NAT Configuarion Example

This section describes a typical NAT configuration example.

The company network is divided into three zones by the Hillstone device: Trust Zone, DMZ Zone and Untrust Zone. Staff work in the Trust zone, they are allocated with the private network segment of 10.1.1.0/24 and get the highest security priority; WWW server and FTP server are in the DMZ zone, they are allocated with the private network segment of 10.1.2.0/24 and can be accessed by internal staff and external users; external networks are in the Untrust zone. See the topology below:

There are two requirements:

Take the following steps:

Step 1: Configure zones and interfaces.

  1. On the Navigation pane, click Configure > Network > Network to visit the Network page.
  2. Select ethernet0/1 from the interface list, and click Edit.
  3. In the Interface Configuration dialog, modify according to your need:
  4. Click OK to save your settings and return to the Network page.
  5. Select ethernet0/2 from the interface list, and click Edit.
  6. In the Interface Configuration dialog, modify according to your need:
  7. Click OK to save your settings and return to the Network page.
  8. Select ethernet0/3 from the interface list, and click Edit.
  9. In the Interface Configuration dialog, modify according to your need:
  10. Click OK to save your settings and return to the Network page.

Step 2: Configure address entries.

  1. Select Objects > Address Book from the menu bar.
  2. Click New. In the Address Entry Configuration dialog, configure the options as below:
  3. Click OK to save your settings and return to the Address Book dialog.
  4. Repeat the above steps to create the address entry named addr2, the member is IP range of 202.1.1.3 - 202.1.1.5.
  5. Repeat the above steps to create the address entry named test1, the member is IP/Netmask of 202.1.1.6/32.
  6. Repeat the above steps to create the address entry named test2, the member is IP/Netmask of 10.1.2.2/32.
  7. Repeat the above steps to create the address entry named test3, the member is IP/Netmask of 10.1.2.3/32.

Step 3: Configure policy rules.

  1. On the Navigation pane, click Configure > Security > Policy to visit the Policy page.
  2. Click New. In the Policy Configuration dialog, configure the options as below:
  3. Click OK to save your settings. The system will generate a policy rule whose ID is 1.
  4. Click New. In the Policy Configuration dialog, configure the options as below:
  5. Click OK to save your settings. The system will generate a policy rule whose ID is 2.
  6. Click New. In the Policy Configuration dialog, configure the options as below:
  7. Click OK to save your settings. The system will generate a policy rule whose ID is 3.
  8. Click New. In the Policy Configuration dialog, configure the options as below:
  9. Click OK to save your settings. The system will generate a policy rule whose ID is 4.

Step 4: Configure NAT rules.

  1. On the Navigation pane, click Configure > Network > NAT to visit the SNAT page.
  2. Click New. In the SNAT Configuration dialog, configure the options as below:
  1. Click OK. The system will create a SNAT rule, and return to the SNAT page.
  2. Click the DNAT tab to visit the DNAT page.
  3. Click New > Port Mapping.
  4. In the Port Mapping Configuration dialog, configure the options as below:
  1. Click OK. The system will create a DNAT rule, and return to the DNAT page.
  2. Click New > Port Mapping.
  3. In the Port Mapping Configuration dialog, configure the options as below:
  1. Click OK. The system will create a DNAT rule and return to the DNAT page.