Skip to main content

One to One NAT Rules

Location in Dashboard: Security and SD-WAN >> Configure >> Firewall >> Forwarding rules

Diagram

Classes

firewall (meraki.domains.organizations.networks.appliance)

NameTypeConstraintMandatoryDefault Value
one_to_one_nat_rulesList[one_to_one_nat_rules]No

one_to_one_nat_rules (meraki.domains.organizations.networks.appliance.firewall)

NameTypeConstraintMandatoryDefault Value
nameStringmin: 1, max: 127No
public_ipIPNo
lan_ipIPYes
uplinkStringRegex: ^internet\d+$No
allowed_inboundList[allowed_inbound]No

allowed_inbound (meraki.domains.organizations.networks.appliance.firewall.one_to_one_nat_rules)

NameTypeConstraintMandatoryDefault Value
protocolChoiceany, icmp-ping, tcp, udpNo
destination_portsListAny[Integer[min: 0, max: 65535] or String[matches: `(?:[1-9][0-9]3[1-5][0-9]46[0-4][0-9]3
allowed_ipsListAny[IP or String[matches: [Aa]ny]]No

Config Sample

meraki:
domains:
- name: EMEA
administrator:
name: Foo Bar
organizations:
- name: Dev
networks:
- name: Dev-main-cx-provider
product_types:
- appliance
- camera
- switch
- wireless
appliance:
firewall_one_to_one_nat:
rules:
- name: "NAT 1"
public_ip: "1.1.1.1"
lan_ip: "192.168.128.200"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 443
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"
- name: "NAT 2"
public_ip: "2.2.2.2"
lan_ip: "192.168.128.201"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 1433
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"
- name: "NAT 3"
public_ip: "3.3.3.3"
lan_ip: "192.168.128.201"
uplink: internet1
allowed_inbound:
- protocol: tcp
destination_ports:
- 22
allowed_ips:
- "10.10.10.0/24"
- "10.20.0.0/16"