R3166-R3206-HP High-End Firewalls NAT and ALG Configuration Guide-6PW101
21
Displaying and maintaining NAT
To do… Use the command…
Remarks
Display information about NAT
address pools
display nat address-group
[ group-number ]
Available in any view
Display all NAT configuration
information
display nat all Available in any view
Display the NAT configuration
information
display nat bound Available in any view
Display DNS mapping configuration
information
display nat dns-map Available in any view
Display the internal server
information
display nat server
Available in any view
Display static NAT information display nat static Available in any view
Display NAT statistics display nat statistics Available in any view
NAT configuration examples
One-to-one static NAT configuration example
1. Network requirements
An internal host 10.110.10.8/24 uses public address 202.38.1.100 to access the Internet.
Figure 15 Network diagram for one-to-one static NAT configuration
2. Configuration procedure
# As shown in Figure 15, conf
igure the IP addresses for the interfaces (omitted).
Method I
# Configure a one-to-one static NAT mapping.
<Firewall> system-view
[Firewall] nat static 10.110.10.8 202.38.1.100
# Enable static NAT on interface GigabitEthernet 0/2.
[Firewall] interface gigabitethernet 0/2
[Firewall-GigabitEthernet0/2] nat outbound static
[Firewall-GigabitEthernet0/2] quit
Dynamic NAT configuration example
1. Network requirements
As shown in Figure 16, a c
ompany has three public IP addresses ranging from 202.38.1.1/24 to
202.38.1.3/24, and a private network segment of 10.110.0.0/16. Specifically, the company requires
that the internal users in subnet 10.110.10.0/24 can access the Internet through NAT.
Host
10.110.10.8/24
Server
Internet
GE0/1
10.110.10.1/24
GE0/2
202.38.1.1/16
Firewall