Security Gateway Manual
SG-3100
The firewall applies outbound NAT to traffic exiting WAN type interfaces but does not use WAN type interface net-
works as a source for outbound NAT on other interfaces. Firewall rules on WAN type interfaces get
reply-to
added
to ensure traffic entering a WAN exits the same WAN, and traffic exiting the interface is nudged toward its gateway.
The DNS Resolver will not accept queries from clients on WAN type interfaces without manual ACL entries.
See also:
2.5.4 Outbound NAT
For clients on local interfaces to get to the Internet from private addresses to destinations through this WAN, the
firewall must apply Outbound NAT on traffic leaving this new WAN.
• Navigate to
Firewall > NAT
,
Outbound
tab
• Check the current outbound NAT mode
If the mode is set to
Automatic
or
Hybrid
, then this may not need further configuration. Ensure there are rules for the
new WAN listed as a
Interface
in the
Automatic Rules
at the bottom of the page. If so, skip ahead to the next section.
If the mode is set to
Manual
, create a new rule or set of rules to cover the new WAN.
If there are existing rules in the
Mappings
table, they can be copied and adjusted to use the new WAN. Otherwise,
create them manually:
• Click
to add a new rule at the top of the list.
• Configure the rule as follows:
Interface
Choose the new WAN interface (e.g.
WAN2
)
Address Family
IPv4
Protocol
Any
Source
Network
, and fill in the LAN subnet, e.g.
192.168.1.0/24
.
If there is more than one LAN subnet, create rules for each or use other methods such as aliases
or CIDR summarization to cover them all.
Destination
Any
Translation Address
Interface Address
Description
Text describing the rule, e.g.
LAN outbound on WAN2
• Click
Save
• Click
Apply Changes
Repeat as needed for additional LANs.
© Copyright 2022 Rubicon Communications LLC
49