This is one of the more complex NAT policies you can create on a firewall running SonicOS — it allows you to use the WAN IP address of the firewall to provide access to multiple internal servers. This is most useful in situations where your ISP has only provided a single public IP address, and that IP address has to be used by the firewall’s WAN interface (by default, the X1 interface).
Below, create the programming to provide public access to two internal web servers through the firewall’s WAN IP address; each is tied to a unique custom port. It is possible to create more than two as long as all the ports are unique.
To use the WAN IP address of the firewall to provide access to multiple internal servers
To create an inbound port address translation policy via WAN IP address
servone_public_port and servtwo_public_port.servone_public_port.servtwo_public_port.After configuring each custom service, click Save to save the custom services.
After configuring both custom services, click Close.
servone_private_ip and servtwo_private_ip.After configuring each address object, click Save to create the address object.
After configuring both address objects, click Close.
To create two NAT policies to allow both servers to initiate traffic to the public internet using the firewall’s WAN IP address, configure the two sets of options shown in the Option Choices: Two Servers to Initiate Traffic to the Internet table.
After configuring the NAT policy for each server, click Add to add and activate that NAT policy.
After configuring both NAT policies, click Cancel.
With these policies in place, the firewall translates the servers’ private IP addresses to the public WAN IP address when it initiates traffic out the WAN interface (by default, the X1 interface).
To create two NAT policies to map the custom ports to both servers’ real listening ports and to map the firewall’s WAN IP address to the servers’ private addresses, configure the two sets of options shown in the Option Choices: Mapping Custom Ports to Servers table.
After configuring the NAT policy for each server, click Add to add and activate that NAT policy.
After configuring both NAT policies, click Cancel.
To create the two access rules that allow anyone from the public Internet to access the two web servers using the custom ports and the firewall’s WAN IP address, configure the two sets of options shown in the Option Choices: Creating Access Rules table.
After configuring the access rule for each server, click Add to add and activate that access rule.
After configuring both access rules, click Cancel.
To verify, attempt to access the web servers via the firewall’s WAN IP address using a system located on the public internet on the new custom port (for example: http://67.115.118.70:9100 and http://67.115.118.70:9200). You should be able to successfully connect. If not, review this section and ensure that you have configured all required settings correctly.