Configure NAT for Threat Defense
Network address translation can be very complex. We recommend that you keep your rules as simple as possible to avoid translation problems and difficult troubleshooting situations. Careful planning before you implement NAT is critical. The following procedure provides the basic approach.
The NAT policy is a shared policy. You assign the policy to devices that should have similar NAT rules.
Whether a given rule in the policy applies to an assigned device is determined by the interface objects (security zones or interface groups) used in the rule. If the interface objects include one or more interface for the device, the rule is deployed to the device. Thus, you can configure rules that apply to subsets of devices within a single shared policy by carefully designing your interface objects. Rules that apply to “any” interface object are deployed to all devices.
If you change the type of an interface to a type that is not valid for use with a NAT policy that targets a device with that interface, the policy labels the interface as deleted. Click Save in the NAT policy to automatically remove the interface from the policy.
You can configure multiple NAT policies if groups of your devices require significantly different rules.
Procedure
Step 1 | Navigate from CDO to Cloud-delivered Firewall Management Center |
Step 2 | Select .
|
Step 3 | Decide what kinds of rules you need. You can create dynamic NAT, dynamic PAT, static NAT, and identity NAT rules. For an overview, see NAT Types. |
Step 4 | Decide which rules should be implemented as manual or auto NAT. For a comparison of these two implementation options, see Auto NAT and Manual NAT. |
Step 5 | Decide which rules should be custom per device. Because you can assign a NAT policy to multiple devices, you can configure a single rule on many devices. However, you might have rules that should be interpreted differently by each device, or some rules that should apply to a subset of devices only. Use interface objects to control on which devices a rule is configured. Then, use object overrides on network objects to customize the addresses used per device. For detailed information, see Customizing NAT Rules for Multiple Devices. |
Step 6 | Create the rules as explained in the following sections. |
Step 7 | Manage the NAT policy and rules. You can do the following to manage the policy and its rules.
|
Step 8 | Click Save. You can now go to and deploy the policy to assigned devices. The changes are not active until you deploy them. |