@_Cyph3r_:
Your post confused me a bit, because outbound nat is not "gateway" based.
Am I correct in assuming that
you have a WAN interface with a public ip
you have a TestLAN interface with a private ip
you want traffic from the TestLAN towards internet to be originating as if it was the Public VIP?
Outbound NAT rule like this should do the trick:
Interface: WAN
Source: subnet(s) behind the TestLAN (eg 192.168.1.0/24)
Translation: your VIP
everything else left on default
Can't comment on the failover, sorry.
Thank you for your answer Cypher.
Here is what i did this far:
VIP - IP alias - This ip is in the same range as the WAN ip.
Outbound NAT rule:
Interface: The interface mentioned above in the VIP conf.
Subnet: TEST_LAN subnet
Translation: The VIP mentioned above
Static Port: No
Did the same for the ISAKMP one (just changed the translation in fact) but Static Port is at Yes.
Firwall rule:
Protocol: any
source: Test_LAN subnet
destination: any
gateway: The gateway of the WAN mentionned above.
So now i can ping 8.8.8.8 or www.google.com but, i can't access http://www.google.com or any other website in a browser from the LAN.
Also tried with another browser, no luck there.
@Derelict: Thank you for your answer Derelict, if i understand well, i just have to configure an outbound NAT rule for each WAN interface on the TEST_LAN and when failover happens, it will just use the one corresponding to the actual WAN ?
Thanks.
EDIT: We tried some other protocols, SSH work.
I tried adding some outbound NAT rules stating that the target ports is 80 and another for 443, didn't work.
Also tried the same two rules with the static port options activated, didn't work either.
It's strange, it seems to fail to map some ports, but 30022 (the modified ssh port we use) worked.