NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title
|
|
|
- Clarence Henderson
- 10 years ago
- Views:
Transcription
1 Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite Shoreway Road Belmont, CA vyatta.com VYATTA 1 (US and Canada)
2 Copyright COPYRIGHT Copyright Vyatta, Inc. All rights reserved. Vyatta reserves the right to make changes to software, hardware, and documentation without notice. For the most recent version of documentation, visit the Vyatta web site at vyatta.com. PROPRIETARY NOTICES Vyatta is a registered trademark of Vyatta, Inc. VMware, VMware ESXi, and VMware Server are trademarks of VMware, Inc. XenServer and XenCenter are trademarks of Citrix Systems, Inc. All other trademarks are the property of their respective owners. ISSUE DATE: February 2010 DOCUMENT REVISION. R6.0 v01 RELEASED WITH: R6.0 Beta PART NO. A
3 iii Table of Contents Quick Reference to Commands v Quick List of Examples vi Preface viii Intended Audience ix Organization of This Guide ix Document Conventions x Advisory Paragraphs x Typographic Conventions x Vyatta Publications xii Chapter 1 NAT Overview What is NAT? Benefits of NAT Types of NAT Source NAT (SNAT) Destination NAT (DNAT) Bidirectional NAT Interaction Between NAT, Routing, Firewall, and DNS Interaction Between NAT and Routing Interaction between NAT and Firewall Interaction between NAT and DNS NAT Rules NAT Rule Type Configuration Filters: Protocols, Source, and Destination The protocols Filter The source Filter Address Conversion: Inside vs. Outside Addresses
4 iv Inside-Address Outside-Address Inbound and Outbound Interfaces Chapter 2 NAT Configuration Examples Source NAT (One-to-One) Source NAT (Many-to-One) Source NAT (Many-to-Many) Source NAT (One-to-Many) Masquerade Destination NAT (One-to-One) Destination NAT (One-to-Many) Bidirectional NAT Mapping Address Ranges Masquerade NAT and VPN The exclude Option Chapter 3 NAT Commands clear nat counters clear nat translations service nat service nat rule <rule-num> service nat rule <rule-num> destination service nat rule <rule-num> exclude service nat rule <rule-num> inbound-interface <interface> service nat rule <rule-num> inside-address service nat rule <rule-num> log <state> service nat rule <rule-num> outbound-interface <interface> service nat rule <rule-num> outside-address service nat rule <rule-num> protocol <protocol> service nat rule <rule-num> source service nat rule <rule-num> type <type> show nat rules show nat statistics show nat translations Glossary of Acronyms
5 v Quick Reference to Commands Use this section to help you quickly locate a command.
6 vi Quick List of Examples Use this list to help you locate examples you d like to try or look at. Example 1-1 Creating a NAT rule Example 1-2 Creating a source NAT (SNAT) rule Example 1-3 Filtering packets by protocol Example 1-4 Filtering packets by source address Example 1-5 Filtering packets by source network address and port Example 1-6 Filtering packets by destination address Example 1-7 Setting an inside IP address Example 1-8 Setting a range of inside addresses Example 1-9 Setting an outside address Example 1-10 Setting a range of outside addresses Example 1-11 Setting the inbound interface Example 1-12 Setting the outbound interface Example 2-12 Single NAT exclusion rule: correct behavior Example 2-13 Multiple NAT exclusion rules: unexpected behavior Example 2-14 Single NAT exclusion rule: correct behavior using the exclude option Example 2-15 Multiple NAT exclusion rules: expected behavior using exclude Example 3-1 Displaying NAT rule information Example 3-2 Displaying NAT translations Example 3-3 Displaying NAT translation detail Example 3-4 Displaying NAT translation for source address Example 3-5 Monitoring source NAT translations Example 3-6 Detailed monitoring of source NAT translations
7 vii
8 viii Preface This guide explains how to deploy Network Address Translation (NAT) on the Vyatta system. It describes the available commands and provides configuration examples. This preface provides information about using this guide. The following topics are covered: Intended Audience Organization of This Guide Document Conventions Vyatta Publications
9 Intended Audience ix Intended Audience This guide is intended for experienced system and network administrators. Depending on the functionality to be used, readers should have specific knowledge in the following areas: Networking and data communications TCP/IP protocols General router configuration Routing protocols Network administration Network security Organization of This Guide This guide has the following aid to help you find the information you are looking for: Quick Reference to Commands Use this section to help you quickly locate a command. Quick List of Examples Use this list to help you locate examples you d like to try or look at. This guide has the following chapters and appendixes: Chapter Description Page Chapter 1: NAT Overview Chapter 2: NAT Configuration Examples Chapter 3: NAT Commands This chapter explains how to set up network address translation (NAT) on the Vyatta system. This chapter provides configuration examples for network address translation (NAT) on the Vyatta system. This chapter describes network address translation (NAT) commands Glossary of Acronyms 70
10 Document Conventions x Document Conventions This guide contains advisory paragraphs and uses typographic conventions. Advisory Paragraphs This guide uses the following advisory paragraphs: Warnings alert you to situations that may pose a threat to personal safety, as in the following example: WARNING Switch off power at the main breaker before attempting to connect the remote cable to the service power at the utility box. Cautions alert you to situations that might cause harm to your system or damage to equipment, or that may affect service, as in the following example: CAUTION Restarting a running system will interrupt service. Notes provide information you might need to avoid problems or configuration errors: NOTE You must create and configure network interfaces before enabling them for routing protocols. Typographic Conventions This document uses the following typographic conventions:
11 Document Conventions xi Monospace bold Monospace bold italics <key> Examples, command-line output, and representations of configuration nodes. Your input: something you type at a command line. Commands, keywords, and file names, when mentioned inline. Objects in the user interface, such as tabs, buttons, screens, and panes. An argument or variable where you supply a value. A key on your keyboard, such as <Enter>. Combinations of keys are joined by plus signs ( + ), as in <Ctrl>+c. [ arg1 arg2] Enumerated options for completing a syntax. An example is [enable disable]. num1 numn arg1..argn arg[ arg...] arg[,arg...] A inclusive range of numbers. An example is , which means 1 through 65535, inclusive. A range of enumerated values. An example is eth0..eth3, which means eth0, eth1, eth2, or eth3. A value that can optionally represent a list of elements (a space-separated list in the first case and a comma-separated list in the second case).
12 Vyatta Publications xii Vyatta Publications More information about the Vyatta system is available in the Vyatta technical library, and on and Full product documentation is provided in the Vyatta technical library. To see what documentation is available for your release, see the Guide to Vyatta Documentation. This guide is posted with every release of Vyatta software and provides a great starting point for finding the information you need.
13 1 Chapter 1: NAT Overview This chapter explains how to set up network address translation (NAT) on the Vyatta system. This chapter presents the following topics: What is NAT? Benefits of NAT Types of NAT Interaction Between NAT, Routing, Firewall, and DNS NAT Rules NAT Rule Type Configuration Filters: Protocols, Source, and Destination Address Conversion: Inside vs. Outside Addresses Inbound and Outbound Interfaces
14 Chapter 1: NAT Overview What is NAT? 2 What is NAT? Network Address Translation (NAT) is a service that modifies address and/or port information within network packets as they pass through a computer or network device. The device performing NAT on the packets can be the source of the packets, the destination of the packets, or an intermediate device on the path between the source and destination devices. Figure 1-1 An example of a device performing Network Address Translation (NAT) External (untrusted) network Internal (trusted) network IP Packet Dest-addr = NAT IP Packet Dest-addr = NAT was originally designed to help conserve the number of IP addresses used by the growing number of devices accessing the Internet, but it also has important applications in network security. The computers on an internal network can use any of the addresses set aside by the Internet Assigned Numbers Authority (IANA) for private addressing (see also RFC 1918). These reserved IP addresses are not in use on the Internet, so an external machine cannot directly route to them. The following addresses are reserved for private use: to (CIDR: /8) to (CIDR: /12) to (CIDR: /16) To this end a NAT-enabled router can hide the IP addresses of an internal network from the external network, by replacing the internal, private IP addresses with public IP addresses that have been provided to it. These public IP addresses are the only addresses that are ever exposed to the external network. The router can manage a pool of multiple public IP addresses, from which it can dynamically choose when performing address replacement. Be aware that, although NAT can minimize the possibility that internal computers make unsafe connections to the external network, it provides no protection to a computer that, for one reason or another, connects to an untrusted machine. Therefore, you should always combine NAT with packet filtering and other features of a complete security policy to fully protect your network.
15 Chapter 1: NAT Overview Benefits of NAT 3 Benefits of NAT NAT confers several advantages: NAT conserves public Internet address space. Any number of hosts within a local network can use private IP addresses, instead of consuming public IP addresses. The addresses of packets that are transmitted from this network to the public Internet are translated to the appropriate public IP address. This means that the same private IP address space can be re-used within any number of private networks, as shown in Reusing private address space Figure 1-2. Figure 1-2 Reusing private address space Internet / / / /8 NAT enhances security. IP addresses within a private (internal) network are hidden from the public (external) network. This makes it more difficult for hackers to initiate an attack on an internal host. However, private network hosts are still vulnerable to attack, and therefore NAT is typically combined with firewall functionality. Figure 1-3 NAT combined with firewall Hacker Secret Workstation ? No Route Routing Table 10.x.x.x not listed Internet External (untrusted ) network Internal (trusted) network
16 Chapter 1: NAT Overview Types of NAT 4 NAT is seamless. Standard client/server network services work without modification through a NAT-enabled device. NAT facilitates network migration from one address space to another. The address space within a NATted private network is independent of the public IP address. This means that the private network can be moved to a new public IP address without changing network configurations within the private network. Likewise, the addressing within the private network can change without affecting the public IP address. NAT simplifies routing. NAT reduces the need to implement more complicated routing schemes within larger local networks. Types of NAT Source NAT (SNAT) There are three main types of NAT: Source NAT. This is also called SNAT. Masquerade NAT is a special type of SNAT. Destination NAT. This is also called DNAT. Bidirectional NAT. When both SNAT and DNAT are configured, the result is bidirectional NAT. Tip: SNAT is performed after routing. SNAT is the most common form of NAT. SNAT changes the source address of the packets passing through the Vyatta system. SNAT is typically used when an internal (private) host needs to initiate a session to an external (public) host; in this case, the NATting device changes the source host s private IP address to some public IP address, as shown in Figure 1-4. In masquerade NAT (a common type of SNAT), the source address of the outgoing packet is replaced with the primary IP address of the outbound interface. The NATting device tracks information about the traffic flow so that traffic from the flow can be correctly forwarded to and from the source host.
17 Chapter 1: NAT Overview Types of NAT 5 Figure 1-4 Source NAT (SNAT) External (untrusted) network Internal (trusted) network Source-addr = Dest-addr = SNAT Source-addr = Dest-addr = Destination NAT (DNAT) Tip: DNAT is performed before routing. While SNAT changes the source address of packets, DNAT changes the destination address of packets passing through the Vyatta system. DNAT is typically used when an external (public) host needs to initiate a session with an internal (private) host; for example, when a subscriber accesses a news service, as shown in Figure 1-5. Figure 1-5 Destination NAT (DNAT) External (untrusted) network Internal (trusted) network Source-addr = Dest-addr = DNAT Source-addr = Dest-addr = Bidirectional NAT Bidirectional NAT is just a scenario where both SNAT and DNAT are configured at the same time. Bidirectional NAT is typically used when internal hosts need to initiate sessions with external hosts AND external hosts need to initiate sessions with internal hosts. Figure 1-6 shows an example of bidirectional NAT.
18 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 6 Figure 1-6 Bidirectional NAT External (untrusted) network Internal (trusted) network SNAT Source-addr = Source-addr = DNAT Dest-addr = Dest-addr = Interaction Between NAT, Routing, Firewall, and DNS One of the most important things to understand when working with NAT is the processing order of the various services that might be configured within the Vyatta system. If processing order is not considered, the results achieved may not be as intended. For example, if you are using DNAT you should take care not to set up the system to route packets based on particular external addresses. This routing method would not have the intended result, because the addresses of external packets would have all been changed to internal addresses by DNAT prior to routing. Figure 1-7 shows the traffic flow relationships between NAT, routing, and firewall within the Vyatta system.
19 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 7 Figure 1-7 Traffic flows through the Vyatta system Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Interaction Between NAT and Routing When considering NAT in relation to routing, it is important to be aware how routing decisions are made with respect to DNAT and SNAT. The scenarios in this section illustrate this point. Tip: DNAT routing decisions are based on converted destination address. Scenario 1a: DNAT Packets Passing Through the Vyatta System In this scenario, packets are originated in Network A and pass through the Vyatta system. Note the following: DNAT operates on the packets prior to the routing decision. This means that routing decisions based on the destination address are made relative to the converted destination address not the original destination address; see Figure 1-8.
20 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 8 Figure 1-8 Pass-through DNAT routing decisions Dest-addr = Dest-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Scenario 1b: DNAT Packets Destined for the Vyatta System The same is true for packets destined for the Vyatta system itself. In this scenario, packets are destined for a process within the Vyatta system. Again, because DNAT operates on the packets prior to the routing decision, routing decisions based on destination address are made on the converted destination address not the original destination address; see Figure 1-9. Figure 1-9 Vyatta system-destined DNAT routing decisions Dest-addr = Dest-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system
21 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 9 Tip: SNAT routing decisions are based on original source address. Scenario 2a: SNAT Packets Passing Through the Vyatta System On the other hand, routing decisions are made prior to SNAT. This means that routing decisions based on source address are made on the original source address not the converted source address; see Figure Figure 1-10 Pass-through SNAT routing decisions Src-addr = Src-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Scenario 2b: SNAT Packets Originating From the Vyatta System In this scenario, packets are originated by a process within the Vyatta system. Again, because routing decisions are made prior to SNAT, routing decisions based on source address are made on the original source address not the converted source address; see Figure 1-11.
22 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 10 Figure 1-11 Vyatta system-originated SNAT routing decisions Src-addr = Src-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Interaction between NAT and Firewall When considering NAT in relation to the firewall, it is important to understand the traffic flow relationship between NAT and firewall. In particular, it is important to keep in mind that firewall name rule sets and firewall modify rule sets are evaluated at different points in the traffic flow. The scenarios in this section illustrate this point. Scenario 1a: DNAT Packets Passing Through the Vyatta System In this scenario, packets are originated in Network A and pass through the Vyatta system. Note the following: For firewall modify rule sets applied to inbound packets on an interface, the firewall rules are applied prior to DNAT (that is, on the original destination address). For firewall name rule sets applied rule sets applied to inbound packets on an interface, the firewall rules are applied after DNAT (that is, on the converted destination address). For both firewall modify and name rule sets applied to outbound packets on an interface, the firewall rules are applied after DNAT (that is, on the converted destination address); see Figure 1-12.
23 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 11 Figure 1-12 Pass-through DNAT firewall decisions Dest-addr = Dest-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Scenario 1b: DNAT Packets Destined for the Vyatta System In this scenario, packets are destined for a process within the Vyatta system. Note that firewall modify rule sets do not apply to locally bound packets on an interface; only firewall name rule sets apply. When firewall name rule sets are applied to locally bound packets on an interface, the firewall rules are applied after DNAT (that is, on the converted destination address); see Figure Figure 1-13 Vyatta system-destined DNAT firewall decisions Dest-addr = Dest-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system
24 Chapter 1: NAT Overview Interaction Between NAT, Routing, Firewall, and DNS 12 Tip: SNAT firewall rules are applied on original source address. Scenario 2a: SNAT Packets Passing Through the Vyatta System Firewall rules are applied prior to SNAT. This means that firewall decisions based on source address are made on the original source address not the converted source address. This order of evaluation is true for both firewall modify and firewall name rule sets, for both inbound and outbound packets; see Figure Figure 1-14 Pass-through SNAT firewall decisions Src-addr = Src-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Scenario 2b: SNAT Packets Originating From the Vyatta System In this scenario, packets are originated by a process within the Vyatta system. Note that, because the session originates from an internal process, only firewall modify applied to out -bound packets are involved. These are applied to the original source address, not the converted address. Firewall name rule sets are not involved.
25 Chapter 1: NAT Overview NAT Rules 13 Figure 1-15 Vyatta system-originated SNAT firewall decisions Src-addr = Src-addr = Network A DNAT Routing Dest = Local? Yes No Firewall (name, in) Firewall (name, out) SNAT Network B Firewall (name, local) Local Process Routing Vyatta system Interaction between NAT and DNS NAT and DNS can be combined in various scenarios involving load balancing. These can include additional load-balancing switches that operate at higher protocol layers (Layers 4 through 7). For example, a large bank may have many web servers with transactions load-balanced across them. In these cases the NAT configuration must be carefully considered to achieve the desired results. Discussion of DNS and load-balancing scenarios is beyond the scope of this chapter. NAT Rules Tip: Leave a gap between NAT rule numbers. NAT is configured as as series of NAT rules. Each rule instructs NAT to perform a network address translation that you require. NAT rules are numbered, and are evaluated in numerical order. Note that once configured, a NAT rule number is its permanent identifier. The number of the NAT rule cannot be changed in the same way that the rule s attributes can be changed. To change the number of a NAT rule, you must delete the rule and re-create it using the new number. For this reason, it makes sense to create your NAT rules leaving space between the numbers. For example, you might initial create your set of NAT rules numbered 10, 20, 30, and 40. This way, if you need to insert a new rule later on, and you want it to execute in a particular sequence, you can insert it between existing rules without having to delete and recreate any other rules.
26 Chapter 1: NAT Overview NAT Rule Type Configuration 14 To create or modify a NAT rule, you use the set command on the service nat configuration node, providing the number that will be the rule identifier; see Example 1-1: Example 1-1 Creating a NAT rule vyatta@vyatta#set service nat rule 10 NAT Rule Type Configuration The Vyatta system allows you to configure a NAT rule type of source (for SNAT), destination (for DNAT), or masquerade (for masquerade SNAT). To implement bidirectional NAT, you define a NAT rule for SNAT and one for DNAT. Example 1-2 defines an SNAT rule 10. Example 1-2 Creating a source NAT (SNAT) rule vyatta@vyatta#set service nat rule 10 type source Filters: Protocols, Source, and Destination Filters control which packets will have the NAT rules applied to them. There are three different filters that can be applied within a NAT rule: protocols, source, and destination. The protocols Filter The protocols option specifies which protocol types the NAT rule will be applied to. Only packets of the specified protocol are NATted. The default is all protocols. Example 1-3 sets Rule 10 to apply to TCP protocol packets. Only TCP packets will have address substitution performed. Example 1-3 Filtering packets by protocol vyatta@vyatta#set service nat rule 10 protocols tcp The source Filter The source option filters packets based on their source address and/or port. Only packets with a source address and port matching that defined in the filter are NATted. (Port information is optional.) If the source filter is not specified, then by default the rule matches packets arriving from any source address and port.
27 Chapter 1: NAT Overview Address Conversion: Inside vs. Outside Addresses 15 Example 1-4 sets Rule 10 to apply to packets with a source address of Example 1-4 Filtering packets by source address vyatta@vyatta#set service nat rule 10 source address Example 1-5 sets Rule 15 to apply to packets with a source network of /24 and port 80. Example 1-5 Filtering packets by source network address and port vyatta@vyatta#set service nat rule 15 source address /24 vyatta@vyatta#set service nat rule 15 source port 80 THE DESTINATION FILTER The destination filter filters packets based on their destination address/port. Only packets with a destination address/port combination matching that defined within the filter are NATted. (Port information is optional.) If the destination filter is not specified, by default the rule will match packets with any destination address or port. Example 1-6 sets Rule 20 to apply to packets with a destination address of Example 1-6 Filtering packets by destination address vyatta@vyatta#set service nat rule 20 destination address In addition to address the other parameter associated with the destination filter is port. Address Conversion: Inside vs. Outside Addresses Inside-Address The inside-address and outside-address specify the address conversions that take place within the NAT rule. They define the information that is substituted into the packet for the original addresses. The inside-address is used with DNAT. The inside-address specifies the address that is substituted for the destination IP address of the incoming packet. Port translation is also available and can be specified as part of the inside-address.
28 Chapter 1: NAT Overview Address Conversion: Inside vs. Outside Addresses 16 Example 1-7 sets Rule 20 to substitute as the destination IP address of inbound packets matching its criteria. Example 1-7 Setting an inside IP address service nat rule 20 inside-address address Example 1-8 sets Rule 25 to substitute addresses through as the range of destination IP addresses for inbound packets that match its criteria. Example 1-8 Setting a range of inside addresses vyatta@vyatta#set service nat rule 25 inside-address Outside-Address The outside-address is used with SNAT. The outside-address specifies the address that is to be substituted for the source IP address of the outgoing packet. Port translation is also available and can be specified as part of the outside-address. Note the following: Outside-address is mandatory for SNAT rules Outside-address must be one of the addresses defined on the outbound interface. Outside address cannot be set for rules of type masquerade. This is because masquerade always uses the primary IP address of the outbound interface. However, outside ports can be set for type masquerade. Example 1-9 sets Rule 10 to substitute as the source IP address of outbound packets matching its criteria. Example 1-9 Setting an outside address vyatta@vyatta#set service nat rule 10 outside-address address Example 1-10 sets Rule 15 to substitute addresses through as the source IP addresses of outbound packets that match its criteria. Example 1-10 Setting a range of outside addresses vyatta@vyatta#set service nat rule 15 outside-address
29 Chapter 1: NAT Overview Inbound and Outbound Interfaces 17 Inbound and Outbound Interfaces For each NAT rule you may specify through which interface packets will enter or exit. Note the following: For destination (DNAT) rules, specify the inbound interface. This is the interface through which inbound traffic first enters the NAT device. For source (SNAT) rules, specify the outbound interface. This is the interface through which outbound traffic exits the NAT device. For masquerade (masquerade SNAT) rules, specify the outbound interface. This is the interface through which outbound traffic exits the NAT device. Example 1-11 sets Rule 20 to listen on interface eth0 for inbound traffic. Example 1-11 Setting the inbound interface service nat rule 20 inbound-interface eth0 Example 1-12 sets Rule 10 to send outbound traffic out through interface eth1. Example 1-12 Setting the outbound interface service nat rule 10 outbound-interface eth1
30 18 Chapter 2: NAT Configuration Examples This chapter provides configuration examples for network address translation (NAT) on the Vyatta system. NOTE Each NAT rule in these examples could be independently deployed on a system. These examples are not intended to be deployed together. For that reason, all rules in the examples are given the same rule number (Rule 10). This chapter presents the following topics: Source NAT (One-to-One) Source NAT (Many-to-One) Source NAT (Many-to-Many) Source NAT (One-to-Many) Masquerade Destination NAT (One-to-One) Destination NAT (One-to-Many) Bidirectional NAT If connections are only initiated from the /24 network then only rule 10 is required. If connections are only initiated from the /24 network then only rule 20 is required.
31 Chapter 2: NAT Configuration Examples Source NAT (One-to-One) 19 The exclude Option Source NAT (One-to-One) Figure 2-1 shows an example of SNAT where a single inside source address is translated to a single outside source address. In this example: An internal news server (NNTP) that needs to connect to an external news server The external news server accepts connections only from known clients. The internal news server does not receive connections from outside the local network. Figure 2-1 Source NAT (one-to-one) eth0 INTERNET Source-addr = Dest-addr = SNAT Source-addr = Dest-addr = To configure NAT in this way, perform the following steps in configuration mode. Example 2-1 Source NAT (one-to-one) Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from address Command vyatta@vyatta# set service nat rule 10 type source vyatta@vyatta# set service nat rule 10 source address
32 Chapter 2: NAT Configuration Examples Source NAT (Many-to-One) 20 Example 2-1 Source NAT (one-to-one) Send traffic out through interface eth0. Use as the source address in outgoing packets. Note that the outside-address must be one of the addresses defined on the outbound interface. Commit the change. set service nat rule 10 outbound-interface eth0 set service nat rule 10 outside-address address commit Show the configuration. show service nat rule 10 outbound-interface eth0 outside-address { address source { address type source Source NAT (Many-to-One) Figure 2-2 shows an example of SNAT where many different inside addresses are dynamically translated to a single outside address. In this example, all hosts on the /24 subnet will show the same source address externally. Figure 2-2 Source NAT (many-to-one) /24 eth0 INTERNET Source-addr = X Dest-addr = SNAT Source-addr = Dest-addr =
33 Chapter 2: NAT Configuration Examples Source NAT (Many-to-Many) 21 To configure NAT in this way, perform the following steps in configuration mode. Example 2-2 Source NAT (many-to-one) Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host on network /24. Send traffic out through interface eth0. Use as the source address in outgoing packets. Note that the outside-address must be one of the addresses defined on the outbound interface. Commit the change. Command set service nat rule 10 type source set service nat rule 10 source address /24 set service nat rule 10 outbound-interface eth0 set service nat rule 10 outside-address address commit Show the configuration. show service nat rule 10 outbound-interface eth0 outside-address { address source { address /24 type source Source NAT (Many-to-Many) In many-to-many translations, a number of private addresses are NATted to a number of public addresses. Figure 2-3 shows a large private address space (/8) NATted to a few external addresses (/28 or /30).
34 Chapter 2: NAT Configuration Examples Source NAT (Many-to-Many) 22 Figure 2-3 Source NAT (many-to-many) / / /16 eth0 INTERNET Source-addr = 10.X.X.X Dest-addr = SNAT Source-addr = Dest-addr = To configure NAT in this way, perform the following steps in configuration mode. Example 2-3 Source NAT (many-to-many) Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host on network /8. Send traffic out through interface eth0. Choose an address in the range through as the source address in outgoing packets. Note that the outside-addresses must be addresses defined on the outbound interface. Commit the change. Command vyatta@vyatta# set service nat rule 10 type source vyatta@vyatta# set service nat rule 10 source address /8 vyatta@vyatta# set service nat rule 10 outbound-interface eth0 vyatta@vyatta# set service nat rule 10 outside-address address vyatta@vyatta# commit
35 Chapter 2: NAT Configuration Examples Source NAT (One-to-Many) 23 Example 2-3 Source NAT (many-to-many) Show the configuration. show service nat rule 10 outbound-interface eth0 outside-address { address source { address /8 type source Source NAT (One-to-Many) This scenario is less common. One application of this scenario might be to test an upstream load-balancing device. In this scenario, a single test source device behind the NAT device appears externally to be multiple devices; see Figure 2-4. Figure 2-4 Source NAT (one-to-many) eth0 INTERNET Source-addr = Dest-addr = SNAT Source-addr = Dest-addr = To configure NAT in this way, perform the following steps in configuration mode. Example 2-4 Source NAT (one-to-many) Step Create Rule 10. Rule 10 is an SNAT rule. Command vyatta@vyatta# set service nat rule 10 type source
36 Chapter 2: NAT Configuration Examples Masquerade 24 Example 2-4 Source NAT (one-to-many) Apply this rule to packets coming from address Send traffic out through interface eth0. Choose an address in the range through as the source address in outgoing packets. Note that the outside-addresses must be addresses defined on the outbound interface. Commit the change. set service nat rule 10 source address set service nat rule 10 outbound-interface eth0 set service nat rule 10 outside-address address commit Show the configuration. show service nat rule 10 outbound-interface eth0 outside-address { address source { address type source Masquerade Masquerade NAT is used in situations where LAN devices are assigned private IPaddressess and reside behind the Vyatta router, which has an outside-facing (that is, Internet-facing) interface with only one public IP address. When masquerade NAT is used, all traffic leaving the private network masquerades such that packets appear to be sourced from the single public IP address. This mechanism works well for providing Internet connectivity to network devices and hosts that are assigned private (RFC 1918) IP addresses, since otherwise packets sourced from those IP addresses cannot traverse the Internet. Masquerade NAT rules consist of a set of match conditions containing: The source network (usually the private IP network assigned to LAN devices) A destination network (usually /0, which is used to represent the Internet or any address) The outbound interface (the Internet-facing interface that is assigned the public IP).
37 Chapter 2: NAT Configuration Examples Masquerade 25 When a packet is matched against the masquerade NAT rule, the source address of the packet is modified before it is forwarded to its destination. In this scenario, a number of hosts need to initiate sessions to external resources, but only one external public IP address is available. This would be the case, for example, if connecting via a serial interface. Figure 2-5 shows an example of masquerade NAT. Figure 2-5 Masquerade /24 eth0 INTERNET Source-addr = X Dest-addr = SNAT Source-addr = Address of eth0 Dest-addr = To configure NAT in this way, perform the following steps in configuration mode. Example 2-5 Masquerade Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host on network /24. Send traffic out through interface eth0. Use the IP address of the outbound interface as the outside address. Commit the change. Command vyatta@vyatta# set service nat rule 10 type masquerade vyatta@vyatta# set service nat rule 10 source address /24 vyatta@vyatta# set service nat rule 10 outbound-interface eth0 vyatta@vyatta# commit
38 Chapter 2: NAT Configuration Examples Destination NAT (One-to-One) 26 Example 2-5 Masquerade Show the configuration. show service nat rule 10 outbound-interface eth0 source { address /24 type masquerade Destination NAT (One-to-One) Destination NAT (DNAT) is used where only inbound traffic is expected. Scenario 1: Packets destined for internal web server For example, DNAT might be used in a scenario where a corporate web server needs to be reachable from external locations but never initiates outbound sessions, as shown in Figure 2-8. Figure 2-6 Destination NAT (sone-to-one) eth0 INTERNET Source-addr = Dest-addr = DNAT Source-addr = Dest-addr = Port = http (i.e. port 80) Protocol = tcp
39 Chapter 2: NAT Configuration Examples Destination NAT (One-to-One) 27 To configure NAT in this way, perform the following steps in configuration mode. Example 2-6 Destination NAT (one-to-one) Step Create Rule 10. Rule 10 is a DNAT rule. Apply this rule to all incoming tcp packets on eth0 bound for address on the HTTP port. Forward traffic to address Commit the change. Command vyatta@vyatta# set service nat rule 10 type destination vyatta@vyatta# set service nat rule 10 inbound-interface eth0 vyatta@vyatta# set service nat rule 10 destination address vyatta@vyatta# set service nat rule 10 protocols tcp vyatta@vyatta# set service nat rule 10 destination port http vyatta@vyatta# set service nat rule 10 inside-address address vyatta@vyatta# commit Show the configuration. vyatta@vyatta# show service nat rule 10 destination { address port http inbound-interface eth0 inside-address { address protocols tcp type destination
40 Chapter 2: NAT Configuration Examples Destination NAT (One-to-One) 28 Scenario 2: Packets destined for internal SSH server In this scenario all traffic destined for the SSH port is passed through to a host containing an SSH server, as shown in Figure 2-7. Figure 2-7 Destination NAT (one-to-one): filtering on port name eth0 INTERNET Source-addr = Dest-addr = DNAT Source-addr = Dest-addr = Port= ssh (i.e. port 22) To configure NAT in this way, perform the following steps in configuration mode. Example 2-7 Destination NAT (one-to-one): filtering port name Step Create Rule 10. Rule 10 is a DNAT rule. Apply this rule to all incoming packets on eth0 bound for the SSH port of address Forward traffic to address Command vyatta@vyatta# set service nat rule 10 type destination vyatta@vyatta# set service nat rule 10 inbound-interface eth0 vyatta@vyatta# set service nat rule 10 protocol tcp vyatta@vyatta# set service nat rule 10 destination port ssh vyatta@vyatta# set service nat rule 10 destination address vyatta@vyatta# set service nat rule 10 inside-address address
41 Chapter 2: NAT Configuration Examples Destination NAT (One-to-Many) 29 Example 2-7 Destination NAT (one-to-one): filtering port name Commit the change. commit Show the configuration. show service nat rule 10 destination { address port ssh inbound-interface eth0 inside-address { address protocols tcp type destination Destination NAT (One-to-Many) Another example where DNAT might be used in a scenario where a corporate web farm is accessed through a single IP address (i.e. a single IP address translated to many IP addresses dynamically), as shown in Figure 2-8. Figure 2-8 Destination NAT (one-to-many) /28 eth0 INTERNET Source-addr = Dest-addr = DNAT Source-addr = Dest-addr =
42 Chapter 2: NAT Configuration Examples Destination NAT (One-to-Many) 30 To configure NAT in this way, perform the following steps in configuration mode. Example 2-8 Destination NAT(one-to-many) Step Create Rule 10. Rule 10 is a DNAT rule. Apply this rule to all incoming packets on eth0 bound for address Forward traffic to addresses in the range to Commit the change. Command vyatta@vyatta# set service nat rule 10 type destination vyatta@vyatta# set service nat rule 10 inbound-interface eth0 vyatta@vyatta# set service nat rule 10 destination address vyatta@vyatta# set service nat rule 10 inside-address address vyatta@vyatta# commit Show the configuration. vyatta@vyatta# show service nat rule 10 destination { address inbound-interface eth0 inside-address { address type destination
43 Chapter 2: NAT Configuration Examples Bidirectional NAT 31 Bidirectional NAT Bidirectional NAT is simply a combination of source and destination NAT. A typical scenario might use SNAT on the outbound traffic of an entire private network, and DNAT for specific internal services (for example, mail or web); see Figure 2-9. Figure 2-9 Bidirectional NAT /24 eth0 INTERNET Source-addr = X Dest-addr = SNAT Source-addr = Dest-addr = Source-addr = Dest-addr = DNAT Source-addr = Dest-addr = To configure NAT in this way, perform the following steps in configuration mode. Example 2-9 Bidirectional NAT Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host in the /24 network. Send traffic through interface eth0. Use as the source address in outgoing packets. Command vyatta@vyatta# set service nat rule 10 type source vyatta@vyatta# set service nat rule 10 source address /24 vyatta@vyatta# set service nat rule 10 outbound-interface eth0 vyatta@vyatta# set service nat rule 10 outside-address address
44 Chapter 2: NAT Configuration Examples Mapping Address Ranges 32 Example 2-9 Bidirectional NAT Create Rule 20. Rule 20 is a DNAT rule. Apply this rule to all incoming packets on eth0 bound for address Forward traffic to address Commit the change. vyatta@vyatta# set service nat rule 20 type destination vyatta@vyatta# set service nat rule 20 inbound-interface eth0 vyatta@vyatta# set service nat rule 20 destination address vyatta@vyatta# set service nat rule 20 inside-address address vyatta@vyatta# commit Show the configuration. vyatta@vyatta# show service nat rule 10 outbound-interface eth0 outside-address { address source { address /24 type source vyatta@vyatta# show service nat rule 20 destination { address inbound-interface eth0 inside-address { address type destination Mapping Address Ranges The Vyatta system supports mapping an entire network of addresses to another network of addresses. For example, you can map the network /24 to /24 would mean maps to , maps to , and so on. The networks must be of the same size; that is, they must have the same network mask.
45 Chapter 2: NAT Configuration Examples Mapping Address Ranges 33 Example 2-10 Mapping address ranges Assuming that connections are expected to be initiated from either network, perform the following steps in configuration mode. Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host in the /24 network. Send traffic through interface eth0. Use x as the source address in outgoing packets. Create Rule 20. Rule 20 is a SNAT rule. Apply this rule to packets coming from any host in the /24 network. Send traffic through interface eth1. Use x as the source address in outgoing packets. Commit the change. Command vyatta@vyatta# set service nat rule 10 type source vyatta@vyatta# set service nat rule 10 source address /24 vyatta@vyatta# set service nat rule 10 outbound-interface eth0 vyatta@vyatta# set service nat rule 10 outside-address address /24 vyatta@vyatta# set service nat rule 20 type source vyatta@vyatta# set service nat rule 20 source address /24 vyatta@vyatta# set service nat rule 20 outbound-interface eth1 vyatta@vyatta# set service nat rule 20 outside-address address /24 vyatta@vyatta# commit
46 Chapter 2: NAT Configuration Examples Masquerade NAT and VPN 34 Example 2-10 Mapping address ranges Show the configuration. show service nat rule 10 outbound-interface eth0 outside-address { address /24 source { address /24 type source vyatta@vyatta# show service nat rule 20 outbound-interface eth1 outside-address { address /24 source { address /24 type source If connections are only initiated from the /24 network then only rule 10 is required. If connections are only initiated from the /24 network then only rule 20 is required. Network mapping works in a similar way with DNAT. Masquerade NAT and VPN When a packet is matched against the masquerade NAT rule, the source address of the packet is modified before it is forwarded to its destination. This means that masquerade NAT rules are applied before the VPN process compares the packets against the VPN configuration. If the source network configured for masquerade NAT is also configured to use a site-to-site VPN connection using the same externally facing interface, the packets will not be recognized by the VPN process (since the source address has been changed) and they will not be placed into the VPN tunnel for transport. To account for this behavior, packets destined for a VPN tunnel must be excluded from being masqueraded by using an exclusion rule (that is, a rule using the negation operator [! ]). This is shown in Figure 2-10.
47 Chapter 2: NAT Configuration Examples Masquerade NAT and VPN 35 Figure 2-10 Masquerade NAT and VPN Remote Web Server (Reachable via default route /0) Local Router Remote Router eth1 eth0 VPN Tunnel eth0 eth / /24 To configure NAT in this way, perform the following steps in configuration mode. Example 2-11 Masquerade NAT configured to bypass a VPN tunnel Step Create Rule 10. Rule 10 is an SNAT rule. Apply this rule to packets coming from any host on network /24. Apply this rule to all packets except those destined for network /24. Send traffic out through interface eth0. Use the IP address of the outbound interface as the outside address. Commit the change. Command vyatta@vyatta# set service nat rule 10 type masquerade vyatta@vyatta# set service nat rule 10 source address /24 vyatta@vyatta# set service nat rule 10 destination address! /24 vyatta@vyatta# set service nat rule 10 outbound-interface eth0 vyatta@vyatta# commit
48 Chapter 2: NAT Configuration Examples Masquerade NAT and VPN 36 Example 2-11 Masquerade NAT configured to bypass a VPN tunnel Show the configuration. vyatta@vyatta# show service nat rule 10 destination { address! /24 outbound-interface eth0 source { address /24 type masquerade Note that you should take extreme care using more than one exclusion rule in combination. NAT rules are evaluated sequentially, and a sequence of exclusion rules may result in unexpected behavior. Consider the NAT rule shown in Example Example 2-12 Single NAT exclusion rule: correct behavior rule 10 { destination { address! /24 outbound-interface eth0 source { address /24 type masquerade This NAT will exclude the /24 network, as expected. On the other hand, consider the set of two NAT rules shown in Example Example 2-13 Multiple NAT exclusion rules: unexpected behavior rule 10 { destination { address! /24 outbound-interface eth0 source { address /24
49 Chapter 2: NAT Configuration Examples The exclude Option 37 type masquerade rule 20 { destination { address! /24 outbound-interface eth0 source { address /24 type masquerade This combination rules will NOT result in the exclusion of networks /24 and /24. As explained above, these NAT rules are evaluated sequentially: when a packet arrives, it is tested against the first rule and if it does not match, it is tested against the second rule, and so on until it matches a rule. In the example, a packet with a destination in /24 does NOT meet the match criteria in rule 10 (which matches all packets with destination NOT in /24). As a result, the packet falls through to rule 20. A packet with a destination in /24 DOES match rule 20 (because it is not in /24), and therefore the packet is NATted, which is not the desired result. Similarly, a packet with a destination in /24 will be matched and NATed by rule 10. The exclude Option Another way to exclude packets from NAT is to use the exclude option, which excludes packets that match a given rule from NAT. Example 2-14 uses exclude to provide the same functionality as that demonstrated in Example Example 2-14 Single NAT exclusion rule: correct behavior using the exclude option rule 10 { destination { address /24 exclude outbound-interface eth0 source { address /24 type masquerade
50 Chapter 2: NAT Configuration Examples The exclude Option 38 rule 20 { outbound-interface eth0 source { address /24 type masquerade Note that an additional rule (rule 20) is required to handle packets that are not excluded. Example 2-15 uses exclude to provide the behavior that was expected, but not achieved, in Example In this example, rule 30 handles packets that are not excluded. Example 2-15 Multiple NAT exclusion rules: expected behavior using exclude rule 10 { destination { address /24 exclude outbound-interface eth0 source { address /24 type masquerade rule 20 { destination { address /24 exclude outbound-interface eth0 source { address /24 type masquerade rule 30 { outbound-interface eth0 source { address /24 type masquerade
51 39 Chapter 3: NAT Commands This chapter describes network address translation (NAT) commands.
52 Chapter 3: NAT Commands 40 This chapter contains the following commands. Configuration Commands service nat service nat rule <rule-num> service nat rule <rule-num> destination service nat rule <rule-num> exclude service nat rule <rule-num> inbound-interface <interface> service nat rule <rule-num> inside-address service nat rule <rule-num> log <state> service nat rule <rule-num> outbound-interface <interface> service nat rule <rule-num> outside-address service nat rule <rule-num> protocol <protocol> service nat rule <rule-num> source service nat rule <rule-num> type <type> Enables NAT on the system. Defines a NAT rule. Specifies the destination address and port to match in a NAT rule. Creates an exclusion rule, excluding the specified packets from being translated. Specifies the interface on which to receive inbound traffic for a destination NAT rule. Defines the inside address for a destination NAT rule. Specifies whether or not matched NAT rules are logged. Specifies the interface on which to transmit outbound traffic for source and masquerade NAT rules. Defines an outside address configuration for a Source NAT (SNAT) rule. Specifies which protocols are to have NAT performed on them. Specifies the source address and port to match in a NAT rule. Sets the type of translation for a NAT rule. Operational Commands clear nat counters clear nat translations show nat rules show nat statistics show nat translations Resets counters for active NAT rules. Clears NAT translation counters. Lists configured NAT rules. Displays statistics for NAT. Displays active NAT translations.
53 Chapter 3: NAT Commands 41 clear nat counters Syntax Command Mode Parameters Default Usage Guidelines Resets counters for active NAT rules. clear nat counters Operational mode. None. None. Use this command to reset counters for NAT translation rules. Counters are reset for all rules.
54 Chapter 3: NAT Commands 42 clear nat translations Clears NAT translation counters. Command Mode Operational mode. Syntax clear nat translations Parameters None. Default None. Usage Guidelines Use this rule to clear counters associated with all NAT translations.
55 Chapter 3: NAT Commands 43 service nat Syntax Enables NAT on the system. Command Mode set service nat delete service nat show service nat Configuration Statement Configuration mode. Parameters service { nat { None. Default None. Usage Guidelines Use this command to enable Network Address Translation (NAT) on the Vyatta system. Use the set form of this command to create and modify NAT configuration. Use the delete form of this command to remove NAT configuration and disable NAT on the system. Use the show form of this command to view NAT configuration.
56 Chapter 3: NAT Commands 44 service nat rule <rule-num> Syntax Defines a NAT rule. Command Mode set service nat rule rule-num delete service nat rule [rule-num] show service nat rule [rule-num] Configuration Statement Configuration mode. Parameters service { nat { rule { rule-num Mandatory. Multi-node. A numeric identifier for the rule. The range is Default None. Usage Guidelines Use this command to specify a NAT rule configuration. NAT rules are executed in numeric order. Note that the identifier of a NAT rule (its number) cannot be changed after configuration. To allow insertion of more rules in the future, choose rule numbers with space between; for example, number your initial rule set 10, 20, 30, 40, and so on. Use the set form of this command to create or modify a NAT rule. Use the delete form of this command to remove a NAT rule. Use the show form of this command to view NAT rule configuration.
57 Chapter 3: NAT Commands 45 service nat rule <rule-num> destination Syntax Specifies the destination address and port to match in a NAT rule. Command Mode set service nat rule rule-num destination [address address port port] delete service nat rule rule-num destination [address port] show service nat rule rule-num destination [address port] Configuration Statement Configuration mode. Parameters service { nat { rule { destination { address text port text rule-num address Mandatory. Multi-node. A numeric identifier for the rule. The range is The destination address to match. The following formats are valid: ip-address: An IPv4 address. ip-address/prefix: An IPv4 network address, where /0 matches any network. ip-address ip-address: A range of contiguous IPv4 addresses; for example, !ip-address: Every IPv4 address EXCEPT the one specified.!ip-address/prefix: Every IPv4 network address EXCEPT the one specified.!ip-address ip-address: All IP addresses EXCEPT those in the specified range.
58 Chapter 3: NAT Commands 46 port The destination port to match. The following formats are valid: port-name: The name of an IP service; for example, http. You can specify any service name in the file etc/services. port-num: A port number. The range is 1 to start end: A range of ports; for example, You can use a combination of these formats in a comma-separated list. You can also negate the entire list by prepending it with an exclamation mark (! ); for example,!22,telnet,http,123, Default None. Usage Guidelines Use this command to specify the destination to match in a NAT rule. Note that you should take care in using more than one exclusion rule (that is, a rule using the negation operation (! ) in combination. NAT rules are evaluated sequentially, and a sequence of exclusion rules could result in unexpected behavior. Use the set form of this command to create a NAT destination. Use the delete form of this command to remove a NAT destination configuration. Use the show form of this command to view NAT destination onfiguration.
59 Chapter 3: NAT Commands 47 service nat rule <rule-num> exclude Syntax Creates an exclusion rule, excluding the specified packets from being translated. Command Mode set service nat rule rule-num exclude delete service nat rule rule-num exclude show service nat rule rule-num Configuration Statement Configuration mode. Parameters service { nat { rule { exclude rule-num Mandatory. Multi-node. A numeric identifier for the rule. The range is Default None. Usage Guidelines Use this command to specify that packets matching this rule are to be excluded from address translation. Exclusion can be used in scenarios where certain types of traffic (for example VPN traffic) should not be translated. Use the set form of this command to specify that packets matching this rule will be excluded from NAT. Use the delete form of this command to remove the configuration Use the show form of this command to view the configuration.
60 Chapter 3: NAT Commands 48 service nat rule <rule-num> inbound-interface <interface> Syntax Specifies the interface on which to receive inbound traffic for a destination NAT rule. Command Mode set service nat rule rule-num inbound-interface interface delete service nat rule rule-num inbound-interface show service nat rule rule-num inbound-interface Configuration Statement Configuration mode. Parameters service { nat { rule { inbound-interface text rule-num interface Mandatory. Multi-node. A numeric identifier for the rule. The range is The inbound Ethernet or serial interface. Destination NAT (DNAT) will be performed on traffic received on this interface. You can specify an individual vif, rather than an entire interface. To do this, refer to the vif using int.vif notation. For example to refer to vif 40 on interface eth0, use eth0.40. Default None. Usage Guidelines Use this command to specify the inbound Ethernet or serial interface at which destination NAT (DNAT) traffic will be received. inbound Ethernet or serial interface. Destination NAT will be performed on traffic received on this interface.
61 Chapter 3: NAT Commands 49 This command can only be used on destination NAT rules (that is, NAT rules with a type of destination). It is not applicable to rules with a type of source or masquerade. Use the set form of this command to specify inbound interface configuration Use the delete form of this command to remove inbound interface configuration. Use the show form of this command to view inbound interface configuration.
62 Chapter 3: NAT Commands 50 service nat rule <rule-num> inside-address Syntax Defines the inside address for a destination NAT rule. Command Mode set service nat rule rule-num inside-address [address address port port] delete service nat rule rule-num inside-address [address address port port] show service nat rule rule-num inside-address [address address port port] Configuration Statement Configuration mode. Parameters service { nat { rule { inside-address { address text port text rule-num address Mandatory. Multi-node. A numeric identifier for the rule. The range is The address, range of addresses, or network address to be used to translate the inside address. The following formats are valid: ipv4-address: Translates to the specified IP address. ipv4-address ipv4-address: Translates to one of the IP addresses in the specified pool of contiguous IP addresses; for example, ipv4net: Translates to the specified network. This is typically used in bidirectional NAT to translate one network of addresses to another.
63 Chapter 3: NAT Commands 51 port The IP port to be used to translate the inside address. The following formats are valid: port-num: Translates to the specified port. The range is 1 to start end: Translates to one of the ports in the specified pool of contiguous ports; for example, Default None. Usage Guidelines Use this command to defines the inside IP address for a destination NAT (DNAT) rule. Defining an inside address is mandatory for destination rules. Inside address is not used with source or masquerade rules. Destination rules ingress from the untrusted to the trusted network. The inside address defines the IP address of the host on the trusted network. This is the address that will be substituted for the original destination IP address on packets sent to the system. Use the set form of this command to create an inside address configuration for a Destination NAT (DNAT) rule. Use the delete form of this command to remove the configuration. Use the show form of this command to view the configuration.
64 Chapter 3: NAT Commands 52 service nat rule <rule-num> log <state> Syntax Specifies whether or not matched NAT rules are logged. Command Mode set service nat rule rule-num log state delete service nat rule rule-num log show service nat rule rule-num log Configuration Statement Configuration mode. Parameters service { nat { rule { log [disable enable] rule-num state Mandatory. Multi-node. A numeric identifier for the rule. The range is Specifies whether or not to create log entries for matched NAT rules. Supported values are as follows: disable: Log entries are not generated for matched rules. enable: Log entries are generated for matched rules. Default Log entries are not generated for matched rules. Usage Guidelines Use this command to specify whether or not log entries are created when a NAT rule is matched. Take care when enabling this feature as it can create very large log files and quickly fill a disk. Use the set form of this command to set the state of NAT logging.
65 Chapter 3: NAT Commands 53 Use the delete form of this command to restore the default NAT logging configuration. Use the show form of this command to view NAT logging configuration.
66 Chapter 3: NAT Commands 54 service nat rule <rule-num> outbound-interface <interface> Syntax Specifies the interface on which to transmit outbound traffic for source and masquerade NAT rules. Command Mode set service nat rule rule-num outbound-interface interface delete service nat rule rule-num outbound-interface show service nat rule rule-num outbound-interface Configuration Statement Configuration mode. Parameters service { nat { rule { outbound-interface text rule-num interface Mandatory. Multi-node. A numeric identifier for the rule. The range is Optional for source rules; mandatory for masquerade rules. Not configurable for destination rules. The outbound Ethernet or serial interface. Source NAT (SNAT) or masquerade will be performed on traffic transmitted from this interface. You can specify an individual vif, rather than an entire interface. To do this, refer to the vif using int.vif notation. For example to refer to vif 40 on interface eth0, use eth0.40. Default None.
67 Chapter 3: NAT Commands 55 Usage Guidelines Use this command to specify the outbound serial or Ethernet interface from which Source NAT (SNAT) or masquerade traffic is to be transmitted. Source NAT (SNAT) or masquerade will be performed on traffic transmitted from this interface. Configuring an outbound interface is optional for source rules and mandatory for masquerade rules. Outbound address cannot be configured for destination rules. Use the set form of this command to specify the outbound interface. Use the delete form of this command to remove outbound interface configuration. Use the show form of this command to view outbound interface configuration.
68 Chapter 3: NAT Commands 56 service nat rule <rule-num> outside-address Syntax Defines an outside address configuration for a Source NAT (SNAT) rule. Command Mode set service nat rule rule-num outside-address [address address port port] delete service nat rule rule-num outside-address [address port] show service nat rule rule-num outside-address [address port] Configuration Statement Configuration mode. Parameters service { nat { rule { outside-address { address text port text rule-num address Mandatory. Multi-node. A numeric identifier for the rule. The range is The address or range of addresses to be used to translate the outside address. The address or addresses chosen must be present on the outbound interface. The following formats are valid: ip-address: Translates to the specified IP address. ip-address ip-address: Translates to one of the IP addresses in the specified pool of contiguous IP addresses; for example, ipv4net: Translates to the specified network. This is typically used in bidirectional NAT to translate one network of addresses to another.
69 Chapter 3: NAT Commands 57 port The IP port to be used to translate the outside address. The following formats are valid: port-num: Translates to the specified port. The range is 1 to start end: Translates to one of the ports in the specified pool of contiguous ports; for example, Default None. Usage Guidelines Use this command to set the outside IP address for a source NAT (SNAT) rule. Setting the outside address is mandatory for source NAT rules. Setting the outside address is not allowed with destination NAT rules or masquerade rules; for masquerade rules, the primary address of the interface is always used. Use the set form of this command to create an outside address configuration for a Source NAT (SNAT) rule. Use the delete form of this command to remove the configuration. Use the show form of this command to view the configuration.
70 Chapter 3: NAT Commands 58 service nat rule <rule-num> protocol <protocol> Syntax Specifies which protocols are to have NAT performed on them. Command Mode set service nat rule rule-num protocol protocol delete service nat rule rule-num protocol show service nat rule rule-num protocol Configuration Statement Configuration mode. Parameters service { nat { rule { protocol text rule-num protocol Mandatory. Multi-node. A numeric identifier for the rule. The range is The protocol(s) on which to perform NAT. Any protocol literals or numbers listed in /etc/protocols can be used. The keywords all (for all protocols) and tcp_udp (for both TCP and UDP protocols) are also supported. Prefixing the protocol name with the exclamation mark character (! ) matches every protocol except the specified protocol. For example,!tcp matches all protocols except TCP. Default None. Usage Guidelines Use this command to specify the protocol(s) on which to perform NAT.
71 Chapter 3: NAT Commands 59 Note that you should take care in using more than one exclusion rule (that is, a rule using the negation operation (! ) in combination. NAT rules are evaluated sequentially, and a sequence of exclusion rules could result in unexpected behavior. Use the set form of this command to specify the protocol(s) on which to perform NAT. Use the delete form of this command to remove the configuration Use the show form of this command to view the configuration.
72 Chapter 3: NAT Commands 60 service nat rule <rule-num> source Syntax Specifies the source address and port to match in a NAT rule. Command Mode set service nat rule rule-num source [address address port port] delete service nat rule rule-num source [address port] show service nat rule rule-num source [address port] Configuration Statement Configuration mode. Parameters service { nat { rule { source { address text port text rule-num address Mandatory. Multi-node. A numeric identifier for the rule. The range is The source address to match. The following formats are valid: ip-address: Matches the specified IP address. ip-address/prefix: A network address, where /0 matches any network. ip-address ip-address: Matches a range of contiguous IP addresses; for example, !ip-address: Matches all IP addresses except the one specified.!ip-address/prefix: Matches all network addresses except the one specified.!ip-address ip-address: Matches all IP addresses except those in the specified range.
73 Chapter 3: NAT Commands 61 port The source port to match. The following formats are valid: port-name: Matches the name of an IP service; for example, http. You can specify any service name in the file etc/services. port-num: Matches a port number. The range is 1 to start end: Matches the specified range of ports; for example, You can use a combination of these formats in a comma-separated list. You can also negate the entire list by prepending it with an exclamation mark (! ); for example,!22,telnet,http,123, Default None. Usage Guidelines Use this command to specify the source to match in a NAT rule. Note that you should take care in using more than one exclusion rule (that is, a rule using the negation operation (! ) in combination. NAT rules are evaluated sequentially, and a sequence of exclusion rules could result in unexpected behavior. Use the set form of this command to create a NAT source. Use the delete form of this command to remove a NAT source. Use the show form of this command to view NAT source configuration.
74 Chapter 3: NAT Commands 62 service nat rule <rule-num> type <type> Syntax Sets the type of translation for a NAT rule. Command Mode set service nat rule rule-num type type delete service nat rule rule-num type show service nat rule rule-num type Configuration Statement Configuration mode. Parameters service { nat { rule { type [source destination masquerade] rule-num type Mandatory. Multi-node. A numeric identifier for the rule. The range is Indicates whether this rule is translating the source IP or the destination IP. Note that this is dependent on the direction of the interface. The supported values are as follows: source: This rule translates the source network address. Typically source rules are applied to outbound packets. destination: This rule translates the destination network address. Typically destination rules are applied to inbound packets. masquerade: This rule is a type of source NAT. It translates the source network address using the outbound router interface IP address as the translated address. Default None.
75 Chapter 3: NAT Commands 63 Usage Guidelines Use this command to specify whether the rule is translating the source or destination IP address. You must create explicit NAT rules for each direction of traffic. For example, if you configure a one-to-one source NAT rule and you want inbound traffic to match the NAT rule, you must explicitly create a matching destination NAT rule. Source rules typically egress from the trusted to the untrusted network. For source NAT rules, the outside address typically defines the IP address that faces the untrusted network. This is the address that is substituted in for the original source IP address in egressing packets. Use the set form of this command to specify whether the rule is translating the source or destination IP address. Use the delete form of this command to remove the configuration Use the show form of this command to view the configuration.
76 Chapter 3: NAT Commands 64 show nat rules Syntax Command Mode Parameters Usage Guidelines Example Lists configured NAT rules. show nat rules Operational mode. None. Use this command to display the NAT rules you have configured. You can use this command for troubleshooting, to confirm whether traffic is matching the NAT rules as expected. Example 3-1 shows sample output for the show nat rules command. In the output for this example, the following abbreviations occur: saddr represents the source address sport represents the source port daddr represents the destination address dport represents the destination port proto represents the protocol intf represents the interface. Note also the following about this example: There is only one interface column (intf). For a source or masquerade NAT rule, this interface refers to the outgoing interface; for a destination NAT rule, this interface is the incoming interface. In the translation column, first two rows report translation information and the third row (if it occurs) reports the conditions required for translation to be performed. In the example, rule 10, which is an SNAT rule, translates source address /24 to /24, leaves the source port at its original value, and translates when (and only when) the destination port is 80 for any destination address.
77 Chapter 3: NAT Commands 65 An X at the front of a rule (as for rule 30 in the example) means that the rule has been excluded. Example 3-1 Displaying NAT rule information vyatta@vyatta:~$ show nat rules Type Codes: SRC - source, DST - destination, MASQ - masquerade X at the front of rule implies rule is excluded rule type intf translation SRC eth2 saddr /24 to /24 proto-tcp sport ANY when daddr ANY, dport DST eth2 daddr /24 to /24 proto-all dport ANY X30 MASQ eth0 saddr ANY to proto-tcp sport ANY to 80 when daddr ANY, dport 8080
78 Chapter 3: NAT Commands 66 show nat statistics Displays statistics for NAT. Syntax show nat statistics Command Mode Operational mode. Parameters None. Usage Guidelines Use this command to display current statistics for NAT.
79 Chapter 3: NAT Commands 67 show nat translations Syntax Command Mode Parameters Displays active NAT translations. show nat translations [destination [address addr detail monitor [detail]] detail monitor source [address addr detail monitor [detail]]] Operational mode. destination destination address addr destination detail destination monitor destination monitor detail detail monitor source source address addr source detail source monitor source monitor detail Provides output of destination NAT translations. Provides output of detination NAT translations for destination address addr. Provides detailed output of destination NAT translations. Provides real-time monitoring of destination NAT translations. Type Ctrl-C to quit. Provides detailed real-time monitoring of destination NAT translations. Type Ctrl-C to quit. Provides detailed output of all NAT translations. Provides real-time monitoring of all NAT translations. Type Ctrl-C to quit. Provides output of source NAT translations. Provides output of source NAT translations for source address addr. Provides detailed output of source NAT translations. Provides real-time monitoring of source NAT translations. Type Ctrl-C to quit. Provides detailed real-time monitoring of source NAT translations. Type Ctrl-C to quit.
80 Chapter 3: NAT Commands 68 Usage Guidelines Use this command to display NAT translation information. Examples Example 3-2 shows sample output for the show nat translations command. Example 3-2 Displaying NAT translations show nat translations Pre-NAT Post-NAT Type Prot Timeout snat tcp snat tcp snat tcp : :5000 dnat tcp Example 3-3 shows sample output for the show nat translations detail command. Example 3-3 Displaying NAT translation detail show nat translations detail Inside src Inside dst Outside src Outside dst : : : :22 tcp: snat: ==> timeout: 103 use: : : : :23 tcp: snat: ==> timeout: use: : : : :23 tcp: snat: ==> timeout: 54 use: : : : :5000 tcp: dnat: :23 ==> :5000 timeout: use: 1 vyatta@vyatta:~$ Example 3-4 shows sample output for the show nat translations source address command. Example 3-4 Displaying NAT translation for source address vyatta@vyatta:~$ show nat translations source address Inside src Inside dst Outside src Outside dst : : : :22 tcp: snat: ==> timeout: 106 use: : : : :23 tcp: snat: ==> timeout: 115 use: 1 vyatta@vyatta:~$ Example 3-5 shows sample output for the show nat translations source monitor command.
81 Chapter 3: NAT Commands 69 Example 3-5 Monitoring source NAT translations show nat translations source monitor Type control-c to quit Pre-NAT Post-NAT Type Prot Timeout Type snat icmp 30 new snat icmp 29 update snat icmp destroy snat icmp 30 new snat icmp 30 update snat icmp destroy snat tcp destroy Example 3-6 shows sample output for the show nat translations source monitor detail command. Example 3-6 Detailed monitoring of source NAT translations show nat translations source monitor detail Type control-c to quit Pre-NAT Post-NAT Type Prot Timeout Type icmp: snat: ==> timeout: 30 type: new icmp: snat: ==> timeout: 30 type: update icmp: snat: ==> type: destroy icmp: snat: ==> timeout: 30 type: new icmp: snat: ==> timeout: 30 type: update icmp: snat: ==> type: destroy
82 70 Glossary of Acronyms ACL ADSL API AS ARP BGP BIOS BPDU CA CHAP CLI DDNS DHCP DLCI DMI DMZ DN DNS DSCP access control list Asymmetric Digital Subscriber Line Application Programming Interface autonomous system Address Resolution Protocol Border Gateway Protocol Basic Input Output System Bridge Protocol Data Unit certificate authority Challenge Handshake Authentication Protocol command-line interface dynamic DNS Dynamic Host Configuration Protocol data-link connection identifier desktop management interface demilitarized zone distinguished name Domain Name System Differentiated Services Code Point
83 71 DSL ebgp EGP ECMP ESP FIB FTP GRE HDLC I/O ICMP IDS IEEE IGP IPS IKE IP IPOA IPsec Digital Subscriber Line external BGP Exterior Gateway Protocol equal-cost multipath Encapsulating Security Payload Forwarding Information Base File Transfer Protocol Generic Routing Encapsulation High-Level Data Link Control Input/Ouput Internet Control Message Protocol Intrusion Detection System Institute of Electrical and Electronics Engineers Interior Gateway Protocol Intrusion Protection System Internet Key Exchange Internet Protocol IP over ATM IP security IPv4 IP Version 4 IPv6 IP Version 6 ISP L2TP LACP LAN LDAP MAC Internet Service Provider Layer 2 Tunneling Protocol Link Aggregation Control Protocol local area network Lightweight Directory Access Protocol medium access control
84 72 MIB MLPPP MRRU MTU NAT ND NIC NTP OSPF Management Information Base multilink PPP maximum received reconstructed unit maximum transmission unit Network Address Translation Neighbor Discovery network interface card Network Time Protocol Open Shortest Path First OSPFv2 OSPF Version 2 OSPFv3 OSPF Version 3 PAM PAP PAT PCI PKI PPP PPPoA PPPoE PPTP PVC QoS RADIUS RIB RIP RIPng Rx Pluggable Authentication Module Password Authentication Protocol Port Address Translation peripheral component interconnect Public Key Infrastructure Point-to-Point Protocol PPP over ATM PPP over Ethernet Point-to-Point Tunneling Protocol permanent virtual circuit quality of service Remote Authentication Dial-In User Service Routing Information Base Routing Information Protocol RIP next generation receive
85 73 SNMP SMTP SONET SSH STP TACACS+ TCP ToS Tx UDP vif VLAN VPN VRRP WAN Simple Network Management Protocol Simple Mail Transfer Protocol Synchronous Optical Network Secure Shell Spanning Tree Protocol Terminal Access Controller Access Control System Plus Transmission Control Protocol Type of Service transmit User Datagram Protocol virtual interface virtual LAN Virtual Private Network Virtual Router Redundancy Protocol wide area network
Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title
Title VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone-Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US
Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.
VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and
Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.
VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and
Firewall REFERENCE GUIDE. VYATTA, INC. Vyatta System. IPv4 Firewall IPv6 Firewall Zone-Based Firewall. Title
Title VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone-Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US
Services. Vyatta System. REFERENCE GUIDE DHCP DHCPv6 DNS Web Caching LLDP VYATTA, INC.
VYATTA, INC. Vyatta System Services REFERENCE GUIDE DHCP DHCPv6 DNS Web Caching LLDP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT
Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.
VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
High Availability. Vyatta System
VYATTA, INC. Vyatta System High Availability REFERENCE GUIDE WAN Load Balancing VRRP Clustering Stateful NAT and Firewall Failover RAID 1 Configuration Synchronization Vyatta Suite 200 1301 Shoreway Road
Security REFERENCE GUIDE. VYATTA, INC. Vyatta System. Intrusion Protection System Traffic Filtering Web Filtering. Title
Title VYATTA, INC. Vyatta System Security REFERENCE GUIDE Intrusion Protection System Traffic Filtering Web Filtering Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888
High Availability. Vyatta System
VYATTA, INC. Vyatta System High Availability REFERENCE GUIDE WAN Load Balancing VRRP Clustering Stateful NAT and Firewall Failover RAID 1 Configuration Synchronization Vyatta Suite 200 1301 Shoreway Road
IP Services REFERENCE GUIDE. VYATTA, INC. Vyatta System SSH. DHCP DNS Web Caching. Title
Title VYATTA, INC. Vyatta System IP Services REFERENCE GUIDE SSH Telnet DHCP DNS Web Caching Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)
OSPF REFERENCE GUIDE. VYATTA, INC. Vyatta System. Title
Title VYATTA, INC. Vyatta System OSPF REFERENCE GUIDE Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005 2010
1:1 NAT in ZeroShell. Requirements. Overview. Network Setup
1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already
MINIMAL SDWN CORE GETTING STARTED GUIDE. User Experience Architecture Overview Installation Minimal Configuration Verification
Anyfi Networks Carrier Wi-Fi System MINIMAL SDWN CORE GETTING STARTED GUIDE User Experience Architecture Overview Installation Minimal Configuration Verification Västergatan 31 B 21121 Malmö Sweden [email protected]
How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release
Hyper V. Vyatta System INSTALLING AND UPGRADING VYATTA, INC.
VYATTA, INC. Vyatta System Hyper V INSTALLING AND UPGRADING Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT Copyright 2005 2012 Vyatta,
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Remote Access API 2.0
VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
HP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.
Configuring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
Implementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004
Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
AS/400e. TCP/IP routing and workload balancing
AS/400e TCP/IP routing and workload balancing AS/400e TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Configuring Network Address Translation
CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Configuring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
Linux firewall. Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users
Linux firewall Need of firewall Single connection between network Allows restricted traffic between networks Denies un authorized users Linux firewall Linux is a open source operating system and any firewall
Networking Security IP packet security
Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation
Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution
Firewalls. Chien-Chung Shen [email protected]
Firewalls Chien-Chung Shen [email protected] The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective
Understanding and Configuring NAT Tech Note PAN-OS 4.1
Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering The ProSafe VPN Firewall 50 provides you with Web content filtering options such as Block Sites and Keyword Blocking. Parents and network administrators
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
A Practical Look at Network Address Translation. A Nokia Horizon Manager White Paper
A Practical Look at Network Address Translation A Nokia Horizon Manager White Paper Part No. WP0018 Rev A Published November 2003 COPYRIGHT 2003 Nokia. All rights reserved. Rights reserved under the copyright
Guardian Digital WebTool Firewall HOWTO. by Pete O Hara
Guardian Digital WebTool Firewall HOWTO by Pete O Hara Guardian Digital WebTool Firewall HOWTO by by Pete O Hara Revision History Revision $Revision: 1.1 $ $Date: 2006/01/03 17:25:17 $ Revised by: pjo
How to configure DNAT in order to publish internal services via Internet
How to configure DNAT in order to publish internal services via Internet How-to guides for configuring VPNs with GateDefender Integra Panda Security wants to ensure you get the most out of GateDefender
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Focus on Security. Keeping the bad guys out
Focus on Security Keeping the bad guys out 3 ICT Security Topics: Day 1: General principles. Day 2: System hardening and integrity. Day 3: Keeping the bad guys out. Day 4: Seeing the invisible; what's
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG5 How-To Guide. Network Address Translation. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG5 How-To Guide Network Address Translation July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent
Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering
Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
ERserver. iseries. TCP/IP routing and workload balancing
ERserver iseries TCP/IP routing and workload balancing ERserver iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 1998, 2001. All rights reserved. US
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
NAT & IP Masquerade. Internet NETWORK ADDRESS TRANSLATION INTRODUCTION. NAT & IP Masquerade Page 1 of 5. Internal PC 192.168.0.25
NAT & IP Masquerade Page 1 of 5 INTRODUCTION Pre-requisites TCP/IP IP Address Space NAT & IP Masquerade Protocol version 4 uses a 32 bit IP address. In theory, a 32 bit address space should provide addresses
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
iseries TCP/IP routing and workload balancing
iseries TCP/IP routing and workload balancing iseries TCP/IP routing and workload balancing Copyright International Business Machines Corporation 2000, 2001. All rights reserved. US Government Users Restricted
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Services. REFERENCE GUIDE DHCP DHCPv6 DNS Flow Monitoring LLDP NHRP sflow TWAMP. VYATTA A BROCADE COMPANY Vyatta System
VYATTA A BROCADE COMPANY Vyatta System Services REFERENCE GUIDE DHCP DHCPv6 DNS Flow Monitoring LLDP NHRP sflow TWAMP Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333
Chapter 4 Firewall Protection and Content Filtering
Chapter 4 Firewall Protection and Content Filtering This chapter describes how to use the content filtering features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to protect your network.
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Linux Routers and Community Networks
Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc [email protected] Universitat Politènica de
Networking TCP/IP routing and workload balancing
System i Networking TCP/IP routing and workload balancing Version 5 Release 4 System i Networking TCP/IP routing and workload balancing Version 5 Release 4 Note Before using this information and the product
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
Network Address Translation (NAT) Good Practice Guideline
Programme NPFIT Document Record ID Key Sub-Prog / Project Infrastructure Security NPFIT-FNT-TO-IG-GPG-0011.06 Prog. Director Chris Wilber Status Approved Owner James Wood Version 2.0 Author Mike Farrell
DEPLOYMENT GUIDE Version 1.4. Configuring IP Address Sharing in a Large Scale Network: DNS64/NAT64
DEPLOYMENT GUIDE Version 1.4 Configuring IP Address Sharing in a Large Scale Network: DNS64/NAT64 Table of Contents Table of Contents Configuring IP address sharing in a large scale network... 1 Product
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
Chapter 4 Customizing Your Network Settings
Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.
Linux Firewalls (Ubuntu IPTables) II
Linux Firewalls (Ubuntu IPTables) II Here we will complete the previous firewall lab by making a bridge on the Ubuntu machine, to make the Ubuntu machine completely control the Internet connection on the
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Configuring a BANDIT Product for Virtual Private Networks
encor! enetworks TM Version A, March 2008 2013 Encore Networks, Inc. All rights reserved. Configuring a BANDIT Product for Virtual Private Networks O ne of the principal features in the BANDIT family of
Elfiq Link Balancer (Link LB) Quick Web Configuration Guide
Elfiq Link Balancer (Link LB) Quick Web Configuration Guide Elfiq Operating System (EOS) - Version 3.5.0 and higher Document Version 2.0 -January 2012 Elfiq Networks (Elfiq Inc.) www.elfiq.com 1. About
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Using Remote Desktop Software with the LAN-Cell
Using Remote Desktop Software with the LAN-Cell Technote LCTN0010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:
UTM Quick Installation Guide
www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated
Packet Filtering using the ADTRAN OS firewall has two fundamental parts:
TECHNICAL SUPPORT NOTE Configuring Access Policies in AOS Introduction Packet filtering is the process of determining the attributes of each packet that passes through a router and deciding to forward
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Application Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
VPNC Interoperability Profile
StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
Configuring Security for SMTP Traffic
4 Configuring Security for SMTP Traffic Securing SMTP traffic Creating a security profile for SMTP traffic Configuring a local traffic SMTP profile Assigning an SMTP security profile to a local traffic
athenahealth Interface Connectivity SSH Implementation Guide
athenahealth Interface Connectivity SSH Implementation Guide 1. OVERVIEW... 2 2. INTERFACE LOGICAL SCHEMATIC... 3 3. INTERFACE PHYSICAL SCHEMATIC... 4 4. SECURE SHELL... 5 5. NETWORK CONFIGURATION... 6
