EasyManua.ls Logo

Netgate 8300 - Page 61

Netgate 8300
129 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security Gateway Manual Netgate-8300
2.6.4 Outbound NAT
For clients on local interfaces to reach the Internet from private addresses to destinations through this WAN, the firewall
must apply Outbound NAT on traffic leaving this new WAN.
Navigate to Firewall > NAT, Outbound tab
Check the current outbound NAT mode and follow the section below which matches the mode.
Automatic or Hybrid Outbound NAT
If the mode is set to Automatic or Hybrid, then this may not need further configuration.
Ensure there are rules for the new WAN listed as a Interface in the Automatic Rules at the bottom of the page. If so,
skip ahead to the next section to configure Firewall Rules.
Manual Outbound NAT
If the mode is set to Manual, create a new rule or set of rules to cover the new WAN.
If there are existing rules in the Mappings table, they can be copied and adjusted to use the new WAN. Otherwise,
create them manually:
Click to add a new rule at the top of the list.
Configure the rule as follows:
Interface
Choose the new WAN interface (e.g. WAN2)
Address Family
IPv4
Protocol
Any
Source
Either choose LAN Subnets, which will automatically reference any networks on the LAN inter-
face, or choose Network or Alias and manually fill in the LAN subnet, e.g. 192.168.1.0/24.
If there are multiple local networks, create rules for each or use other methods such as aliases or
CIDR summarization to cover them all.
Destination
Any
Translation Address
WAN2 Address (or the custom name of the new WAN interface)
Description
Text describing the rule, e.g. LAN outbound on WAN2
Click Save
Click Apply Changes
Repeat as needed for additional local networks.
© Copyright 2024 Rubicon Communications LLC 59

Related product manuals