Cisco RV260 series Administration Manual page 93

Vpn routers
Hide thumbs Also See for RV260 series:
Table of Contents

Advertisement

Firewall
Address Object: Configure the VLAN2_subnet to 192.168.2.0/24.
Result: The VLAN traffic from VLAN2 subnet is translated to WAN IP. The other traffic from VLAN2 goes
to routing mode out of WAN (source address will not be translated).
Case 4
You configure the VLAN1 with subnet A and VLAN2 with subnet B. Both subnets are NATed to WAN, with
subnet A to be NATed to a public IP 1 and subnet B to public IP 2.
Topology PC1/PC10 –– LAN[RV260W]WAN –– (Internet) –– PC2
• PC1: 192.168.1.111, in VLAN1
• PC10: 192.168.2.10, in VLAN2.
• RV260W LAN: 192.168.1.1 (VLAN1), 192.168.2.1 (VLAN2)
• RV260W WAN: 172.16.1.1/24
• PC2: 172.16.1.100
Result: PC1 in VLAN1 is translated to WAN_alias 172.16.1.10, and PC10 in VLAN2 is translated to
WAN_alias2 172.16.1.11.
Case 5
General LAN hosts are translated to WAN IP address when accessing the Internet. The OpenVPN client is
translated to another public address when accessing the Internet.
Address Object: Configure the WAN_alias to 172.16.1.10 and the OpenVPN to 10.1.4.0/24.
Result: The PC accesses the Internet server, and the general LAN user is translated to WAN IP 172.16.1.1.
The OpenVPN client (PC2) is translated to 172.16.1.10.
Case 6
Only allow particular Internet hosts to access the LAN side server.
Topology PC1/PC10 –– LAN[RV260W]WAN –– PC2
• PC1: 192.168.1.111/24
• RV260W LAN: 192.168.1.1/24
• RV260W WAN: 172.16.1.1/24, GW 172.16.1.2
• PC2: 172.16.1.110
Address Object: Configure allowed_hosts to 172.16.1.100-110, WAN IP to 172.16.1.1, and PC1 to
192.168.1.111.
Note
Select Any as the "To Interface" to pre-route DNAT. The device forwards the traffic to the right interface
based on the translated destination address. You cannot configure it as specific VLAN interface.
Note
Disable the global NAT on WAN1.
Policy NAT Use Cases
RV260x Administration Guide
85

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents