Skip to main content

NAT (Network Address Translation)

Masquerading

For the masquerading setting:

  • Firewall
  • General Settings

follow the menus. It can be configured with the Masquerading checkboxes in the table under Zones=>Forward on the incoming page. Masquerading hides the source IP address of data packets with the router's WAN IP address. The masquerading and MSS compression feature of the WAN interface must be enabled, but it should be disabled on the LAN interface.

Masquerading-430

SNAT (Source NAT)

ParameterDescriptionDefault Value
EnableEnable/DisableEnable
NameName of the rule
ProtocolTCP+UDP/TCP/UDP/ICMPTCP+UDP
Source IP addressThis can be a source IP address or IP range to match for this rule, such as 192.168.1.100 or 192.168.1.100-192.168.1.200. "Any" matches all source IP addresses, meaning this rule covers packets that match all source IP addresses.Any
Source PortThis can be a source port or port range to match for this rule, such as 999 or 888-999. "Null" matches all source ports, meaning this rule covers packets that match all source ports.Null
Destination IP addressThis can specify a destination IP address or IP range to match for this rule, such as 192.168.2.100 or 192.168.2.100-192.168.2.200. "Null" matches all destination IP addresses, meaning this rule covers packets that match all destination IP addresses.Null
Destination PortThis can specify a destination port or port range to match for this rule, such as 999 or 888-999. "Null" matches all destination ports, meaning this rule covers packets that match all destination ports.Null
SNAT IP addressReplace the source IP address of the matching traffic with this address.custom
SNAT portReplace the source port of the matching traffic with this port, "Null" uses the original source port.Null

Source NAT is a special form of packet masquerading that changes the source address of a packet leaving the router. When using Source NAT, you need to disable the masquerading feature of the WAN port.

SNAT1-430

To add a Source NAT rule:

  • Firewall
  • Traffic Rules

follow the menus. Click the Add and edit button in the New source NAT section under the Source NAT tab.

SNAT2-430

Use the default settings to leave all source IP addresses and destination IP addresses unchanged. Then click the Save & Apply button.

SNAT3-430

In this case, we changed the source IP address leaving the router to 192.168.9.1. However, the source IP address of an ICMP packet ping request from a PC (IP: 192.168.1.114) connected to the same router to a computer (IP: 192.168.13.4) connected to the router appears as 192.168.9.1 instead of 192.168.1.114.

SNAT4-430

Port Forwarding

To add a port forwarding rule:

  • Firewall
  • Port Forwards

follow the menus. Port forwarding rules can assign a specific port number of the WAN network to a device belonging to the selected internal network.

PortForwarding1-430

PortForwarding2-430

ParameterDescriptionDefault Value
NameName of the ruleNull
ProtocolTCP+UDP/TCP/UDPTCP+UDP
External zoneWired WAN, 4G, VPNwan
External PortThis can be a port or port range, such as 8000-9000. When the external port is empty, it indicates the DMZ (Demilitarized Zone) function.Null
Internal ZoneLAN Namelan
Internal IP addressRouter LAN IP addressNull
Internal PortYou specify a port or port range, such as 8000-9000. However, when both the external port and internal port are empty, it indicates the DMZ (Demilitarized Zone) operation.Null

NAT DMZ

While port forwarding rules redirect a specified WAN port to an internal network device, DMZ (Demilitarized Zone) rules redirect all ports belonging to the WAN interface to an internal network device. DMZ rules are set in the port forwarding interface, and in DMZ mode, there is no need to set external and internal ports.

NATDMZ1-430

NATDMZ2-430

All ports belonging to the WAN address will be redirected to the internal network device 192.168.1.110.

  • Port forwarding and DMZ cannot be used simultaneously.