Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Virtual Appliance Admin Guide

English

Print Help Download Help
Manage Firewall Configuration > Source Network Address Translation
  • Introduction To Comodo Dome Firewall - Virtual Appliance
    • Install Dome Firewall And Login To The Administrative Console
  • The Main Interface
  • The Dashboard
  • View And Modify System Status And General Configuration
    • Manage Admin Accounts
      • Add And Manage Administrators
      • Manage Administrative Roles
    • License Activation
    • SNMP Settings
    • Central Management
    • Configure SSH Access
    • High Availability
    • View And Update Firmware Version
    • Create And Schedule Backup Of DFW State
      • Manually Create A Backup
      • Schedule Backup Operations
      • Encrypt Backup Archives
      • Export A Backup
      • Import A Backup Archive From A Local Computer
      • Roll Back The Virtual Appliance To A Previous Time Point
      • Reset The Virtual Appliance To Factory Defaults
    • Shutdown Or Restart The Dome Firewall Virtual Appliance
  • View DFW Virtual Appliance Status
    • System Status
    • Network Status
    • System Usage Summaries
    • Network Traffic
    • Network Connections
    • SSLVPN Connections
  • Network Configuration
    • Configure Interface Devices, Uplinks And VLANs
      • Configure Interface Devices
      • Add And Manage Gateway Uplink Devices
      • Create VLANs
    • Routes
      • Add And Manage Static Routes
      • Add And Manage Policy Routing Rules
  • Configure DFW Virtual Appliance Services And Protection Settings
    • DHCP Server
    • Advanced Threat Protection
      • Manage The ATP Profiles
      • Comodo Antivirus
    • Time Server
    • Intrusion Prevention
      • Configure Intrusion Prevention System
      • Manage IPS Rulesets
      • Manage Application Identification Rulesets
    • Configure Wireless Hotspot
      • Configure Captive Portal Service
      • Customize The Login Page
      • Add And Manage Permanent Users
    • Internet Content Adaptation Protocol
    • Quality Of Service
  • Manage Firewall Configuration
    • Firewall Objects
      • Manage Firewall Address Objects
      • Manage Firewall Object Groups
      • Manage Firewall Schedules
      • Active Directory Integration
    • Destination Network Address Translation
    • Source Network Address Translation
    • Configure System Access
    • Configure Firewall Policy Rules
      • Manage Firewall Policy Rules
      • Manage VPN Firewall Rules
  • Configure Proxy Services
    • HTTP/HTTPS Proxy Server
      • Configure URL And Content Filtering
      • HTTPS Proxy
  • Configure Virtual Private Network Settings
    • SSL VPN Server
      • Configure General SSL VPN Server Settings
      • Manage SSL VPN Client Accounts
      • Configure Advanced SSL VPN Server Settings
      • Configure Clients To Connect To Dome Firewall
    • IPsec Configuration
    • Configure L2TP Server
    • Configure IPSec/L2TP Users
  • View Logs
    • Realtime Logs
    • Configure Log Settings
    • Generate Reports
  • Appendix - Minimum Requirements For Software Installations

Source Network Address Translation


  • By default, Dome Firewall states the IP address of the primary uplink device as the source address of all outbound traffic.
  • If outgoing traffic from an internal host must contain the host's IP address, then administrators should configure a Source NAT (SNAT) rule. This is useful If a host is running a web or mail service and the outgoing packets should contain the external IP address of the server.

Tip: CDome Firewall also allows you to create Destination NAT (DNAT) rules for incoming traffic. DNAT rules redirect service-specific traffic from a port on a host or interface to another host/port combination. See Configure Virtual IP for Destination Network Address Translation for more details.


SNAT rules can be created and managed from the 'SNAT' interface.

    • Click 'Firewall' > 'SNAT' in the left menu to open the SNAT interface



      The interface displays all current SNAT rules in effect and allows you to create new rules.


      SNAT Table - Column Descriptions

      Column

      Description

      #

       ID number of the rule. Translation is applied based on the first matching rule in the list, regardless of other matching rules that follow.

      Source

       The firewall object which contains the IP or subnet of the host(s) from which traffic originates.

      Destination

       The interface device through which traffic is directed to the external network.

      Service

       Protocol and port used by the traffic.

      NAT to

       The IP address of the host. This is contained in the headers of outgoing packets.

      Remark

      A short description of the rule.

      Count

       The number of packets and size of data intercepted by the rule.

      Actions

      Displays control buttons for managing the rule.

       - Enabled or disable the rule.

       -  Edit rule parameters. The 'Edit' interface is similar to 'Add Rule' interface. See Creating an SNAT rule for more details.

        - Removes the rule.


      • Clicking the right arrow button beside 'Show system rules' displays a list of SNAT rules auto generated by the DFW virtual appliance. These rules cannot be modified or removed.





      Creating an SNAT rule

       

      The source rule can be created by defining the source of the outgoing traffic, destination, service and the IP address to be masqueraded.


      To create a new SNAT rule

      • Click 'Firewall' > 'SNAT' on the left menu
      • Click 'Add a new Source NAT Rule'




      • Enter the parameters for the new rule as shown below:

      Source - Specify whether the origin of the traffic to be intercepted by this rule, is a Network address/IP address or the SSL VPN user by choosing the option from the 'Type' drop-down.

      1. Network address/IP address - Choose the Firewall Object containing the IP address, IP Address Range or the subnet of the host(s) from the 'Select network/IPs' drop-down.

      If a firewall object covering the IP address/IP Address range or the subnet to be specified has not been created under the Firewall Objects interface previously, you an create a new object from this interface too.

      To create a new firewall object

      • Click the drop-down arrow and click 'Create' at the bottom of the list. A new pane for creating a new object will appear.


      • Name - Specify a name for the object (15 characters max) representing the host(s) included in the object.
      • Comment - Enter a short description of the object.
      • Type - Select the type by which the hosts are to be referred in the object. The available options are:
      • Subnet - Select this if a sub network of computers is to be covered by the object and enter the sub network address
      • IP address - Select this if a single host is to be covered by the object and enter the IP address of the host
      • IP range - Select this if more than one host is to be covered by the object and enter the IP address range of the hosts
      • Click 'Add'.

      The new object will be added and will be available for selection from the Select network/IPs drop-down.




      The new object will also be added to the list of objects under Firewall Objects and will be available for selection for creating other firewall rules too.

      1. SSLVPN User - Choose the SSL VPN user from the 'Select SSLVPN users' drop-down.

      Destination - Specify the whether the destination of the traffic is network zone/uplink device/VPN, network address/IP address or the SSL VPN user.

      1. Zone/VPN/Uplink - Choose the interface device, the VPN or the physical port to which the interface is connected, from the 'Select interfaces' drop-down.

      2. Network address/IP address - Choose the Firewall Object containing the IP address, IP Address Range or the subnet of the host(s) from the 'Select network/IPs' drop-down.

      If a firewall object covering the IP address/IP Address range or the subnet to be specified has not been created under the Firewall Objects interface previously, you an create a new object from this interface too. See explanation above for more details.

      1. SSLVPN User - Choose the SSL VPN user from the 'Select SSLVPN users' drop-down.

      Service/Protocol/Port - Select the type or the service hosted by the source, the protocol and the port used by the service.

      • Service - Choose the type of service from the drop-down

      • Protocol - Choose the protocol used by the service

      • Destination port - Specify the destination port(s) of the service one by one, in the 'Destination Port' text box.


      Tip: The appliance is loaded with predefined combinations of service/protocol/port, like HTTP/TCP/80,[All]/TCP+UDP/0:65535, or [Any], which is a shortcut for all services, protocols, and ports. If you want to specify custom protocol/port combination, then select 'User Defined' from the service. You can also specify additional destination ports for standard combinations, for the services that run on ports different from the standard ones.


      NAT - The NAT option allows you to choose whether or not to apply the NAT. On applying NAT, the IP address/Port contained in the headers of the data packets will be changed to the IP address selected from the drop-down at the right. Choose the NAT option from the drop-down at the left. The options available are:

      1. NAT - The NAT will be applied. Choose the source IP address to be contained in the headers of the data packets from the drop-down at the right.

      The drop-down at the right displays the network zones, network interface devices and the IP addresses from which the outgoing traffic is allowed.

      • Ensure that the outgoing traffic is allowed from the host. Open the Policy Firewall interface by clicking Firewall > Firewall. Add a rule to allow outgoing traffic from the host. See Configure Firewall Policy Rules for more details.
      • If you want a static IP address assigned to the server to be shown in the outgoing traffic, then add the IP address as an additional address for the uplink device through which the traffic will be routed to external network.
      • Open Uplink Editor interface by clicking Network > Interfaces > Uplink Editor tab
      • Click the Edit icon  in the row of the uplink device
      • Ensure that the 'Add additional addresses' checkbox is selected, enter the IP address/netmask into the textbox and click 'Update Uplink'.
      • Selecting 'Auto' or 'Zone - IP: Auto' chooses the IP address of the respective outgoing interface
      1. No NAT - The Network Address Translation will not be applied

      2. Map Network - All IPs from the source subnet will be statically mapped to another network of the same size. Specify the subnet to which the IPs are to be mapped in the textbox at the right.

      General Settings - Configure the General Settings to enable/disable, enter a short description and select a position for the rule in the list.

      • Enabled - Leave this checkbox selected if you want the rule to be activated upon creation.

      • Remark - Enter a short description for the rule. The description will appear in the Remark column of the respective Rules interface

      • Position - Set the priority for the rule in the list of rules in the respective rules interface. The rules in the iptables are processed in the order they appear on the list.

      • Click 'Create Rule'. A confirmation dialog will appear.

      • Click 'Apply'. The firewall will be restarted with the new rule applied.

      SNAT rule management activities are logged - including date, time, type of event, subject id, component name and event outcome.
        Our Products
        • Free Antivirus
        • Free Internet Security
        • Website Malware Removal
        • Free Anti-Malware
        • Anti-Spam (Free Trial)
        • Windows Antivirus
        • Antivirus for Windows 7
        • Antivirus for Windows 8
        • Antivirus for Windows 10
        • Antivirus for MAC
        • Antivirus for Linux
        • Free Endpoint Security
        • Free ModSecurity
        • Free RMM
        • Free Website Malware Scanner
        • Free Device Manager for Android
        • Free Demo
        • Network Security
        • Endpoint Protection
        • Antivirus for Android
        • Comodo Antivirus
        • Wordpress Security
        Cheap CDN
        • Bootstrap CDN
        • Semantic UI CDN
        • Jquery CDN
        • CDN Plans
        • CDN
        • Free CDN
        Enterprise
        • Patch Management Software
        • Patch Manager
        • Service Desk
        • Website Down
        • Endpoint Protection Solutions
        • Website Security Check
        • Remote Monitoring and Management
        • Website Security
        • Device Manager
        • ITSM
        • CRM
        • MSP
        • Android Device Manager
        • MDR Services
        • Managed IT Support Services
        • Free EDR
        Free SSL Certificate
        Support Partners Terms and Conditions Privacy Policy

        © Comodo Group, Inc. 2025. All rights reserved.