Static NAT
Table of Contents
Expand all | Collapse all
-
-
- Add a Branch
- Add a Data Center
- Add a Branch Gateway
- Configure Circuits
- Configure Internet Circuit Underlay Link Aggregation
- Configure Private WAN Underlay Link Quality Aggregation
- Configure Circuit Categories
- Configure Device Initiated Connections for Circuits
- Add Public IP LAN Address to Enterprise Prefixes
- Manage Data Center Clusters
- Configure a Site Prefix
- Configure a DHCP Server
- Configure NTP for Prisma SD-WAN
- Configure the ION Device at a Branch Site
- Configure the ION Device at a Data Center
- Switch a Site to Control Mode
- Allow IP Addresses in Firewall Configuration
-
- Configure a Controller Port
- Configure Internet Ports
- Configure WAN/LAN Ports
- Configure a Loopback Interface
- Configure a PoE Port
- Configure and Monitor LLDP Activity and Status
- Configure a PPPoE Interface
- Configure a Layer 3 LAN Interface
- Configure Application Reachability Probes
- Configure a Secondary IP Address
- Configure a Static ARP
- Configure a DHCP Relay
- Configure IP Directed Broadcast
- VPN Keep-Alives
-
- Configure Prisma SD-WAN IPFIX
- Configure IPFIX Profiles and Templates
- Configure and Attach a Collector Context to a Device Interface in IPFIX
- Configure and Attach a Filter Context to a Device Interface in IPFIX
- Configure Global and Local IPFIX Prefixes
- Flow Information Elements
- Options Information Elements
- Configure the DNS Service on the Prisma SD-WAN Interface
- Configure SNMP
-
-
- Prisma SD-WAN Branch Routing
- Prisma SD-WAN Data Center Routing
-
- Configure Multicast
- Create a WAN Multicast Configuration Profile
- Assign WAN Multicast Configuration Profiles to Branch Sites
- Configure a Multicast Source at a Branch Site
- Configure Global Multicast Parameters
- Configure a Multicast Static Rendezvous Point (RP)
- Learn Rendezvous Points (RPs) Dynamically
- View LAN Statistics for Multicast
- View WAN Statistics for Multicast
- View IGMP Membership
- View the Multicast Route Table
- View Multicast Flow Statistics
- View Routing Statistics
- Prisma SD-WAN Incident Policies
-
- Prisma SD-WAN Branch HA Key Concepts
- Configure Branch HA
- Configure HA Groups
- Add ION Devices to HA Groups
- View Device Configuration of HA Groups
- Edit HA Groups and Group Membership
-
- Configure Branch HA with Gen-1 Platforms (2000, 3000, 7000, and 9000)
- Configure Branch HA with Gen-2 Platforms (3200, 5200, and 9200)
- Configure Branch HA with Gen-2 Embedded Switch Platforms (1200-S or 3200-L2)
- Configure Branch HA for Devices with Software Cellular Bypass (1200-S-C-5G)
- Configure Branch HA for Platforms without Bypass Pairs
- Configure Branch HA in a Hybrid Topology with Gen-1 (3000) and Gen-2 (3200) Platforms
- Prisma SD-WAN Incidents and Alerts
Static NAT
Learn more about the Prisma SD-WAN static NAT.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Prisma SD-WAN provides scenarios that
require a 1:1 mapping of a range of IP addresses to another range
of IP addresses.
Scenarios include direct mapping of a publicly routable range
of IP addresses to RFC 1918 addresses. For example, they translate 50.50.50.16-31
to 10.10.10.16-31 in a 1:1 manner where traffic would translate
to 50.50.50.20 to 10.10.10.20 and vice versa across the entire IP
range.
Another common scenario would be when IP prefix overlap occurs
due to a company merger. In this situation, it would also translate
the IP addresses bound to the hosts in a 1:1 manner from one RFC
1918 range to another RFC 1918m range.
In this example, application requirements specify that each internal
server must have a unique internet IP address. Each server must
initiate connections on ephemeral ports and receive inbound links
on the same persistent IP address on port 443. To enable this most
efficiently, use static source NAT and static destination NAT.
Case: Inbound connection from the Internet
Fields | Description |
---|---|
1 | A new flow source from Host 1 with a source
address of 70.70.70.70 and a destination address of 50.50.50.20. |
2 | A packet arrives at the ION device's internet
interface. Perform a policy lookup and the traffic on the LAN segment. |
3 | Place the packet onto the LAN segment; it
matches against the recently created NAT Policy Rule. This
rule contains the following configuration:
The NAT Pool LAN-Services
is defined as 10.10.10.16 - 10.10.10.31 on the branch ION device.
It can be configured through the NAT Policy UI or directly on the
interface configuration of the device. NAT Pools are
in contiguous ranges. As the policy applies to the
packet, the original destination address of 50.50.50.20 overwrites
by the address defined in the NAT Pool LAN-Services. In this example
the original packet: (s) 70.70.70.70:12345: (d) 50.50.50.20:443.
Is rewritten to: (s) 70.70.70.70:12345: (d) 10.10.10.20:443. |
4 | Traffic arrives on the LAN at the server
hosting inbound services from the internet. |
5 | Sends the return traffic to the destination
of 70.70.70.70:12345. |
6 | Traffic arrives at the ION device's LAN
interface, where a translation table check is performed on the flow
to ensure that there is an active connection. |
7 | Establish the traffic onto the LAN segment,
the source IP address is rewritten from 10.10.10.10:443 to 50.50.50.2:443. |
Case: Outbound Connection from the Local Server to an Internet
Service
Fields | Description |
---|---|
5 | A new flow source from Server 1 with a source
address of 10.10.10.20 and a destination address of 70.70.70.80. |
6 | A packet arrives at the ION device's internet
interface. Perform a policy lookup and the traffic on the LAN segment. |
7 | Place the packet onto the internet segment;
it matches against the recently created NAT Policy Rule. This
rule contains the following configuration:
The NAT Pool
Internet-Services is defined as 50.50.50.50.16 - 50.50.50.50.31
on the branch ION device. The ION device sends GARP
messages and responds to ARP requests for 50.50.50.16/28. NAT Pools
can be configured through the NAT Policy UI or directly on the interface
configuration and defined in contiguous ranges. As
the policy applies to the packet, the original source address of
10.10.10.20 overwrites by the address defined in the NAT Pool Internet-Services.
In this example the original packet: (s) 10.10.10.20:12345: (d)
70.70.70.80:443. Is rewritten to: (s) 50.50.50.20:12345: (d) 70.70.70.80:443. |
8 | Traffic crosses the internet and arrives
at the destination server 70.70.70.80. Return traffic processes in
the reverse order, and the ION device references the original outbound
connection previously opened with the Static Source NAT action. |