Descriptive Name
This rule is applied to packets that match the critera described by the next four fields.
Outgoing Interface
Source Address
Destination Address
Services
The next field describes how matching packets should be altered.
To Source Address
Note
When adding a rule, you may either use Predefined addresses or services that have
been added under Definitions, or click New to manually enter an address or service.
1-to-1 NAT
This creates both a source NAT and destination NAT rule for mapping all services on an
internal, private address to an external, public address.
Note
After adding a 1-to-1 NAT rule, you must manually create packet filter rules to allow
incoming packets on the public address.
Click Source NAT. Any rules that have already been defined are displayed, you may
Edit or Disable/Enable these rules by clicking the appropriate icon. Click New to add a
new rule.
Firewall
An arbitrary name for this rule
The interface that the packet to masquerade behind,
typically Internet
The address from which the request originated,
typically be a private address on the LAN or DMZ
The destination address of the request
The destination service port or ports of the request
The address to replace the Source Address, this is
typically a public address of the CyberGuard SG
appliance, i.e. Internet or Outgoing Interface
Address
144
Need help?
Do you have a question about the SG300 and is the answer not in the manual?
Questions and answers