So, I created the NAT rule because I want to access a server from WAN.
How can link the DNAT created to Firewall rule?
I do not find the option.
So, I created the NAT rule because I want to access a server from WAN.
How can link the DNAT created to Firewall rule?
I do not find the option.
Hi,
There is no need to link a NAT with a firewall rule. You have to create a new firewall (WAN to LAN) and select Services as "pre-translated". It will work. "Link a NAT rule" is only possible with Source NAT.
Thanks,
Deepak Kumar
Sophos XG & Central Architect
Can you share the screenshot?
Thanks
Done. How can the NAT i created before can be linked to this firewall rule?
Is it automatical?
Linking a Firewall Rule to a NAT Rule would be some sort of "Automatic Firewall rule", which is not in the product right now.
So to speak, You can only use SNAT Linked NAT.
You need to create a separate Firewall Rule for DNAT right now (and other NATs).
As far as i know, there are plans to implement the automatic firewall rule for NAT.
The other guys should be respond to you, if i miss something.
__________________________________________________________________________________________________________________
Is there any advantage beside time saving, of doing linked NAT rules from the firewall rule vs creating both rules separately?
Is there any advantage beside time saving, of doing linked NAT rules from the firewall rule vs creating both rules separately?
Hi,
As I am getting, The agenda behind this process to give more control and flexibility to the Admin same like CISCO.
Thanks,
Deepak Kumar
Sophos XG & Central Architect
There are not.
As mentioned in other threads, there could be a ton of Linked nat rules in field installations. So to speak, personally speaking, i would recommend to use a default SNAT instead of X linked NAT rules.
I wrote about this here: https://community.sophos.com/products/xg-firewall/sfos-eap/sfos-v18-early-access-program/f/feedback-and-issues/115747/migration-to-v18-nat
__________________________________________________________________________________________________________________