One-to-many NAT policies can be used to persistently load balance the translated destination using the original source IP address as the key to persistence. For example, firewalls can load balance multiple SonicWall appliances, while still maintaining session persistence by always balancing clients to the correct destination appliance.
This NAT Rules policy is combined with an Allow access rule.
To configure a one-to-many load balancing policy and access rule
Navigate to the POLICY | Rules and Policies > Access Rules page.
Click +Add to display the Adding Rule dialog.
Enter the values shown in the Option Choices: One-to-Many Access Rule table.
Click Add. The rule is added.
Navigate to the POLICY | Rules and Policies > NAT Rules page.
Click +Add at the bottom of the page. The Adding NAT Rule dialog displays.
To create a NAT policy to allow the web server to initiate traffic to the public Internet using its mapped public IP address, choose the options shown in the Option Choices: One-to-Many NAT Load Balancing Policy Example table.
Option | Value |
---|---|
Original Source | Any |
Translated Source | Original |
Original Destination | WAN Primary IP |
Translated Destination |
Select Edit | +New Address Object to display the Adding Address Object dialog. Use the options shown in Option Choices: Add Address Object Dialog.
|
Original Service | HTTPS |
Translated Service | HTTPS |
Inbound Interface | Any |
Outbound Interface | Any |
Comment | Descriptive text, such as SMA LB |
Enable NAT Policy | Selected |
Create a reflexive policy | Not selected |
When done, click Add to add the NAT Rules policy.
For a more specific example of a one-to-many NAT load balancing policy, see Configuring NAT Load Balancing for Two Web Servers.