Nat update

Update some nat commands to new syntax
This commit is contained in:
greenpsi 2023-11-16 00:19:59 +01:00
parent 9e9f2755a8
commit f0349e7f1f
8 changed files with 11 additions and 11 deletions

View File

@ -303,7 +303,7 @@ public interface.
.. code-block:: none .. code-block:: none
set nat source rule 10 destination address '!192.0.2.0/24' set nat source rule 10 destination address '!192.0.2.0/24'
set nat source rule 10 outbound-interface 'eth0.50' set nat source rule 10 outbound-interface name 'eth0.50'
set nat source rule 10 source address '10.200.201.0/24' set nat source rule 10 source address '10.200.201.0/24'
set nat source rule 10 translation address '203.0.113.1' set nat source rule 10 translation address '203.0.113.1'

View File

@ -194,9 +194,9 @@ And NAT Configuration:
set nat source rule 10 destination group network-group 'REMOTE-NETS' set nat source rule 10 destination group network-group 'REMOTE-NETS'
set nat source rule 10 exclude set nat source rule 10 exclude
set nat source rule 10 outbound-interface 'eth0' set nat source rule 10 outbound-interface name 'eth0'
set nat source rule 10 source group network-group 'LOCAL-NETS' set nat source rule 10 source group network-group 'LOCAL-NETS'
set nat source rule 20 outbound-interface 'eth0' set nat source rule 20 outbound-interface name 'eth0'
set nat source rule 20 source group network-group 'LOCAL-NETS' set nat source rule 20 source group network-group 'LOCAL-NETS'
set nat source rule 20 translation address 'masquerade' set nat source rule 20 translation address 'masquerade'

View File

@ -450,7 +450,7 @@ Port "0" is required if multiple ports are used.
set high-availability virtual-server vyos real-server 192.0.2.12 health-check script '/config/scripts/check-real-server-second.sh' set high-availability virtual-server vyos real-server 192.0.2.12 health-check script '/config/scripts/check-real-server-second.sh'
set high-availability virtual-server vyos real-server 192.0.2.12 port '0' set high-availability virtual-server vyos real-server 192.0.2.12 port '0'
set nat source rule 100 outbound-interface 'eth0' set nat source rule 100 outbound-interface name 'eth0'
set nat source rule 100 source address '192.0.2.0/24' set nat source rule 100 source address '192.0.2.0/24'
set nat source rule 100 translation address 'masquerade' set nat source rule 100 translation address 'masquerade'

View File

@ -663,7 +663,7 @@ We will use source and destination address for hash generation.
.. code-block:: none .. code-block:: none
set nat destination rule 10 inbound-interface inbound-interface eth0 set nat destination rule 10 inbound-interface name eth0
set nat destination rule 10 protocol tcp set nat destination rule 10 protocol tcp
set nat destination rule 10 destination port 80 set nat destination rule 10 destination port 80
set nat destination rule 10 load-balance hash source-address set nat destination rule 10 load-balance hash source-address

View File

@ -60,7 +60,7 @@ To allow VPN-clients access via your external address, a NAT rule is required:
.. code-block:: none .. code-block:: none
set nat source rule 110 outbound-interface 'eth0' set nat source rule 110 outbound-interface name 'eth0'
set nat source rule 110 source address '192.168.255.0/24' set nat source rule 110 source address '192.168.255.0/24'
set nat source rule 110 translation address masquerade set nat source rule 110 translation address masquerade

View File

@ -245,13 +245,13 @@ If there is SNAT rules on eth1, need to add exclude rule
# server side # server side
set nat source rule 10 destination address '10.0.0.0/24' set nat source rule 10 destination address '10.0.0.0/24'
set nat source rule 10 'exclude' set nat source rule 10 'exclude'
set nat source rule 10 outbound-interface 'eth1' set nat source rule 10 outbound-interface name 'eth1'
set nat source rule 10 source address '192.168.0.0/24' set nat source rule 10 source address '192.168.0.0/24'
# remote office side # remote office side
set nat source rule 10 destination address '192.168.0.0/24' set nat source rule 10 destination address '192.168.0.0/24'
set nat source rule 10 'exclude' set nat source rule 10 'exclude'
set nat source rule 10 outbound-interface 'eth1' set nat source rule 10 outbound-interface name 'eth1'
set nat source rule 10 source address '10.0.0.0/24' set nat source rule 10 source address '10.0.0.0/24'
To allow traffic to pass through to clients, you need to add the following To allow traffic to pass through to clients, you need to add the following

View File

@ -295,11 +295,11 @@ Configuration
set nat destination rule 110 description 'NAT ssh- INSIDE' set nat destination rule 110 description 'NAT ssh- INSIDE'
set nat destination rule 110 destination port '2022' set nat destination rule 110 destination port '2022'
set nat destination rule 110 inbound-interface 'eth0' set nat destination rule 110 inbound-interface name 'eth0'
set nat destination rule 110 protocol 'tcp' set nat destination rule 110 protocol 'tcp'
set nat destination rule 110 translation address '192.168.130.40' set nat destination rule 110 translation address '192.168.130.40'
set nat source rule 100 outbound-interface 'eth0' set nat source rule 100 outbound-interface name 'eth0'
set nat source rule 100 protocol 'all' set nat source rule 100 protocol 'all'
set nat source rule 100 source address '192.168.130.0/24' set nat source rule 100 source address '192.168.130.0/24'
set nat source rule 100 translation address 'masquerade' set nat source rule 100 translation address 'masquerade'

View File

@ -114,7 +114,7 @@ network via IP masquerade.
.. code-block:: none .. code-block:: none
set nat source rule 100 outbound-interface 'eth0' set nat source rule 100 outbound-interface name 'eth0'
set nat source rule 100 source address '192.168.0.0/24' set nat source rule 100 source address '192.168.0.0/24'
set nat source rule 100 translation address masquerade set nat source rule 100 translation address masquerade