version :
Version: VyOS 1.1.8
Description: VyOS 1.1.8 (helium)
Yes I am sure there is no rule further up that exclude private ip from being natted.
Only got few rules for public ip natting.
You may refer below nat source configuration :
sh conf com | grep ânat sourceâ | strip-private
set nat source rule 10 description â20210401 - TEST VPN IPSEC 103b to NL Routerâ
set nat source rule 10 destination address âxxx.xxx.187.83â
set nat source rule 10 log âenableâ
set nat source rule 10 outbound-interface âeth0â
set nat source rule 10 protocol âallâ
set nat source rule 10 translation address âxxx.xxx.4.10â
set nat source rule 11 description âExclude xxx.xxx.4.0/24 from be SNATâ
set nat source rule 11 âexcludeâ
set nat source rule 11 log âenableâ
set nat source rule 11 outbound-interface âeth0â
set nat source rule 11 protocol âallâ
set nat source rule 11 source address âxxx.xxx.4.0/24â
set nat source rule 12 description âExclude xxx.xxx.146.128/29 from be SNATâ
set nat source rule 12 âexcludeâ
set nat source rule 12 log âenableâ
set nat source rule 12 outbound-interface âeth0â
set nat source rule 12 protocol âallâ
set nat source rule 12 source address âxxx.xxx.146.128/29â
set nat source rule 13 description âExclude xxx.xxx.143.120/29 from be SNATâ
set nat source rule 13 âexcludeâ
set nat source rule 13 log âenableâ
set nat source rule 13 outbound-interface âeth0â
set nat source rule 13 protocol âallâ
set nat source rule 13 source address âxxx.xxx.143.120/29â
set nat source rule 9999 destination address â0.0.0.0/0â
set nat source rule 9999 log âdisableâ
set nat source rule 9999 outbound-interface âeth0â
set nat source rule 9999 protocol âallâ
set nat source rule 9999 translation address âmasqueradeâ
I just thought that it might be because of there are more than 100k private ips going out through this router and this huge numbers of ips causing some of it failed to get natted.
So does it means that if the connection is already closed but there are still some re-transmit tcp packet it will not get natted right?
Is this for outbound firewall? like below example?:
set firewall name INSIDE-OUT default-action drop
set firewall name INSIDE-OUT rule 1010 action accept
set firewall name INSIDE-OUT rule 1010 state established enable
set firewall name INSIDE-OUT rule 1010 state related enable
set firewall name INSIDE-OUT rule 1020 action drop
set firewall name INSIDE-OUT rule 1020 state invalid enable