Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
Elizabeth, I'm not very good with Cisco, but I wonder if your rule wouldn't simply make internal traffic appear to be coming from the Cisco device. If that is indeed your goal, then you can duplicate that with a SNAT rule in the Astaro:Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
You might need to set up a packet filter rule depending on what you have already. The downside of this solution is that you can no longer see the specific origin of internal traffic with the webservers - everything is with 192.168.0.1.
Having said that, I feel like my suggestion above is a bandaid instead of the "right" solution. I suspect you have DNAT rules for your webservers and that you could create a policy route for internal traffic to the group of servers. The most time-consuming part of that would be creating the group of webservers if they aren't already all on a separate subnet.
Cheers - Bob
Elizabeth, I'm not very good with Cisco, but I wonder if your rule wouldn't simply make internal traffic appear to be coming from the Cisco device. If that is indeed your goal, then you can duplicate that with a SNAT rule in the Astaro:Traffic Source: Internal (Network)
Traffic Service: {not sure, 'Web Surfing' or 'HTTP'?}
Traffic Destination: {You might have defined a group or subnet of webservers}
NAT Mode: SNAT
Source: Internal (Address) {or just 192.168.0.1}
Service: {leave this blank!}
You might need to set up a packet filter rule depending on what you have already. The downside of this solution is that you can no longer see the specific origin of internal traffic with the webservers - everything is with 192.168.0.1.
Having said that, I feel like my suggestion above is a bandaid instead of the "right" solution. I suspect you have DNAT rules for your webservers and that you could create a policy route for internal traffic to the group of servers. The most time-consuming part of that would be creating the group of webservers if they aren't already all on a separate subnet.
Cheers - Bob