Adding an SNAT Rule
Scenarios
After a public NAT gateway is created, add an SNAT rule, so that servers in a VPC subnet or servers that are connected to a VPC through Direct Connect can access the Internet by sharing an EIP.
One SNAT rule takes effect for only one subnet. If there are multiple subnets in a VPC, create multiple SNAT rules to allow servers in them to share EIPs.
Constraints and Limitations
- Only one SNAT rule can be added for each VPC subnet.
- When you add an SNAT rule in the VPC scenario, the custom CIDR block must be a subset of the NAT gateway's VPC subnets.
- If an SNAT rule is used in the Direct Connect scenario, the custom CIDR block must be a CIDR block of a Direct Connect connection and cannot overlap with the NAT gateway's VPC subnets.
- There is no limit on the number of SNAT rules that can be added on a public NAT gateway.
Prerequisites
A public NAT gateway is available.
Procedure
- Log in to the management console.
- Click Service List in the upper left corner. Under Network, select NAT Gateway.
The Public NAT Gateway page is displayed.
- On the displayed page, click the name of the public NAT gateway on which you need to add an SNAT rule.
- On the SNAT Rules tab, click Add SNAT Rule.
- Configure required parameters. For details, see Table 1.
Table 1 Descriptions of SNAT rule parameters Parameter
Description
Scenario
The scenarios where the SNAT rule is used
Select VPC if your servers in a VPC need to access the Internet.
Select Direct Connect if servers in your on-premises data center need to access the Internet.
CIDR Block
In a VPC scenario, specify a VPC subnet to enable servers in that subnet to access the Internet using the SNAT rule.
In a Direct Connect scenario, specify a CIDR block of your data center to enable your servers to access the Internet using the SNAT rule.
Public IP Address Type
The EIP used for accessing the Internet
You can select an EIP that either has not been bound, has been bound to a DNAT rule of the current public NAT gateway with Port Type set to Specific port, or has been bound to an SNAT rule of the current public NAT gateway.
Monitoring
You can create alarm rules on the Cloud Eye console to monitor your SNAT connections and keep informed of any changes in a timely manner.
Description
Provides supplementary information about the SNAT rule. Enter up to 255 characters. Angle brackets (<>) are not allowed.
- Click OK.
- You can add multiple SNAT rules for a public NAT gateway to suite your service requirements.
- Only one SNAT rule can be added for each VPC subnet.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot