firewall_dynamic_nat_policy_obj

firewall_dynamic_nat_policy_obj

Configuration Editor for API to add, modify, delete, and get configuration for Dynamic NAT policy settings resource.

Read/write properties

port_forwarding_rules <port_forwarding_rules_obj[]>

Port Forwarding Rules.

enable_gre_pptp_passthrough <Boolean>

To allow a GRE/PPTP session to be translated. Only a single session from the inside network will be permitted..

direction <String>

The direction, from the Service or Virtual Interface perspective, the translation will operate.. Possible values = [inbound,outbound]

inside_network_ip_address <String>

The Inside IP Address and Prefix to translate (Source IP Address in the direction selected)..

allow_related <Boolean>

To allow packets related to a Connection (ICMP error packets)..

service_name <String>

The Service Name that the translation applies to..

id <Integer>

Firewall dynamic NATs policy id.

inside_zone <String>

The Inside Zone to translate.. Possible values = [any,Internet_Zone,Untrusted_Internet_Zone,Default_LAN_Zone]

service_type <String>

The Service Type that the translation applies to.. Possible values = [local,internet,intranet]

outside_network_ip_address <String>

The Outside IP Address and Subnet Mask packets will be translated to (Source IP Address in the direction selected)..

port_parity <Boolean>

If enabled, outside ports for NAT connections will maintain parity (even if inside port is even, odd if outside port is odd)..

bind_responder_route <Boolean>

If enabled, the route for the responder's traffic will be bound to the Source Service..

enable_ipsec_passthrough <Boolean>

To allow an IPsec (AH/ESP) session to be translated. Only a single session from the inside network will be permitted..

outside_zone <String>

The Zone a packet must be destined for to allow translation.. Possible values = [Internet_Zone,Untrusted_Internet_Zone,Default_LAN_Zone]

type <String>

The type of Dynamic NAT to perform.. Possible values = [port_restricted,symmetric]

Read only properties

priority <Integer>

The order/precedence in which Filters are applied (automatically redistributed)..

Operations

add delete get (all) modify

[add]{}

URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj

Description: Use this operation to add the Dynamic NAT policy settings

HTTP Method: POST

Request Payload: JSON

{"firewall_dynamic_nat_policy_obj": { "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }] , "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }}

Response Payload: JSON

{ "firewall_dynamic_nat_policy_obj":{ "priority":<Integer_value>

, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}

[delete]{}

URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj/

Description: Use this operation to delete the Dynamic NAT policy settings

HTTP Method: DELETE

Response Payload: JSON

{ "errorcode": 0, "message": "Done", "severity": <String;_value> }

[get (all)]{}

URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj

Description: Use this operation to get the Dynamic NAT policy settings

HTTP Method: GET

Response Payload: JSON

{"firewall_dynamic_nat_policy_obj":[{ "priority":<Integer_value>

, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}

[modify]{}

URL: http://<MGMT-IP>/sdwan/nitro/v1/config_editor/firewall_dynamic_nat_policy_obj

Description: Use this operation to modify the Dynamic NAT policy settings

HTTP Method: PUT

Request Payload: JSON

{"firewall_dynamic_nat_policy_obj":{ "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }] , "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }}

Response Payload: JSON

{ "firewall_dynamic_nat_policy_obj":[{ "priority":<Integer_value>

, "port_forwarding_rules":[{ "protocol":<String_value> , "outside_port":<String_value> , "log_connection_end":<Boolean_value> , "inside_network_ip_address":<String_value> , "track_connection":<Boolean_value> , "log_interval":<Integer_value> , "inside_port":<String_value> , "log_connection_start":<Boolean_value> , "allow_fragments":<Boolean_value> }], "enable_gre_pptp_passthrough":<Boolean_value> , "direction":<String_value> , "inside_network_ip_address":<String_value> , "allow_related":<Boolean_value> , "service_name":<String_value> , "id":<Integer_value> , "inside_zone":<String_value> , "service_type":<String_value> , "outside_network_ip_address":<String_value> , "port_parity":<Boolean_value> , "bind_responder_route":<Boolean_value> , "enable_ipsec_passthrough":<Boolean_value> , "outside_zone":<String_value> , "type":<String_value> }]}

Was this article helpful?