One-To-One Nat - McAfee SG310 Administration Manual

Utm firewall
Table of Contents

Advertisement

Firewall menu options
NAT
From the Firewall menu, click NAT > Source NAT tab
1
Figure 188 Source NAT example
In the Descriptive Name field, enter DMZ-Outbound-NAT.
2
In the Outgoing Interface list, select Internet (Port B).
3
In the Source Address list, select the DMZ-network definition.
4
In the To Source Address lit, select the Internet-Alias definition.
5
Click Finish. All packets originating from the DMZ network will have their source addresses altered to the
6
IP address defined for "Internet-Alias".

One-to-one NAT

One-to-one NAT creates both a source NAT and destination NAT rule for mapping all services on an internal
private address to an external public address and vice-versa. This form of NAT maps an external public
address to an internal private address.
Figure 189 1 to 1 NAT page — initial view
Creating a one-to-one NAT rule
Use this procedure to create a one-to-one NAT rule. After you add a one-to-one NAT rule, you must
manually create packet filter rules to allow external users access to the internal private address, if required.
For more information, see
When creating a rule, you can either use predefined addresses or services or manually enter an address or
service. To use the predefined definitions added through the Definitions menu, click Show Definitions by
the fields where applicable and select a definition from the list. For more information on
definitions, see Definitions. To manually enter an address or service, click New.
184
McAfee UTM Firewall 4.0.4 Administration Guide
Creating a packet filter
rule.
(Figure
).

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents