 Comments
 
LVL 33

Accepted Solution

by:
digitap earned 2000 total points
ID: 35739021
Since the sonicwall is routing your vlan traffic, it should be simple to setup the NAT policy. Use the template below for each subnet you want to create the egress NAT policy.

Original Source: Use the VLAN subnet address object here
Translated Source: Use the public IP address you want to NAT to
Original Destination: Any
Translated Destination: Original
Original Service: Any
Translated Service: Original
Inbound/Outbound Interface: Any on both
0
 

Author Closing Comment

by:MIkael Schütt
ID: 35740394
So simple, thanks a lot!
0
 
LVL 33

Expert Comment

by:digitap
ID: 35740677
You're welcome. Thanks for the points!
0

Featured Post

[Webinar] Cloud and Mobile-First Strategy

Maybe you’ve fully adopted the cloud since the beginning. Or maybe you started with on-prem resources but are pursuing a “cloud and mobile first” strategy. Getting to that end state has its challenges. Discover how to build out a 100% cloud and mobile IT strategy in this webinar.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question