Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
Elizabeth, I'm not very good with Cisco, but I wonder if your rule wouldn't simply make internal traffic appear to be coming from the Cisco device. If that is indeed your goal, then you can duplicate that with a SNAT rule in the Astaro:Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
You might need to set up a packet filter rule depending on what you have already. The downside of this solution is that you can no longer see the specific origin of internal traffic with the webservers - everything is with 192.168.0.1.
Having said that, I feel like my suggestion above is a bandaid instead of the "right" solution. I suspect you have DNAT rules for your webservers and that you could create a policy route for internal traffic to the group of servers. The most time-consuming part of that would be creating the group of webservers if they aren't already all on a separate subnet.
Cheers - Bob
I just added an "additional hostname" to the existing internal host definition. For example: map01.internal.<myorg>.com can also be accessed as map.stage.<myorg>.com from behind the Sophos (internal) but is still publicly accessible from the outside via the DNAT and public DNS A record. This won't help you validate your DNAT from inside but provides what is needed for host headers and such. Full NAT would work too but prefer not to use that for something this simple where we don't really care what the actual IP resolves to.