Configuring Nat Mode Gateway - Dell SuperMassive 9800 Getting Started Manual

Supermassive appliances
Table of Contents

Advertisement

SuperMassive_9800_GSG.book Page 36 Tuesday, September 9, 2014 7:32 PM

Configuring NAT Mode Gateway

This section provides an overview of a Dell SonicWALL
SuperMassive 9800 appliance operating as a single network
gateway in NAT mode, which is the default mode for a newly
configured SuperMassive 9800. This section is relevant to
administrators following deployment Scenario A.
Note: No additional configuration is necessary to deploy your
appliance as a single network gateway in Many-to-One
NAT mode.
Overview of NAT Mode
Network Address Translation (NAT) allows private IP addresses
on internal networks to be mapped to at least one public IP
address on the WAN interface of the Dell SonicWALL security
appliance. Outbound traffic from the internal network uses
many-to-one NAT address mappings for their LANs and other
internal networks.
All traffic in SonicOS must go through both an access rule and a
NAT policy, a fundamental part of the NAT Mode architecture.
36
| Configuring NAT Mode Gateway
Dell SonicWALL SuperMassive
SSD
80GB
SSD
80GB
X22
SDHC
B1
B0
ALARM
TEST
SonicWALL SuperMassive 9800
PWR 1
PWR 2
CONSOLE
MGMT
X23
DMZ Zone
The Dell SonicWALL SuperMassive 9800 ships with the internal
DHCP server active on the LAN port. However, if a DHCP
server is already active on your LAN, the Dell SonicWALL
appliance will disable its own DHCP server to prevent conflicts.
As shown in the illustration on this page, ports X1 and X0 are
preconfigured as WAN and LAN, respectively. The remaining
ports (X2-X23) can be configured to meet the needs of your
network. In the example diagram, certain interfaces are
configured for specific zones:
• X1—WAN
• X0—LAN
• X20—DMZ
10GE
1GE
X20
X18
X16
X14
X12
X10
X8
X6
X4
X2
X0
X21
X19
X17
X15
X13
X11
X9
X7
X5
X3
X1
ISP 1
LAN Zone

Advertisement

Table of Contents
loading

Table of Contents