Skip to main content

NAT (Network Address Translation)

Masquerading (Address Masking)

To configure address masking:

  • Firewall
  • General Settings

Navigate to Zones => Forward on the page and configure the Masquerading checkbox in the table.

Masquerading hides the source IP address of data packets by replacing it with the router’s WAN IP address. The masquerading and MSS clamping features must be enabled on the WAN interface and disabled on the LAN interface.

Masquerading-421

SNAT (Source NAT)

ParameterDescriptionDefault Value
EnableEnable / DisableEnable
NameRule name
ProtocolTCP+UDP / TCP / UDP / ICMPTCP+UDP
Source IP address

Source IP address or IP range used for matching rules, such as 192.168.1.100 or 192.168.1.100-192.168.1.200. If set to "Any", the rule applies to all source IP addresses.

Any
Source Port

Source port or port range for rule matching, such as 999 or 888-999. If set to "Null", the rule matches all source ports.

Null
Destination IP address

Destination IP address or IP range for matching rules, such as 192.168.2.100 or 192.168.2.100-192.168.2.200. If set to "Null", the rule matches all destination IP addresses.

Null
Destination Port

Destination port or port range for rule matching, such as 999 or 888-999. If set to "Null", the rule matches all destination ports.

Null
SNAT IP addressReplace the source IP address of matched traffic with this address.custom
SNAT port

Replace the source port of matched traffic with this port. If set to "Null", the original source port is used.

Null

Source NAT is a special packet masking method that changes the source address of packets leaving the router. When using Source NAT, you must disable the masquerading feature on the WAN port.

SNAT1-421

To add a Source NAT rule:

  • Firewall
  • Traffic Rules

Navigate to Source NAT tab and click Add and edit under New source NAT.

SNAT2-421

Use the default settings to match all source and destination IP addresses. Then click Save & Apply.

SNAT3-421

In this example, the router’s outgoing source IP address was changed to 192.168.9.1. However, when a PC connected to the router (IP: 192.168.1.114) sends an ICMP ping request to another device connected to the router (IP: 192.168.13.4), the source IP appears as 192.168.9.1 instead of 192.168.1.114.

SNAT4-421

Port Forwarding

To add a port forwarding rule:

  • Firewall
  • Port Forwards

Port forwarding rules map a specific WAN port to a device inside the selected internal network.

PortForwarding1-421

PortForwarding2-421

ParameterDescriptionDefault Value
NameRule nameNull
ProtocolTCP+UDP / TCP / UDPTCP+UDP
External zoneWired WAN, 4G, VPNwan
External Port

This can be a port or port range such as 8000-9000. If the external port is empty, this represents the DMZ (Demilitarized Zone) function.

Null
Internal ZoneLAN namelan
Internal IP addressRouter LAN IP addressNull
Internal Port

Specify a port or port range such as 8000-9000. When both external and internal ports are empty, this represents DMZ operation.

Null

NAT DMZ

Port forwarding rules map a specific WAN port to an internal network device, while DMZ rules forward all WAN interface ports to an internal network device.

DMZ rules are configured in the port forwarding interface, and external port and internal port settings are not required in DMZ mode.

NATDMZ1-421

NATDMZ2-421

All ports belonging to the WAN interface will be forwarded to the internal network device with IP address 192.168.1.110.

  • Port forwarding and DMZ cannot be used simultaneously.