firewall_dynamic_nat_policy_obj
firewall_dynamic_nat_policy_obj
Configuration Editor for API to add, modify, delete, and get configuration for Dynamic NAT policy settings resource.
Read/write properties
port_forwarding_rules <port_forwarding_rules_obj[]>
Port Forwarding Rules.
enable_gre_pptp_passthrough <Boolean>
To allow a GRE/PPTP session to be translated. Only a single session from the inside network will be permitted..
direction <String>
The direction, from the Service or Virtual Interface perspective, the translation will operate.. Possible values = [inbound,outbound]
inside_network_ip_address <String>
The Inside IP Address and Prefix to translate (Source IP Address in the direction selected)..
allow_related <Boolean>
To allow packets related to a Connection (ICMP error packets)..
service_name <String>
The Service Name that the translation applies to..
id <Integer>
Firewall dynamic NATs policy id.
inside_zone <String>
The Inside Zone to translate.. Possible values = [any,Internet_Zone,Untrusted_Internet_Zone,Default_LAN_Zone]
service_type <String>
The Service Type that the translation applies to.. Possible values = [local,internet,intranet]
outside_network_ip_address <String>
The Outside IP Address and Subnet Mask packets will be translated to (Source IP Address in the direction selected)..
port_parity <Boolean>
If enabled, outside ports for NAT connections will maintain parity (even if inside port is even, odd if outside port is odd)..
bind_responder_route <Boolean>
If enabled, the route for the responder's traffic will be bound to the Source Service..
enable_ipsec_passthrough <Boolean>
To allow an IPsec (AH/ESP) session to be translated. Only a single session from the inside network will be permitted..
outside_zone <String>
The Zone a packet must be destined for to allow translation.. Possible values = [Internet_Zone,Untrusted_Internet_Zone,Default_LAN_Zone]
type <String>
The type of Dynamic NAT to perform.. Possible values = [port_restricted,symmetric]
Read only properties
priority <Integer>
The order/precedence in which Filters are applied (automatically redistributed)..
Operations
[add]{}
URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj
Description: Use this operation to add the Dynamic NAT policy settings
HTTP Method: POST
Request Payload: JSON
{"firewall_dynamic_nat_policy_obj": { "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }] , "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }}
Response Payload: JSON
{ "firewall_dynamic_nat_policy_obj":{ "priority":<Integer_value>
, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}
[delete]{}
URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj/
Description: Use this operation to delete the Dynamic NAT policy settings
HTTP Method: DELETE
Response Payload: JSON
{ "errorcode": 0, "message": "Done", "severity": <String;_value> }
[get (all)]{}
URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj
Description: Use this operation to get the Dynamic NAT policy settings
HTTP Method: GET
Response Payload: JSON
{"firewall_dynamic_nat_policy_obj":[{ "priority":<Integer_value>
, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}
[modify]{}
URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj
Description: Use this operation to modify the Dynamic NAT policy settings
HTTP Method: PUT
Request Payload: JSON
{"firewall_dynamic_nat_policy_obj":{ "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }] , "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }}
Response Payload: JSON
{ "firewall_dynamic_nat_policy_obj":[{ "priority":<Integer_value>
, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}