I have an interesting question: Has anyone ever had to implement a manual hide NAT rule to hide behind the leaving firewall interface?
I just tried it using a the firewall cluster object as the translated NAT source, but it always uses the external address of the firewall as the NATted source. even if the connection goes to a DMZ, which makes the connection in this case non-routable.
So, to make a long story short, I have a requirement to NAT a connection the the management interface of an east-west firewall (firewall A). The access to the management network is through another firewall cluster (firewall B). In general, I do not want to NAT internal connections to my management network, only just to firewall A, and that is solely to make the connection route correctly, as the default route for firewall A is through one of the east-west connections. So, I tried to make a manual hide NAT rule in firewall B that would source NAT connections destined for firewall A's management interface behind Firewall B's management interface. I did this using firewall B's gateway object in the rule. However, as stated, the log of the connection shows the the external address of firewall B as the hide NAT, not the address of firewall B facing the management DMZ.
I can probably get the desired outcome by by defining another object to hide behind with the either a specific unused address in the management net or even the management address of firewall B.
I'm curious if anyone else has ever had a similar need to create a manual hide NAT rule similar to how the automatic hide NATs work, where the connection gets NATted to the firewall interface by which it it leaves. How would you resolve this?
My NAT rule is paraphrased in the attached JPG: