Scenario
This guide covers an Azure and cloud-connected datacentre workflow where internal VMs are published externally through a WatchGuard firewall.
Use this process when you need to:
- Assign a new public/external IP.
- Map that IP to an internal web or application server.
- Allow HTTP/HTTPS or custom application ports.
Prerequisites
- Access to WatchGuard System Manager and Policy Manager.
- Internal VM IP address (or alias) confirmed.
- An available external IP address on the
IP Transit/Interface 1network. - Change window and rollback notes prepared.
Step 1: Add the new external IP
- Open Policy Manager.
- Go to Network > Configuration.
- Confirm Configuration Interfaces is set to Mixed Routing Mode.
- Select IP Transit/Interface 1 and click Configure.
- Open the Secondary tab.
- Add the next available external IP address.
- If the IP already exists, WatchGuard will show an error.
- Click OK, then close the Network Configuration window.
Step 2: Create Dynamic NAT mapping
- Go to Network > NAT.
- Open the Dynamic NAT tab and click Add.
- Configure:
- From: Internal server IP (or alias if already created).
- To: External Interface (
IP Transit).
- Enable Set source IP to and choose the new external IP from Step 1.
- Move the new NAT entry up in the list to the correct section/order.
- Close the NAT window.
Step 3: Create the firewall policy
- Click Add Policy (
+). - Add one of the following:
- HTTP/HTTPS policy, or
- A custom policy for required application ports.
- Name the policy clearly (for example, include app name and external IP).
- Set:
- From:
IPtransit - To: Add SNAT and select the SNAT created above.
- From:
- If SNAT is not listed, add Static NAT manually:
- IP Address or Interface: New external IP from Step 1.
- Host: Internal server IP.
- Save the policy.
- Move the new firewall rule near similar published-service policies.
Validation checks
After creating the NAT and policy:
- Confirm the policy is enabled.
- Confirm NAT/SNAT targets the expected internal VM.
- Test external access to:
http://<external-ip>orhttps://<external-ip>(or app-specific ports).
- Verify traffic logs in WatchGuard to confirm allowed sessions.
Notes and best practices
- Keep a simple naming standard for NAT and policy objects.
- Document external IP to internal server mappings.
- Restrict source access where possible (do not leave broad any-any rules unless required).
- For production systems, validate TLS certificates and application health checks after publishing.