129
NAT configuration task list
Tasks at a glance Remarks
Perform at least one of the following tasks:
• Configuring static NAT
• Configuring dynamic NAT
• Configuring NAT Server
• Configuring DS-Lite NAT444
If y
ou perform all the tasks on an interface, IPv6 packets
are processed by DS-Lite NAT444, and IPv4 packets are
compared against the following NAT rules in order for a
match:
• NAT Server.
• Static NAT.
• Dynamic NAT.
Configuring NAT with DNS mapping N/A
(Optional.) Configuring NAT hairpin N/A
(Optional.) Configuring NAT with ALG N/A
(Optional.) Configuring NAT session logging N/A
Configuring static NAT
Static NAT includes one-to-one static NAT and net-to-net static NAT for outbound and inbound
translation. Do not configure inbound static NAT alone. Typically, inbound static NAT functions with
outbound dynamic NAT, NAT Server, or outbound static NAT to implement bidirectional NAT.
Configuration prerequisites
Perform the following tasks before configuring static NAT:
• Configure an ACL to identify the IP addresses to be translated. The match criteria include the
source IP address, source port number, destination IP address, destination port number,
transport layer protocol, and VPN instance. For more information about ACLs, see ACL and
QoS Configuration Guide.
• Manually add a route for inbound static NAT. Use local-ip or local-network as the destination
address, and use global-ip, an address in global-network, or the next hop directly connected to
the output interface as the next hop.
Configuring outbound one-to-one static NAT
For address translation from a private IP address to a public IP address, configure outbound
one-to-one static NAT on the interface connected to the external network.
• When the source IP address of a packet from the private network matches the local-ip, the
source IP address is translated into the global-ip.
• When the destination IP address of a packet from the public network matches the global-ip, the
destination IP address is translated into the local-ip.
To configure outbound one-to-one static NAT:
Step Command Remarks
1. Enter system view.
system-view
N/A
2. Configure a one-to-one
mapping for outbound static
nat static outbound
local-ip
[
vpn-instance
local-name ]
By default, no mappings exist.
If you specify an ACL, NAT