One to One NAT Rules
Location in Dashboard: Security and SD-WAN
>> Configure
>> Firewall
>> Forwarding rules
Diagram
Classes
firewall (meraki.domains.organizations.networks.appliance)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
one_to_one_nat_rules | List | [one_to_one_nat_rules] | No |
one_to_one_nat_rules (meraki.domains.organizations.networks.appliance.firewall)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
name | String | min: 1 , max: 127 | No | |
public_ip | IP | No | ||
lan_ip | IP | Yes | ||
uplink | String | Regex: ^internet\d+$ | No | |
allowed_inbound | List | [allowed_inbound] | No |
allowed_inbound (meraki.domains.organizations.networks.appliance.firewall.one_to_one_nat_rules)
Name | Type | Constraint | Mandatory | Default Value |
---|---|---|---|---|
protocol | Choice | any , icmp-ping , tcp , udp | No | |
destination_ports | List | Any[Integer[min: 0 , max: 65535 ] or String[matches: `(?:[1-9][0-9]3 | [1-5][0-9]4 | 6[0-4][0-9]3 |
allowed_ips | List | Any[IP or String[matches: [Aa]ny ]] | No |
Config Sample
meraki: domains: - name: EMEA administrator: name: Foo Bar organizations: - name: Dev networks: - name: Dev-main-cx-provider product_types: - appliance - camera - switch - wireless appliance: firewall_one_to_one_nat: rules: - name: "NAT 1" public_ip: "1.1.1.1" lan_ip: "192.168.128.200" uplink: internet1 allowed_inbound: - protocol: tcp destination_ports: - 443 allowed_ips: - "10.10.10.0/24" - "10.20.0.0/16" - name: "NAT 2" public_ip: "2.2.2.2" lan_ip: "192.168.128.201" uplink: internet1 allowed_inbound: - protocol: tcp destination_ports: - 1433 allowed_ips: - "10.10.10.0/24" - "10.20.0.0/16" - name: "NAT 3" public_ip: "3.3.3.3" lan_ip: "192.168.128.201" uplink: internet1 allowed_inbound: - protocol: tcp destination_ports: - 22 allowed_ips: - "10.10.10.0/24" - "10.20.0.0/16"