

The SNAT action in the NAT loopback policy in Fireware Web UI The SNAT action in the NAT loopback policy in Policy Manager The policy addresses could look like this: In this example, to allow users on your trusted and optional networks to use the public IP address or domain name to connect to a public server that is on the trusted network, you must create an SNAT action and add it to an HTTP policy. Add a Policy for NAT Loopback to the Server If you configure a NAT loopback policy, and the SNAT action includes more than one member, users on your internal network are always redirected to the first member of the SNAT action. This is true even if you select the Set Source IP Address option in the Static NAT action. The Firebox always uses the interface IP address as the source IP address for loopback connections with Static NAT.

The HTTP server is physically connected to the trusted 10.0.1.0/24 network.The trusted interface is configured with an IP address on the 10.0.1.0/24 network.The company wants to allow users on the trusted network to use the public IP address or domain name to get access to this public server. The company uses static NAT to map the public IP address to the internal server.
Loopback option how to#
To help you understand how to configure NAT loopback when you use static NAT (SNAT), we give this example:Ĭompany ABC has an HTTP server on the Firebox trusted interface. NAT loopback enables a user on the trusted or optional networks to connect to a public server with the public IP address or domain name of the server, if the server is on the same physical Firebox interface.
