Linux Network Address Translation (NAT)
Firewalld supports two types of Network Address translation(NAT): masquerading and port forwarding. Both can be configured on a basic level with regular firewall-cmd rules, and more advanced forwarding configurations can be accomplished with rich rules. Both forms of NAT modify certain aspects of a packet, like the source or destination, before sending it on.
With masquerading, a system will forward packets that are not directly addressed to itself to the intended recipient, while changing the source address of the packets that go through to its own public IP address. When answers to those packets come in, the firewall will then modify the destination address to the address of the original host, and send the packet on. This usually used on the edge of a network to provide Internet access to an internal network. Masquerading is a form of Network Address Translation(NAT). Masquerading can only be used with IPv4, not with IPv6.
How masquerading work
1) One of the machines sends a packet to an address outside of the local network. The packet has a source address of 10.0.0.100 (the address of the machine) and a destination address of 184.108.40.206.
2) Since the destination address is not on the local subnet, the packet will be routed to the default gateway configured on the source machine: in this case, 10.0.0.1, the IP address of the firewall.
3) The firewall accepts the packet, changes the source address to 220.127.116.11 (the external IP address for the firewall), stores a reference to this connection in its connection state table, then passes it to a router on the Internet based on its routing table.
4) An answer to the packet comes back from the Internet. The router looks up the connection in its connection state table, then changes the destination address to 10.0.0.100 (the original sender), and passes the packet on.
5) The original sender receives the answer to its request.
To configure masquerading for a zone with regular firewall-cmd commands, use the following syntax:
$ firewall-cmd – -permanent – -zone=<ZONE> – -add-masquerade
This will masquerade any packet sent to the firewall from clients defined in the sources for that zone (both interfaces and subnets) that are not addressed to the firewall itself.
To gain more control over what clients will be masqueraded, a rich rule can be used as well.
$ firewall-cmd – – permanent – -zone=<ZONE> – -add-rich-rule=’rule family=ipv4 source address=18.104.22.168/24 masquerade’
Another form of NAT is port forwarding. With port forwarding, traffic to a single port is forwarded either to a different port on the same machine, or to a port on a different machine. This mechanism is typically used to “hide” a server behind another machine, or to provide access to a service on an alternate port. When a port forward is configured to forward packets to a different machine, any replies from that machine will normally be sent directly to the original client from that machine. Since this will result in an invalid connection on most configurations, the machine that is forwarded will have to masquerade through the firewall that performed the port forwarding. A common configuration is to forward a port from the firewall machine to a machine that is already masqueraded behind the firewall.
Working of port forwarding
Assume that a machine with IP address 10.0.0.100 is running a web server on port 8080/2TCP, and that the firewall is configured to forward traffic coming in on port 80/TCP on its external interface to port 8080/TCP on that machine.
1) A client from the Internet sends a p-packet to port 80/TCP on the external interface of the firewall.
2) The firewall changes the destination address and port of this packet to 10.0.0.100 and 8080/TCP and forwards it on. The source address and port remain unchanged.
3) The machine behind the firewall sends a response to this packet. Since this machine is being masqueraded (and the firewall is configured as the default gateway), this packet is sent to the original client, appearing to come from the external interface on the firewall.
Configuring port forwarding
To configure port forwarding with regular firewall-cmd commands, use the following syntax:
$ firewall-cmd – – permanent – -zone=<ZONE> – -add-forward-port=port=<PORTNUMBER>:proto=<PROTOCOL>[:toport=<PORTNUMBER>][:toaddr=<IPADR>]
Both the toport= and toaddr= parts are optional, but at least one of those two will need to be specified.
As an example, the following command will forward incoming connections on port 513/TCP on the firewall to port 132/TCP on the machine with the IP address 192.168.0.254 for clients from the public zone:
$ firewall-cmd – – permanent – -zone=public – -add-forward-port=port=513:proto=tcp:toport=132:toaddr=192.168.0.254
To gain more control over port forwarding rules, the following syntax can be used with rich rules:
$ forward-port=port=<PORTNUMBER> protocol=tcp/udp [to-port=<PORTNUM>] [to-addr=<ADDRESS>]
If you need any further assistance please contact our support department.