Using a specific IP address for internal to external traffic

Solved
CedricMX
Getting noticed

Using a specific IP address for internal to external traffic

Hello Team,

 

I am using a Mx 75 firewall on a location.

The ISP provide to us a /29 subnet so i can use 4 different public IP address.

 

I would like to know if it possible with Meraki to do this configuration : 

- For any port From a local device 1 to internet use the public IP number 1

- For any port From a local device 2 to internet use the public IP number 2

 

I know it was possible with other firewall solution.

 

Thanks for your help.

1 Accepted Solution
CedricMX
Getting noticed

PhilipDAth

 

 Thanks very much it is working.

View solution in original post

10 Replies 10
alemabrahao
Kind of a big deal
Kind of a big deal

Meraki MX does not support policy-based outbound NAT. So it is not possible.
I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
CedricMX
Getting noticed

From what i understand Meraki support inbound NAT only (from external to internal) ?

Is that correct ?

Thanks

alemabrahao
Kind of a big deal
Kind of a big deal

Yes, this is correct.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
PhilipDAth
Kind of a big deal
Kind of a big deal

CedricMX
Getting noticed

PhilipDAth

 

 Thanks very much it is working.

alemabrahao
Kind of a big deal
Kind of a big deal

I was confused because the question was about inside-out NAT and outside-in 1:1 NAT.

 

They are not the same thing.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
PhilipDAth
Kind of a big deal
Kind of a big deal

If you define a 1:1 NAT for inbound access - the MX also uses that same 1:1 NAT for all outbound access as well.

 

It is a "special exception".  I'm not sure it is even documented.

alemabrahao
Kind of a big deal
Kind of a big deal

That's called a makeshift solution. 🤣

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
alemabrahao
Kind of a big deal
Kind of a big deal

@PhilipDAth , I was thinking, it's fine to work that way, but in this case, he's opening a security vulnerability.

Exposing your host to the internet these days opens a very large vulnerability for a potential attacker.

He's taking the risk, but I personally have to disagree with that approach.

This business of working at any cost isn't my style; I prefer to assess the viability first and look at other options that offer less security risk.

This kind of thing bothers me a bit in the community—giving a solution, but it's not always the best or safest one.

I also make mistakes, but security is not something to be ignored.

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
PhilipDAth
Kind of a big deal
Kind of a big deal

When you create a 1:1 NAT it defaults to blocking all inbound access - it effectively acts solely as an outbound NAT.

 

PhilipDAth_0-1767118570215.png

 

Get notified when there are additional replies to this discussion.
Welcome to the Meraki Community!
To start contributing, simply sign in with your Cisco ID. If you don't yet have a Cisco ID, you can sign up.
Labels