Join the Conversation

To sign in, use your existing MySonicWall account. To create a free MySonicWall account click "Register".

source mac address override: how to on TZ670

In the SonicOS 7 Rules and Policies manual is stated:


About Source MAC Address Override

An internal option has been added that allows you to replace the source MAC address of an outbound or port-forwarded packet with the MAC address specified in a NAT policy. By default, without this option, the MAC address of the output interface is used as the source MAC address of the packet.

This feature is also disabled by default, but can be enabled using an internal setting. Contact SonicWall Technical Support for information about internal settings.


How can I enable this internal feature?

One of our customers want to see the MAC address of the NATted device behind the TZ (LAN side) when checking the NATted IP address (WAN side).

Thank you.

Category: Firewall Management and Analytics

Best Answers

    BWCBWC Cybersecurity Overlord ✭✭✭
    Answer ✓

    @BasM did you enabled the Option "Enable NAT option to override MAC address" in your internal settings?


    I never used that option, but publishing the MAC address of an internal device to the WAN port sounds strange to me. Wouldn't that require that the Firewall is accepting traffic for this MAC on WAN and how does this not mess up things with ARP on LAN etc?


    BasMBasM Newbie ✭
    Answer ✓

    Hi Michael,

    Thanks for your reply.

    I think you have a valid point... probably better to use Static ARP entries to publish the MAC addresses of the NATted devices on the WAN side.

    Thanks again,


Sign In or Register to comment.