Labnario Com
Labnario Com
Labnario Com
2015
It easily lets us to choose a suitable way of configuring outbound NAT. In this lab I will try to do a review of these methods.
Let's look at the topology:
Just forget about FTP server and focus on the bottom of the topology. We will use the FTP server in one of the next articles.
The main requirement in this lab is to configure the firewall , to provide access to the Internet for intranet users, on network segment 10.0.0.0/24.
The configuration of NAT for all above methods is the same. The difference lies in the configuration of NAT address group.
Let's start!
Set IP addresses of interfaces and add the interfaces to proper security zones:
converted by Web2PDFConvert.com
Ensure that the users on network segment 10.0.0.0/24 can access the Untrust zone:
[SRG]policy interzone trust untrust outbound
[SRG-policy-interzone-trust-untrust-outbound]policy 1
[SRG-policy-interzone-trust-untrust-outbound-1]policy source 10.0.0.0 mask 24
[SRG-policy-interzone-trust-untrust-outbound-1]action permit
And now the promised con guration of NAT . In this case one private IP address will correspond to one public IP address. To achive it, I will create NAT
address group with No-PAT option. NAT No-PAT is also called one-to-one address translation. During the translation, the source IP address of a packet is
translated from a private IP address into a public IP address, while the port number is not translated. It means that, when a private network host adopts
one public IP address, this address cannot be used by another host because all the ports of public IP address are occupied.
Create NAT address group:
[SRG]nat address-group 1 1.1.1.20 1.1.1.25
Con gure NAT policy for the TRUST-UNTRUST interzone, de ne the range of source IP addresses for NAT and bind the NAT policy to the previousely
created NAT address pool:
[SRG]nat-policy interzone trust untrust outbound
[SRG-nat-policy-interzone-trust-untrust-outbound]policy 1
[SRG-nat-policy-interzone-trust-untrust-outbound-1]action source-nat
[SRG-nat-policy-interzone-trust-untrust-outbound-1]policy source 10.0.0.0 mask 24
[SRG-nat-policy-interzone-trust-untrust-outbound-1]address-group 1 no-pat
Let's verify if it is working correctly. Just try to ping interface loopback of Internet router (5.5.5.5/32) from the both hosts:
converted by Web2PDFConvert.com
User_1>ping 5.5.5.5
Ping 5.5.5.5: 32 data bytes, Press Ctrl_C to break
From 5.5.5.5: bytes=32 seq=1 ttl=254 time=47 ms
From 5.5.5.5: bytes=32 seq=2 ttl=254 time=46 ms
From 5.5.5.5: bytes=32 seq=3 ttl=254 time=63 ms
From 5.5.5.5: bytes=32 seq=4 ttl=254 time=63 ms
From 5.5.5.5: bytes=32 seq=5 ttl=254 time=47 ms
--- 5.5.5.5 ping statistics --5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 46/53/63 ms
User_2>ping 5.5.5.5
Ping 5.5.5.5: 32 data bytes, Press Ctrl_C to break
From 5.5.5.5: bytes=32 seq=1 ttl=254 time=47 ms
From 5.5.5.5: bytes=32 seq=2 ttl=254 time=46 ms
From 5.5.5.5: bytes=32 seq=3 ttl=254 time=62 ms
From 5.5.5.5: bytes=32 seq=4 ttl=254 time=46 ms
From 5.5.5.5: bytes=32 seq=5 ttl=254 time=47 ms
--- 5.5.5.5 ping statistics --5 packet(s) transmitted
5 packet(s) received
0.00% packet loss
round-trip min/avg/max = 46/49/62 ms
converted by Web2PDFConvert.com
Now we can create another NAT address group with only one address available to check NAPT :
#
nat address-group 2 1.1.1.30 1.1.1.30
#
nat-policy interzone trust untrust outbound
policy 1
action source-nat
policy source 10.0.0.0 mask 24
address-group 2
[SRG]display firewall session table
Current Total Sessions : 53
icmp VPN:public --> public 10.0.0.10:54605[1.1.1.30:2067]-->5.5.5.5:2048
icmp VPN:public --> public 10.0.0.11:55117[1.1.1.30:2070]-->5.5.5.5:2048
If the interface IP address is adopted as the public IP address directly, no NAT address pool is required.
Tags: Huawei CLI, easy IP, NAT, Huawei firewall, Huawei USG5500, NAPT
converted by Web2PDFConvert.com
COMMENTS
No comments found
Register
Password
Remember me
Forgot password
Login
Email:
Website:
Submit Comment
Powered by Komento
Categories
Basic Con guration
Cheat Sheets
Command Line
Ethernet
FAQ
General
How To
IP Routing
IP Services
Multicast
converted by Web2PDFConvert.com
QoS
Reliability
Security
System Management
VPN
WAN
Latest Posts
NAT server on Huawei USG5500
outbound NAT on Huawei USG5500
https--->webUI--->Huawei Secospace USG6300
VTY access to Secospace USG6300
CPU usage alarm threshold
converted by Web2PDFConvert.com