
Address translation: SNATs, NATs, and IP forwarding
BIG-IP® Reference Guide 4 - 131
• If multiple external interfaces are not available, the ISP routers or
firewalls are assigned to different IP networks. This will already be the
case for ISPs.
• For firewalls, the separate IP address ranges must be established on the
inside and outside interfaces of each firewall. The separate networks are
then assigned separate self addresses, for example, 10.0.0.1 and 11.0.0.1.
Thus, if the internal and external VLANs are named internal and external,
you would type the following commands:
b self 10.0.0.1 vlan external snat automap enable
b self 11.0.0.1 vlan external snat automap enable
b snat internal to auto
Disabling SNATs and NATs for a pool
When configuring a pool, you can specifically disable SNAT or NAT
translations on any connections that use that pool. By default, this setting is
enabled. For information on how to disable SNAT and NAT connections for
a pool, see Disabling SNAT and NAT connections, on page 4-45.
Disabling ARP requests
By default, the BIG-IP responds to ARP requests for the SNAT address and
sends a gratuitous ARP request for router table update. If you want to
disable the SNAT address for ARP requests, you must specify arp disable.
Additional SNAT configuration options
The following procedures allow you to further configure SNATs.
To delete SNAT addresses
The following syntax deletes a specific SNAT:
b snat <snat_ip> | default delete
To show SNAT mappings
The following bigpipe command shows mappings:
b snat [<snat_ip> ...] show
b snat default show
The value of the <snat_ip> variable can be either the translated or the
original IP address of the SNAT, or a SNAT-enabled VLAN name.
The following command shows the current SNAT connections:
b snat [<snat_ip> ...] dump [ verbose ]
b snat default dump [ verbose ]
The optional verbose keyword provides more detailed output.
The following command prints the global SNAT settings:
b snat globals show
Kommentare zu diesen Handbüchern