One to One NAT Rules
Location in Dashboard: Security and SD-WAN
>> Configure
>> Firewall
>> Forwarding rules
Diagram
Classes
firewall (meraki.domains.organizations.networks.appliance)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
one_to_one_nat_rules | List | [one_to_one_nat_rules] | No |
one_to_one_nat_rules (meraki.domains.organizations.networks.appliance.firewall)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
name | String | min: 1 , max: 127 | No | |
public_ip | IP | No | ||
lan_ip | IP | Yes | ||
uplink | String | Regex: ^internet\d+$ | No | |
allowed_inbound | List | [allowed_inbound] | No |
allowed_inbound (meraki.domains.organizations.networks.appliance.firewall.one_to_one_nat_rules)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
protocol | Choice | any , icmp-ping , tcp , udp | No | |
destination_ports | List | Any[Integer[min: 0 , max: 65535 ] or String[matches: `(?:[1-9][0-9]3 | [1-5][0-9]4 | 6[0-4][0-9]3 |
allowed_ips | List | Any[IP or String[matches: [Aa]ny ]] | No |
Config Sample
meraki:
domains:
- name: EMEA
administrator:
name: Foo Bar
organizations:
- name: Dev
networks:
- name: Dev-main-cx-provider
product_types:
- appliance
- camera
- switch
- wireless
appliance:
firewall_one_to_one_nat:
rules:
- name: "NAT 1"
public_ip: "1.1.1.1"
lan_ip: "192.168.128.200"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 443
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"
- name: "NAT 2"
public_ip: "2.2.2.2"
lan_ip: "192.168.128.201"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 1433
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"
- name: "NAT 3"
public_ip: "3.3.3.3"
lan_ip: "192.168.128.201"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 22
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"