SonicOS 8 Rules and Policies for Classic Mode
- SonicOS 8 Rules and Policies
- Overview
- Access Rules
- Setting Firewall Access Rules
- About Connection Limiting
- Using Bandwidth Management with Access Rules
- Creating Access Rules
- Configuring Access Rules for IPv6
- Enabling and Disabling Access Rules
- Editing Access Rules
- Deleting Access Rules
- Restoring Access Rules to Default Settings
- Displaying Access Rules
- Displaying Access Rule Traffic Statistics
- Configuring Access Rules for NAT64
- Configuring Access Rules for a Zone
- Access Rules for DNS Proxy
- User Priority for Access Rules
- Access Rule Configuration Examples
- Setting Firewall Access Rules
- NAT Rules
- About NAT in SonicOS
- About NAT Load Balancing
- About NAT64
- About FQDN-based NAT
- About Source MAC Address Override
- Viewing NAT Policy Entries
- Adding or Editing NAT or NAT64 Rule Policies
- Deleting NAT Policies
- Creating NAT Rule Policies: Examples
- Creating a One-to-One NAT Policy for Inbound Traffic
- Creating a One-to-One NAT Policy for Outbound Traffic
- Inbound Port Address Translation via One-to-One NAT Policy
- Inbound Port Address Translation via WAN IP Address
- Creating a Many-to-One NAT Policy
- Creating a Many-to-Many NAT Policy
- Creating a One-to-Many NAT Load Balancing Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Creating a WAN-to-WAN Access Rule for a NAT64 Policy
- DNS Doctoring
- Routing
- DNS Rules
- Content Filter Rules
- App Rules
- About App Rules
- Rules and Policies > App Rules
- Verifying App Rules Configuration
- App Rules Use Cases
- Creating a Regular Expression in a Match Object
- Policy-based Application Rules
- Logging Application Signature-based Policies
- Compliance Enforcement
- Server Protection
- Hosted Email Environments
- Email Control
- Web Browser Control
- HTTP Post Control
- Forbidden File Type Control
- ActiveX Control
- FTP Control
- Bandwidth Management
- Bypass DPI
- Custom Signature
- Reverse Shell Exploit Prevention
- Endpoint Rules
- SonicWall Support
Creating a NAT Load Balancing Policy for Two Web Servers
This is a more specific example of a one-to-many NAT load balancing policy. To configure NAT load balancing in this example, complete the following tasks:
- Enabling Logging and Name Resolution for Logging
- Creating Address Objects and an Address Group
- Creating the Inbound NAT Load Balancing Policy
- Creating the Outbound NAT Policy
- Creating a NAT Load Balancing Policy for Two Web Servers
- Creating a NAT Load Balancing Policy for Two Web Servers
Enabling Logging and Name Resolution for Logging
It is strongly advised that you enable logging for all categories, and enable name resolution for logging.
To enable logging
-
Navigate to the DEVICE | Log > Settings.
-
Click the Edit icon at the top of the table.
The Edit Attributes of All Categories dialog appears.
- Choose debug from the Event Priority drop-down menu.
-
Select Enable for Display Events in Log Monitor and for any other desired settings.
Debug logs should only be used for initial configuration and troubleshooting, and it is advised that once setup is complete, you reset the logging level back to a more appropriate level for your network environment.
-
Click Save.
-
Click Accept on the DEVICE | Log > Settings page to save and activate the changes.
To enable log name resolution
- Navigate to the DEVICE | Log > Name Resolution page.
-
Choose DNS then NetBIOS from the Name Resolution Method drop-down menu. The DNS Settings section displays.
-
Select the Inherit DNS Settings Dynamically from WAN Zone option. The Log Resolution DNS Server fields are filled automatically and cannot be changed.
-
Click Accept to save and activate the changes.
Creating Address Objects and an Address Group
To create address objects and an address group
- Navigate to the OBJECT | Match Objects > Addresses page.
-
Create address objects for both of the internal web servers as well as for the Virtual IP on which external users access the servers. For example:
-
Click over to the Address Groups tab. Click +Add.
-
Create an address group named
www_group
and add the two internal server address objects you just created. For example:
Creating the Inbound NAT Load Balancing Policy
To configure the inbound NAT load balancing policy
- Navigate to the POLICY | Rules and Policies > NAT
Rules page. -
Click +Add and create an Inbound NAT Rules policy for
www_group
to allow anyone attempting to access the Virtual IP to get translated to the address group you just created.Do not save the NAT rule just yet.
-
Click the Advanced/Actions view. Under NAT Method, select Sticky IP as the NAT Method.
- Under High Availability, select Enable Probing.
-
For Probe type, select TCP from the drop-down menu, and type 80 into the Port field.
This means that SonicOS checks to see if the server is up and responding by monitoring TCP port 80 (which is what people are trying to access).
-
Click Add to save and activate your changes.
Before you go any further, check the logs and the status page to see if the resources have been detected and have been logged as online. Two alerts appear as Firewall Events with the message
Network Monitor: Host
192.160.200.220 is online
(with your IP addresses). If you do not see these two messages, check the previous steps. - Click Close.
Creating the Outbound NAT Policy
To configure the corresponding outbound NAT policy
- Navigate to the POLICY | Rules and Policies > NAT
Rules page. -
Click +Add and create an Outbound NAT policy for
www_group
to allow the internal servers to get translated to the Virtual IP when accessing resources out the WAN interface (by default, the X1 interface). The Original / Translated settings are shown here. Advanced / Actions settings are not necessary.
Was This Article Helpful?
Help us to improve our support portal