This is a more specific example of a one-to-many NAT load balancing policy. To configure NAT load balancing in this example, complete the following tasks:
It is strongly advised that you enable logging for all categories, and enable name resolution for logging.
To enable logging
Navigate to the DEVICE | Log > Settings.
Click the Edit icon at the top of the table.
The Edit Attributes of All Categories dialog appears.
Select Enable for Display Events in Log Monitor and for any other desired settings.
Debug logs should only be used for initial configuration and troubleshooting, and it is advised that once setup is complete, you reset the logging level back to a more appropriate level for your network environment.
Click Save.
Click Accept on the DEVICE | Log > Settings page to save and activate the changes.
To enable log name resolution
Choose DNS then NetBIOS from the Name Resolution Method drop-down menu. The DNS Settings section displays.
Select the Inherit DNS Settings Dynamically from WAN Zone option. The Log Resolution DNS Server fields are filled automatically and cannot be changed.
Click Accept to save and activate the changes.
To create address objects and an address group
Create address objects for both of the internal web servers as well as for the Virtual IP on which external users access the servers. For example:
Click over to the Address Groups tab. Click +Add.
Create an address group named www_group
and add the two internal server address objects you just created. For example:
To configure the inbound NAT load balancing policy
Click +Add and create an Inbound NAT Rules policy for www_group
to allow anyone attempting to access the Virtual IP to get translated to the address group you just created.
Do not save the NAT rule just yet.
Click the Advanced/Actions view. Under NAT Method, select Sticky IP as the NAT Method.
For Probe type, select TCP from the drop-down menu, and type 80 into the Port field.
This means that SonicOS checks to see if the server is up and responding by monitoring TCP port 80 (which is what people are trying to access).
Click Add to save and activate your changes.
Before you go any further, check the logs and the status page to see if the resources have been detected and have been logged as online. Two alerts appear as Firewall Events with the message Network Monitor: Host
192.160.200.220 is online
(with your IP addresses). If you do not see these two messages, check the previous steps.
To configure the corresponding outbound NAT policy
Click +Add and create an Outbound NAT policy for www_group
to allow the internal servers to get translated to the Virtual IP when accessing resources out the WAN interface (by default, the X1 interface). The Original / Translated settings are shown here. Advanced / Actions settings are not necessary.
To configure the access rule
Click +Add to create an access rule to allow traffic from the outside to access the internal web servers through the Virtual IP.
Click Add to create the access rule.
Click Cancel to exit the dialog.
Test your work by connecting via HTTP to a web page hosted on one of the internal web servers using a browser from a computer outside the WAN. You should be connected through the Virtual IP.
If you wish to load balance one or more SonicWall appliances, repeat these procedures using HTTPS instead of HTTP as the allowed service.
If the web servers are not accessible, go to the POLICY | Rules and Policies > Access Rules page and click the expansion arrow next to the web server in question to view its Traffic Statistics.
If the rule is configured incorrectly you will not see any Rx or TX Bytes; if it is working, you will see these increment with each successful external access of the load balanced resources.
Finally, check the logs and the status page to see if there are any alerts (noted in yellow) about the Network Monitor noting hosts that are offline; it could be that all of your load balancing resources are not reachable by the firewall and that the probing mechanism has marked them offline and out of service. Check the load balancing resources to ensure that they are functional and check the networking connections between them and the firewall.