Figure 1
Specify the source of the traffic you want to forward. In this example, we selected a separate server, but you can select networks, a set of networks, a set of computers, a range of addresses, and subnets. This allows us to have high flexibility when establishing NAT relationships in TMG.
Configure One-to-One NAT with TMG 2010 Picture 2
Figure 2
Specify the destination that you want to apply this rule to. In our example, we chose a network outside of External because we want to forward traffic sent from the server using this rule. Here you can choose from a variety of options, which also allow you to have fairly fine-grained control over address forwarding.
Configure One-to-One NAT with TMG 2010 Picture 3
Figure 3
Select the option Network Address Translation (NAT).
Configure One-to-One NAT with TMG 2010 Picture 4
Figure 4
Select the Use the specified IP address option and select the IP address from the available list.
Note:
These IP addresses must be assigned to the network interface first to create the rule, otherwise they will not appear in this list.
Configure One-to-One NAT with TMG 2010 Picture 5
Figure 5
You can also choose the Use multiple IP addresses option , which allows you to select additional IP addresses for the rule (which makes it useful for business arrays when NLB is not enabled).
Configure One-to-One NAT with TMG 2010 Picture 6
Figure 6
Configure One-to-One NAT with TMG 2010 Picture 7
Figure 7
Another important thing you need to know is network rules, like firewall policy rules, they are processed in order. To work properly, more specific rules need to precede other rules. In the example in the article, the specific rule here is defining a NAT relationship between the entire network inside Internal (with the host being one of the members) and the network outside External. After the wizard is complete and before applying the configuration, make sure that this new network rule must appear before the Internet Access rule.
Configure One-to-One NAT with TMG 2010 Picture 8
Figure 8
Once configured, the traffic generated from the mail.celestix.net host intended for the network outside the External will match rule number 3, in this rule the network relationship is intended to be NAT, the NAT address is The definition is obviously 10.0.0.2
E-NAT and ISP backup
When the -NAT configuration on the TMG firewall is configured to use a backup ISP (ISP-R), address forwarding may work unexpectedly. When configured, E-NAT rules take precedence and override routing decisions created by ISP-R. Be sure to have a careful plan when implementing both of these techniques.