This document describes how to create and view NAT policies using the CLI (command line interface).
Use the following command to create a NAT policy using the CLI:
# set rulebase nat rules <NAT Rule Name> description <Description of NAT rule> from <Source Zone> to <Destination Zone> service <Service Type> source <Source IP Address> destination <Destination IP address> source-translation <Type of Source Translation> interface-address interface <Interface Port number>
The example below will create a static NAT translation with dynamic IP and port and uses interface ethernet1/4.
> configure
# set rulebase nat rules StaticNAT description staticNAT from DMZ to L3-Untrust service any source any destination any source-translation dynamic-ip-and-port interface-address interface ethernet1/4
# commit
# exit
Once committed, use the following command to confirm the creation of the NAT policy.
> show running nat-policy
StaticNAT {
from DMZ;
source any;
to L3-Untrust;
to-interface ;
destination any;
service any/any/any;
translate-to "src: ethernet1/4 10.46.40.56 (dynamic-ip-and-port) (pool idx: 2)";
terminal no;
}
Note: Post 9.0, change the translation type to "Dynamic IP" for all the DNAT rules using an FQDN. After a fresh reboot of the firewall, the command "show running nat-policy" might still show the destination as "0.0.0.0" until "commit force" is executed. This is a known cosmetic issue, the actual traffic won't be affected and will be translated as expected.
owner: rupalekar