Source NAT (SNAT) changes the source address in the IP header of a packet. It can also change the source port in the TCP/UDP headers. The typical usage is to change a private (rfc1918) address/port into a public address/port for packets leaving your network.
You can create a rule to either enable or disable source NAT.
In this example, as packets are received from the web VM, the Tenant2NAT tier-1 router changes the source IP address of the packets from 172.16.10.10 to 220.127.116.11. Having a public source IP address enables destinations outside of the private network to route back to the original source.
The tier-0 router must have an uplink connected to a VLAN-based logical switch. See Connect a Tier-0 Logical Router to a VLAN Logical Switch for the NSX Edge Uplink.
The tier-0 router must have routing (static or BGP) and route redistribution configured on its uplink to the physical architecture. See Configure a Static Route, Configure BGP on a Tier-0 Logical Router, and Enable Route Redistribution on the Tier-0 Logical Router.
The tier-1 routers must each have an uplink to a tier-0 router configured. Tenant2NAT must be backed by an NSX Edge cluster. See Attach Tier-0 and Tier-1.
The tier-1 routers must have downlink ports and route advertisement configured. See Add a Downlink Port on a Tier-1 Logical Router and Configure Route Advertisement on a Tier-1 Logical Router.
The VMs must be attached to the correct logical switches.
- From your browser, log in with admin privileges to an NSX Manager at https://nsx-manager-ip-address.
- Select from the navigation panel.
- Click a tier-1 logical router on which you want to configure NAT.
- Select .
- Click ADD.
- Specify a priority value.
A lower value means a higher precedence for this rule.
- For Action, select SNAT to enable source NAT, or NO_SNAT to disable source NAT.
- Select the protocol type.
By default, Any Protocol is selected.
- (Optional) For Source IP, specify an IP address or an IP address range in CIDR format.
If you leave this field blank, all sources on router's downlink ports are translated. In this example, the source IP address is 172.16.10.10.
- (Optional) For Destination IP, specify an IP address or an IP address range in CIDR format.
If you leave this field blank, the NAT applies to all destinations outside of the local subnet.
- If Action is SNAT, for Translated IP, specify an IP address or an IP address range in CIDR format.
In this example, the translated IP address is 18.104.22.168.
- (Optional) For Applied To, select a router port.
- (Optional) Set the status of the rule.
The rule is enabled by default.
- (Optional) Change the logging status.
Logging is disabled by default.
- (Optional) Change the firewall bypass setting.
The setting is enabled by default.
The new rule is listed under NAT. For example:
What to do next
Configure the tier-1 router to advertise NAT routes.
To advertise the NAT routes upstream from the tier-0 router to the physical architecture, configure the tier-0 router to advertise tier-1 NAT routes.