Configuring Outbound Net-To-Net Static Nat; Configuring Inbound One-To-One Static Nat - HP FlexNetwork MSR2003 Configuration Manual

Flexnetwork msr router series
Hide thumbs Also See for FlexNetwork MSR2003:
Table of Contents

Advertisement

Step
NAT.
3.
Return to system view.
4.
Enter interface view.
5.
Enable static NAT on the
interface.

Configuring outbound net-to-net static NAT

For address translation from a private network to a public network, configure outbound net-to-net
static NAT on the interface connected to the external network.
When the source IP address of a packet from the private network matches the private address
range, the source IP address is translated into a public address in the public address range.
When the destination IP address of a packet from the public network matches the public
address range, the destination IP address is translated into a private address in the private
address range.
To configure outbound net-to-net static NAT:
Step
1.
Enter system view.
2.
Configure a net-to-net
mapping for outbound static
NAT.
3.
Return to system view.
4.
Enter interface view.
5.
Enable static NAT on the
interface.

Configuring inbound one-to-one static NAT

For address translation from a public IP address to a private IP address, configure inbound
one-to-one static NAT.
When the source IP address of a packet from the public network to the private network matches
the global-ip, the source IP address is translated into the local-ip.
When the destination IP address of a packet from the private network to the public network
matches the local-ip, the destination IP address is translated into the global-ip.
To configure inbound one-to-one static NAT:
Command
global-ip [ vpn-instance
global-name ] [ acl { acl-number |
name acl-name } [ reversible ] ]
quit
interface interface-type
interface-number
nat static enable
Command
system-view
nat static outbound net-to-net
local-start-address
local-end-address [ vpn-instance
local -name ] global
global-network { mask-length |
mask } [ vpn-instance
global-name ] [ acl { acl-number |
name acl-name } [ reversible ] ]
quit
interface interface-type
interface-number
nat static enable
130
Remarks
processes only packets matching
the permit rule in the ACL.
N/A
N/A
By default, static NAT is disabled.
Remarks
N/A
By default, no mappings exist.
If you specify an ACL, NAT
processes only packets matching
the permit rule in the ACL.
N/A
N/A
By default, static NAT is disabled.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents