HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

Size: px
Start display at page:

Download "HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls"

Transcription

1 HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Command Reference Part number: Document version: 6PW

2 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this documentation may be reproduced or transmitted in any form or by any means without prior written consent of Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HEWLETT-PACKARD COMPANY MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

3 Contents NAT configuration commands 1 address 1 display nat address-group 1 display nat all 2 display nat bound 4 display nat dns-map 5 display nat server 6 display nat static 7 display nat statistics 9 nat address-group 10 nat dns-map 11 nat outbound 11 nat outbound static 14 nat server 14 nat static 17 nat static net-to-net 18 NAT-PT configuration commands 19 display natpt address-group 19 display natpt address-mapping 19 display natpt all 21 display natpt statistics 22 natpt address-group 23 natpt enable 24 natpt prefix 24 natpt turn-off tos 25 natpt turn-off traffic-class 26 natpt v4bound dynamic 26 natpt v4bound static 27 natpt v4bound static v6server 28 natpt v6bound dynamic 29 natpt v6bound static 29 reset natpt statistics 30 ALG configuration commands 31 alg 31 Support and other resources 33 Contacting HP 33 Subscription service 33 Related information 33 Documents 33 Websites 33 Conventions 34 Index 35 i

4 NAT configuration commands address Default level address start-address end-address undo address start-address end-address Address group view 2: System level start-address: Start IP address of the address group member. end-address: End IP address of the address group member. The end-address must not be lower than the start-address. If they are the same, the group member has only one IP address. Use the address command to add a member that specifies an address pool to the address group. The address pools of group members may not be consecutive. Use the undo address command to remove a group member from the address group. Note that: You cannot add/remove a group member to/from an address group when any IP address of the group member is being used or the address group is associated with an Access Control List (ACL). You can add up to 100 members to an address group. The address pools of group members must not overlap with each other or with other address pools. Related commands: display nat address-group and nat address-group. # Create address group 2 and add two group members to it. Specify addresses through for one member and addresses through for the other. [Sysname] nat address-group 2 [Sysname-nat-address-group-2] address [Sysname-nat-address-group-2] address display nat address-group display nat address-group [ group-number ] [ { begin exclude include } regular-expression ] 1

5 Default level Any view 1: Monitor level group-number: NAT address group number. : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat address-group command to display the NAT address pool information. Related commands: nat address-group. # Display the NAT address pool information. <Sysname> display nat address-group NAT address-group information: There are currently 2 nat address-group(s) 1 : from to : from to # Display the information of NAT address group 1. <Sysname> display nat address-group 1 NAT address-group information: 1 : from to Table 1 Output description Field NAT address-group information There are currently 2 nat address-group(s) 1 : from to NAT address pool information There are currently two NAT address groups. The range of IP addresses in address pool 1 is from to display nat all display nat all [ { begin exclude include } regular-expression ] Any view 2

6 Default level 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat all command to display all NAT configuration information. # Display all NAT configuration information. <Sysname> display nat all NAT address-group information: There are currently 1 nat address-group(s) 1 : from to NAT bound information: There are currently 1 nat bound rule(s) Interface: GigabitEthernet0/1 Direction: outbound ACL: 2009 Address-group: 1 NO-PAT: N NAT server in private network information: There are currently 1 internal server(s) Interface: GigabitEthernet0/2, Protocol: 6(tcp) Global: : 80(www) Local : : 80(www) NAT static information: There are currently 1 NAT static configuration(s) single static: Local-IP : Global-IP : Local-VPN : --- NAT static enabled information: Interface GigabitEthernet0/4 Direction out-static 3

7 Table 2 Output description Field NAT address-group information There are currently 1 nat address-group(s) NAT bound information: NAT server in private network information NAT static information NAT static enabled information NAT address pool information For description on the specific fields, see the display nat address-group command. Configuration information about internal address-to-external address translation. For description on the specific fields, see the display nat bound commands. Internal server information. For description on the specific fields, see the display nat server command. Information about static NAT. For description on the specific fields, see the display nat static command. Information about static NAT entries and interface(s) with static NAT enabled. For description on the specific fields, see the display nat static command. display nat bound Any view Default level display nat bound [ { begin exclude include } regular-expression ] 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat bound command to display the NAT configuration information. Related commands: nat outbound. # Display the NAT configuration information. <Sysname> display nat bound NAT bound information: There are currently 3 nat bound rule(s) Interface:Vlan-interface10 Direction: outbound ACL: 2000 Address-group: 319 NO-PAT: Y 4

8 VPN-instance: vpn1 Out-interface: --- Next-hop: Status: Active Interface:Vlan-interface10 Direction: outbound ACL: 3000 Address-group: 300 NO-PAT: N VPN-instance: vpn2 Out-interface: Vlan-interface200 Next-hop: Status: Inactive Interface:Vlan-interface20 Direction: outbound ACL: 2001 Address-group: --- NO-PAT: N VPN-instance: --- Out-interface: --- Next-hop: --- Status: Inactive Table 3 Output description Field NAT bound information: Interface Direction ACL Address-group NO-PAT VPN-instance Output-interface Next-hop Status Display configured NAT address translation information The interface associated with a NAT address pool. Address translation direction: outbound ACL number Address group number. The field is displayed as null in Easy IP mode. Support for NO-PAT mode or not VPN where the NAT address pool belongs. The field is displayed as --- if it is not configured. The specified outbound interface. The field is displayed as --- if it is not configured. The specified next hop address. The field is displayed as --- if it is not configured. Current status of the configuration, which can be active or inactive. display nat dns-map display nat dns-map [ { begin exclude include } regular-expression ] Any view Default level 1: Monitor level 5

9 : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat dns-map command to display NAT DNS mapping configuration information. Related commands: nat dns-map. # Display NAT DNS mapping configuration information. <Sysname> display nat dns-map NAT DNS mapping information: There are currently 2 NAT DNS mapping(s) Domain-name: Global-IP : Global-port: 80(www) Protocol : 6(tcp) Domain-name: ftp.server.com Global-IP : Global-port: 21(ftp) Protocol : 6(tcp) Table 4 Output description Field NAT DNS mapping information There are currently 2 DNS mapping(s) Domain-name Global-IP Global-port Protocol NAT DNS mapping information There are two DNS mapping entries Domain name of the internal server External IP address of the internal server Public port number of the internal server Protocol type of the internal server display nat server display nat server [ { begin exclude include } regular-expression ] Any view 6

10 Default level 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat server command to display information about internal servers. Related commands: nat server. # Display information about internal servers. <Sysname> display nat server NAT server in private network information: There are currently 2 internal server(s) Interface: Vlan-interface10, Protocol: 6(tcp) Global: : 21(ftp) Local : : 21(ftp) Status: Inactive Interface: Vlan-interface11, Protocol: 6(tcp) Global: : 80(www) Local : : 80(www) Status: Active Table 5 Output description vpn2 Field Server in private network information Interface Protocol Global Local Status Information about internal servers Internal server interface Protocol type External IP address and port number of a server, and the VPN that the external address belongs to. Internal network information of a server Current status of the configuration, which can be active or inactive. display nat static display nat static [ { begin exclude include } regular-expression ] 7

11 Default level Any view 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat static command to display static NAT entries and interface(s) with static NAT enabled. Related commands: nat static and nat outbound static. # Display static NAT entries and interface(s) with static NAT enabled. <Sysname> display nat static NAT static information: There are currently 2 NAT static configuration(s) net-to-net: Local-IP : Global-IP : Netmask : Local-VPN : vpn1 Global-VPN : vpn2 single static: Local-IP : Global-IP : Local-VPN : --- Global-VPN : --- NAT static enabled information: Interface Direction Vlan-interface11 out-static Table 6 Output description Field NAT static information net-to-net single static Local-IP Global-IP Configuration information of static NAT Net-to-net static NAT One-to-one static NAT Internal IP address External IP address 8

12 Field Netmask Local-VPN Global-VPN Network mask L3VPN that the internal IP address belongs to L3VPN that the external IP address belongs to display nat statistics Default level display nat statistics [ { begin exclude include } regular-expression ] Any view 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays all lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display nat statistics command to display NAT statistics. # Display NAT statistics. <Sysname> display nat statistics total PAT session table count: 1 total NO-PAT session table count: 0 total SERVER session table count: 0 total STATIC session table count: 0 active PAT session table count: 1 active NO-PAT session table count: 0 Table 7 Output description Field total PAT session table count total NO-PAT session table count total SERVER session table count total STATIC session table count active PAT session table count Number of PAT session entries Number of NO-PAT session entries Number of SERVER session entries Number of STATIC session entries Number of active PAT session entries 9

13 Field active NO-PAT session table count Number of active NO-PAT session entries nat address-group Default level nat address-group group-number [ start-address end-address ] [ level level ] undo nat address-group group-number [ start-address end-address ] [ level level ] System view 2: System level group-number: Index of the address pool. start-address: Start IP address of the address pool. end-address: End IP address of the address pool. The end-address cannot be smaller than the start-address. If they are the same, the address pool has only one IP address. level leve: Address pool level. The value of level is in range of 0 to 1. 0 represents low priority. Use the nat address-group command to configure a NAT address pool. When the start and end IP addresses are specified, this command specifies an address pool. Without the start and end IP addresses specified, the command places you into the address group view. Use the undo nat address-group command to remove an address pool or address group. An address pool consists of a set of consecutive IP addresses. An address group consists of multiple group members, each of which specifies an address pool with the address command. The address pools of group members may not be consecutive. Note that: You cannot remove an address pool or address group that has been associated with an ACL. Different address pools must not overlap. The address pools of group members must not overlap with each other or with other address pools. An address pool or address group is not needed in the case of Easy IP where the interface s public IP address is used as the translated IP address. Related commands: address and display nat address-group. # Configure an address pool numbered 1 that contains addresses to [Sysname] nat address-group # Create address group 2 and add a group member that contains IP addresses through to it. 10

14 [Sysname] nat address-group 2 [Sysname-nat-address-group-2] address nat dns-map nat dns-map domain domain-name protocol pro-type ip global-ip port global-port undo nat dns-map domain domain-name System view Default level 2: System level domain domain-name: Specifies the domain name of an internal server. A domain name is a string containing no more than 255 case-insensitive characters. It consists of several labels separated by dots (.). Each label has no more than 63 characters that must begin and end with letters or digits; besides, dashes (-) can be included. protocol pro-type: Specifies the protocol type used by the internal server, tcp or udp. ip global-ip: Specifies the public IP address used by the internal server to provide services to the external network. port global-port: Specifies the port number used by the internal server to provide services to the external network. The global-port argument is in the range of 1 to Use the nat dns-map command to map the domain name to the public network information of an internal server. Use the undo nat dns-map command to remove a DNS mapping. Related commands: display nat dns-map. # A company provides Web service to external users. The domain name of the internal server is and the public IP address is Configure a DNS mapping, so that internal users can access the Web server using its domain name. [Sysname] nat dns-map domain protocol tcp ip port www nat outbound nat outbound [ acl-number ] [ address-group group-number [ vpn-instance vpn-instance-name ] [ no-pat ] ] [ track vrrp virtual-router-id ] undo nat outbound [ acl-number ] [ address-group group-number [ vpn-instance vpn-instance-name ] [ no-pat ] ] [ track vrrp virtual-router-id ] 11

15 Default level Interface view 2: System level acl-number: ACL number, in the range of 2000 to address-group group-number: Specifies an address pool for NAT. If no address pool is specified, the IP address of the interface will be used as the translated IP address, that is, Easy IP is enabled. vpn-instance vpn-instance-name: Specifies the L3VPN to which the addresses of the address pool belong. The vpn-instance-name argument is a case-sensitive string of 1 to 31 characters. With this option, inter-vpn access through NAT is supported. Without this option, the addresses in the address pool do not belong to any VPN. no-pat: Indicates that no many-to-many NAT is implemented. If this keyword is not configured, many-to-one NAT is implemented using the TCP/UDP port information. track vrrp virtual-router-id: Associates address translation on a specified outbound interface with a VRRP group. The virtual-router-id argument indicates the number of the VRRP group, in the range of 1 to 255. Without this argument specified, no VRRP group is associated. Use the nat outbound command or the nat outbound acl-number command to associate an ACL with the IP address of the interface and enable Easy IP. Use the nat outbound acl-number address-group group-number no-pat command to associate an ACL with an IP address pool for translation of only the IP address and enable many-to-many NAT. Use the nat outbound address-group group-number command or the nat outbound acl-number address-group group-number command to associate an ACL with an IP address pool for translation of both the IP address and port number and enable NAPT. Use the undo nat outbound command to remove an association. If the acl-number argument is specified, a packet matching the associated ACL will be serviced by NAT. If the acl-number argument is not specified, a packet whose source IP address is not the IP address of the outbound interface will be serviced by NAT. Note the following: You can configure multiple associations or use the undo command to remove an association on an interface that serves as the egress of an internal network to the external network. When the undo nat outbound command is executed to remove an association, the NAT entries depending on the association are not deleted; they will be aged out automatically after 5 to 10 minutes. During this period, the involved users cannot access the external network whereas all the other users are not affected. You can also use the reset nat session command to clear all the NAT entries, but NAT service will be terminated and all users will have to reinitiate connections. You can make a proper choice as required. When an ACL rule is not operative, no new NAT session entry depending on the rule can be created. However, existing connections are still available for communication. If a packet matches the specified next hop, the packet will be translated using an IP address in the address pool; if not, the packet will not be translated. 12

16 You can bind an ACL to only one address pool on an interface; an address pool can be bound to multiple ACLs. NAPT cannot translate connections from external hosts to internal hosts. With reverse address translation enabled, after NAT creates an entry for an internal host to access the Internet, NAT can use this entry to perform destination IP address translation for new connections from the Internet to the public IP address of the internal host. If an ACL is associated with the address pool where the public IP address of the internal host resides, the connections must match the ACL; otherwise, they cannot be translated. In stateful failover networking, make sure that you associate each address pool configured on an interface with one VRRP group only; otherwise, the system associates the address pool with the VRRP group having the highest group ID. NOTE: For some devices, the ACL rules referenced by the same interface cannot conflict. That is, the source IP address, destination IP address and VPN instance information in any two ACL rules cannot be the same. For basic ACLs (numbered from 2000 to 2999), if the source IP address and VPN instance information in any two ACL rules are the same, a conflict occurs. # Configure NAT for hosts on subnet /24. The NAT address pool contains addresses through Assume that interface GigabitEthernet 1/0 is connected to the Internet. [Sysname] acl number 2001 [Sysname-acl-basic-2001] rule permit source [Sysname-acl-basic-2001] rule deny [Sysname-acl-basic-2001] quit [Sysname] nat address-group # To also translate TCP/UDP port information, do the following: [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat outbound 2001 address-group 1 # To ignore the TCP/UDP port information in translation, do the following: [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat outbound 2001 address-group 1 no-pat # To use the IP address of the GigabitEthernet 0/1 interface for translation, do the following: [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat outbound 2001 # To enable reverse address translation and use address pool 1, do the following: [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat outbound 2001 address-group 1 no-pat reversible 13

17 nat outbound static Default level nat outbound static [ track vrrp virtual-router-id ] undo nat outbound static [ track vrrp virtual-router-id ] Interface view 2: System level track vrrp virtual-router-id: Associates static NAT with a VRRP group. The virtual-router-id argument indicates the number of the VRRP group, in the range of 1 to 255. Without this option specified, no VRRP group is associated. Use the nat outbound static command to enable static NAT on an interface, making the configured static NAT mappings take effect. Use the undo nat outbound static command to disable static NAT on the interface. Related commands: display nat static. nat server # Configure a one-to-one NAT mapping and enable static NAT on interface GigabitEthernet 0/1. [Sysname] nat static [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat outbound static nat server index protocol pro-type global { global-address global-port1 global-port2 inside local-address1 local-address2 local-port [ vpn-instance local-name ] [ track vrrp virtual-router-id ] current-interface [ global-port ] inside local-address [ local-port ] [ vpn-instance local-name ] [ remote-host host-address ] [ lease-duration lease-time ] [ description string ] } undo nat server index protocol pro-type global { global-address global-port1 global-port2 inside local-address1 local-address2 local-port [ vpn-instance local-name ] [ track vrrp virtual-router-id ] current-interface [ global-port ] inside local-address [ local-port ] [ vpn-instance local-name ] [ remote-host host-address ] [ lease-duration lease-time ] [ description string ] } Interface view Default level 2: System level index: Index of the internal server. 14

18 protocol pro-type: Specifies a protocol type. pro-type supports TCP, UDP, and ICMP. If ICMP is specified, do not specify port number for the internal server. global-address: Public IP address for the internal server. current-interface: Uses the current interface address as the external IP address for the internal server. global-port1, global-port2: Specifies a range of ports that have a one-to-one correspondence with the IP addresses of the internal hosts. Note that global-port2 must be greater than global-port1. local-address1, local-address2: Defines a consecutive range of addresses that have a one-to-one correspondence with the range of ports. Note that local-address2 must be greater than local-address1 and that the number of addresses must match that of the specified ports. local-port: Port number provided by the internal server, in the range of 0 to 65535, excluding FTP port number 20. You can use the service names to represent those well-known port numbers. For example, you can use www to represent port number 80, ftp to represent port number 21, and so on. You can use the keyword any to represent port number 0, which means all types of services are supported. This has the same effect as a static translation between the global-address and local-address. global-port: Global port number for the internal server, in the range of 0 to local-address: Internal IP address of the internal server. vpn-instance local-name: Specifies the L3VPN to which the internal server belongs. The local-name argument is a case-sensitive string of 1 to 31 characters. Without this parameter, the internal server does no belong to any VPN. remote-host host-address: IP address of the remote host accessing the internal server. lease-duration lease-time: Valid time of the service provided by the internal server. The lease-time argument indicates the valid time, in the range of 0 to , in seconds. The value 0 indicates that the service never expires. description string: Detailed information about the internal server. The string argument is a case-insensitive string of 1 to 256 characters. track vrrp virtual-router-id: Associates the internal server with a VRRP group. The virtual-router-id argument indicates the number of the VRRP group to be associated. Without this option specified, no VRRP group is associated. Use the nat server command to define an internal server. Using the address and port defined by the global-address and global-port parameters, external users can access the internal server with an IP address of local-address and a port of local-port. Use the undo nat server command to remove the configuration. Note that: If one of the two arguments global-port and local-port is set to any, the other must also be any or remain undefined. Using this command, you can configure internal servers (such as Web, FTP, Telnet, POP3, and DNS servers) to provide services for external users. An internal server can reside in an internal network or a VPN. 15

19 The number of internal servers that each command can define equals the difference between global-port2 and global-port1. Up to 4096 internal servers can be configured on an interface. The system allows up to 1024 internal server configuration commands. In general, this command is configured on an interface that serves as the egress of an internal network and connects to the external network. The firewall supports using an interface address as the external IP address of an internal server, which is Easy IP. If you specify the current-interface keyword, the internal server uses the current primary IP address of the current interface. If you use interface { interface-type interface-number } to specify an interface, the interface must be an existing loopback interface and the current primary IP address of the loopback interface is used. It is strongly recommended that if an internal server using Easy IP is configured on the current interface, the IP address of this interface should not be configured as the external address of another internal server; vice versa. This is because that the interface address that is referenced by the internal server using Easy IP serves as the external address of the internal server. In stateful failover networking, make sure that you associate the public address of an internal server on an interface with one VRRP group only; otherwise, the system associates the public address with the VRRP group having the highest group ID. Related commands: display nat server. CAUTION: When the protocol type is not udp (with a protocol number of 17) or tcp (with a protocol number of 6), you can configure one-to-one NAT between an internal IP address and an external IP address only, but cannot specify port numbers. # Allow external users to access the internal Web server on the LAN through and the internal FTP server in VPN vrf10 through ftp:// /. Assume that the interface GigabitEthernet 0/1 is connected to the external network. [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat server protocol tcp global inside www [Sysname-GigabitEthernet0/1] quit [Sysname] ip vpn-instance vrf10 [Sysname-vpn-instance] route-distinguisher 100:001 [Sysname-vpn-instance] vpn-target 100:1 export-extcommunity [Sysname-vpn-instance] vpn-target 100:1 import-extcommunity [Sysname-vpn-instance] quit [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat server protocol tcp global inside vpn-instance vrf10 # Allow external hosts to ping the host with an IP address of in VPN vrf10 by using the ping command. [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat server protocol icmp global inside vpn-instance vrf10 16

20 nat static # Allow external hosts to access the Telnet services of internal servers to in VPN vrf10 through the public address of and port numbers from 1001 to As a result, a user can telnet to :1001 to access , telnet to :1002 to access , and so on. [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] nat server protocol tcp global inside telnet vpn-instance vrf10 # Remove the Web server. [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] undo nat server protocol tcp global inside www # Remove the FTP server from VPN vrf10. [Sysname] interface GigabitEthernet 0/1 [Sysname-GigabitEthernet0/1] undo nat server protocol tcp global inside ftp vpn-instance vrf10 nat static local-ip [ vpn-instance local-name ] global-ip [ vpn-instance global-name ] undo nat static local-ip [ vpn-instance local-name ] global-ip [ vpn-instance global-name ] System view Default level 2: System level local-ip: Internal IP address. vpn-instance local-name: Specifies the VPN to which the internal IP address belongs. The local-name argument is a case-sensitive string of 1 to 31 characters. Without this option, the internal IP address does not belong to any VPN. global-ip: External IP address. vpn-instance global-name: Specifies the VPN to which the external IP address belongs. The global-name argument is a case-sensitive string of 1 to 31 characters. Without this option, the external IP address does not belong to any VPN. Use the nat static command to configure a one-to-one static NAT mapping. Use the undo nat static command to remove a one-to-one static NAT mapping. Related commands: display nat static. 17

21 # In system view, configure static NAT mapping between internal IP address and external IP address [Sysname] nat static nat static net-to-net nat static net-to-net local-network [ vpn-instance local-name ] global-network [ vpn-instance global-name ] { netmask-length netmask } undo nat static net-to-net local-network [ vpn-instance local-name ] global-network [ vpn-instance global-name ] { netmask-length netmask } System view Default level 2: System level local-start-address local-end-address: Internal network address range, which contains at most 255 IP addresses. local-network: Internal network address. vpn-instance local-name: Specifies the L3VPN to which the internal network belongs. The local-name argument is a case-sensitive string of 1 to 31 characters. Without this option, the internal network does not belong to any VPN. global-network: External network address. vpn-instance global-name: Specifies the VPN to which the external network belongs. The global-name argument is a case-sensitive string of 1 to 31 characters. Without this option, the external network does not belong to any VPN. mask-length: Length of the network mask. mask: Network mask. Use the nat static net-to-net command to configure a net-to-net static NAT mapping. Use the undo nat static net-to-net command to remove a net-to-net static NAT mapping. The IP addresses of the internal network must be on the same network segment according to the mask length of the external network address. Related commands: display nat static. # Configure a bidirectional static NAT mapping between internal network address and external network address [Sysname] nat static net-to-net

22 NAT-PT configuration commands display natpt address-group Default Level display natpt address-group [ { begin exclude include } regular-expression ] Any view 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays the lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display natpt address-group command to display the NAT-PT address pool configuration information. # Display the NAT-PT address pool configuration information. <Sysname> display natpt address-group NATPT IPv4 Address Pool Information: 1 : from to Table 8 Output description Field 1 Address pool number from to Start IP address in an address pool End IP address in an address pool display natpt address-mapping display natpt address-mapping [ { begin exclude include } regular-expression ] Any view 19

23 Default Level 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays the lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display natpt address-mapping command to display the static and dynamic NAT-PT address mappings. The displayed information does not include the information about port translation through the NAPT-PT mechanism. # Display the static and dynamic NAT-PT address mappings. <Sysname> display natpt address-mapping NATPT address mapping(v6bound view): IPv4 Address IPv6 Address Type ::0001 SOURCE ::0002 DESTINATION NATPT V6Server static mapping: IPv4Address IPv6 Address Pro ^ ::0003^ 1270 TCP Table 9 Output description Field NATPT address mapping (v6bound view) IPv4 Address IPv6 Address Type NATPT V6Server static mapping IPv4Address IPv6 Address Pro Static and dynamic IPv4/IPv6 address mapping on the IPv6 side. IPv4 address IPv6 address Type of the mapping, which can be: SOURCE: Mapping created according to the configuration on the IPv6 side DESTINATION: Mapping created according to the configuration on the IPv4 side Displays the NAT-PT mapping of an IPv6 server. IPv4 address and port number Corresponding IPv6 address and port number Protocol type 20

24 display natpt all Default Level display natpt all [ { begin exclude include } regular-expression ] Any view 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays the lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display natpt all command to display all NAT-PT configuration information. # Display all NAT-PT configuration information. <Sysname> display natpt all IPv4 Address Pool Information: 1 : from to Address Mappings (V6toV4): IPv4 Address IPv6 Address Type ::0001 SOURCE ::0002 DESTINATION V6Server static mapping: IPv4Address IPv6 Address Pro ^ ::0003^ 1270 TCP V4toV6 Information: No V4 Access Records Present V6toV4 Information: No V6 Access Records Present Prefix Information: Prefix Interface NextHop 0064:: /96 Statistics: Total Sessions: 0 Expired Sessions: 0 Hits: 0 Misses: 0 Total Fragment Sessions: 0 Expired Fragment Sessions: 0 21

25 Fragment Hits: 0 Fragment Misses: 0 Total Address Mapping: 0 (static: 0 dynamic: 0 ) Total V6Server Mappings: 0 Enabled Interfaces: GigabitEthernet0/1 For the explanations to the information displayed above, see the descriptions of related commands. display natpt statistics Any view Default Level display natpt statistics [ { begin exclude include } regular-expression ] 1: Monitor level : Filters command output by specifying a regular expression. For more information about regular expressions, see Getting Started Guide. begin: Displays the first line that matches the specified regular expression and all lines that follow. exclude: Displays the lines that do not match the specified regular expression. include: Displays all lines that match the specified regular expression. regular-expression: Specifies a regular expression, a case-sensitive string of 1 to 256 characters. Use the display natpt statistics command to display NAT-PT statistics information. The statistics information does not include information about port translation through the NAPT-PT mechanism. Related commands: reset natpt statistics. # Display NAT-PT statistics information. <Sysname> display natpt statistics NATPT Statistics: Total Sessions: 0 Expired Sessions: 0 Hits: 0 Misses: 0 Total Fragment Sessions: 0 Expired Fragment Sessions: 0 Fragment Hits: 0 Fragment Misses: 0 Total Address Mapping: 0 (static: 0 dynamic: 0 ) Total V6Server Mappings: 0 22

26 NATPT Interfaces: GigabitEthernet0/1 Table 10 Output description Field Total Sessions Expired Sessions Hits Misses Total Fragment Sessions Expired Fragment Sessions Fragment Hits Fragment Misses Total Address Mapping Total V6Server Mappings NATPT Interfaces Total number of sessions Number of expired sessions Number of times that a packet matches a NAT-PT session Number of times that a packet matches no NAT-PT sessions Total number of active fragment sessions Number of expired fragment sessions Number of times that a packet fragment matches a NAT-PT fragment session Number of times that a packet fragment matches no NAT-PT fragment sessions Number of static and dynamic mappings Number of V6Server mappings (address/port mappings) NAT-PT enabled interfaces natpt address-group natpt address-group group-number start-ipv4-address end-ipv4-address undo natpt address-group group-number System view Default Level 2: System level group-number: Number of an address pool, in the range of 1 to 32. start-ipv4-address: Start IPv4 address in a pool. end-ipv4-address: End IPv4 address in a pool. Use the natpt address-group command to configure a NAT-PT address pool. Use the undo natpt address-group command to remove the specified NAT-PT address pool. Note that: If start-ipv4-address equals end-ipv4-address, only one address is available in the address pool. The execution of the undo natpt address-group command may affect some dynamic NAT-PT mappings. Currently, a NAT-PT address pool and an IPv4 NAT address pool do not share any address. 23

27 When there is only one address in the NAT-PT address pool, the address applies to only NAPT-PT. When there is more than one address in the NAT-PT address pool, the end ipv4 address is reserved for NAPT-PT. The number of addresses used for dynamic NAT-PT mapping is the number of configured addresses minus 1. Related commands: display natpt address-group. # Configure a NAT-PT address pool. [Sysname] natpt address-group natpt enable natpt enable undo natpt enable Interface view Default Level 2: System level None Use the natpt enable command to enable the NAT-PT feature on an interface. Use the undo natpt enable command to disable the NAT-PT feature on an interface. By default, the NAT-PT feature is disabled on an interface. That is, no NAT-PT is implemented for packets received or sent on the interface. Note that: This command enables both NAT-PT and Address Family Translation (AFT). For more information about AFT, see VPN Configuration Guide. Do not configure NAT-PT and AFT on the same device. # Enable the NAT-PT feature on an interface. [Sysname] interface GigabitEthernet 1/0 [Sysname-GigabitEthernet0/1] natpt enable natpt prefix natpt prefix natpt-prefix [ interface interface-type interface-number [ nexthop ipv4-address ] ] undo natpt prefix natpt-prefix 24

28 Default Level System view 2: System level natpt-prefix: Prefix of an IPv6 address, 96 bits in length. interface interface-type interface-number: Specifies the interface on which NAT-PT is enabled. If the interface is not specified or NAT-PT is not enabled, IPv6 packets are discarded. interface-type interface-number specifies the interface type and number. nexthop ipv4-address: Specifies the IPv4 address of the next hop. This option does not work on the firewall. Use the natpt prefix command to configure a NAT-PT prefix. Use the undo natpt prefix command to remove the configured NAT-PT prefix. Note that: A NAT-PT prefix must be different from the IPv6 address prefix of the receiving interface on the NAT-PT device. Otherwise, NAT-PT translation for a received packet with the prefix will result in packet loss. The execution of the undo natpt prefix command may affect the translation of some mappings. Therefore, use this command with caution. # Configure a NAT-PT prefix in system view. [Sysname] natpt prefix 2001:: natpt turn-off tos natpt turn-off tos undo natpt turn-off tos System view Default Level 2: System level None Use the natpt turn-off tos command to set the ToS field in an IPv4 packet translated from an IPv6 packet to 0. Use the undo natpt turn-off tos command to restore the default. 25

29 By default, the value of the ToS field in an IPv4 packet translated from an IPv6 packet is the same as that of the Traffic Class field in the IPv6 packet. # Set the ToS field in an IPv4 packet translated from an IPv6 packet to 0. [Sysname] natpt turn-off tos natpt turn-off traffic-class natpt turn-off traffic-class undo natpt turn-off traffic-class System view Default Level 2: System level None Use the natpt turn-off traffic-class command to set the Traffic Class field in an IPv6 packet translated from an IPv4 packet to 0. Use the undo natpt turn-off traffic-class command to restore the default. By default, the value of the Traffic Class field in an IPv6 packet translated from an IPv4 packet is the same as that of the ToS field in the IPv4 packet. # Set the Traffic Class field in an IPv6 packet translated from an IPv4 packet to 0. [Sysname] natpt turn-off traffic-class natpt v4bound dynamic natpt v4bound dynamic acl number acl-number prefix natpt-prefix undo natpt v4bound dynamic acl number acl-number System view Default Level 2: System level acl number acl-number: Specifies the IPv4 access control list (ACL) number, in the range of 2000 to

30 prefix natpt-prefix: Specifies the NAT-PT prefix, which is 96 bits in length. Use the natpt v4bound dynamic command to configure a dynamic source address mapping policy for packets from IPv4 hosts to IPv6 hosts by associating an ACL with a NAT-PT prefix. Use the undo natpt v4bound dynamic command to remove the association. For a packet from an IPv4 host to an IPv6 host, if the source IPv4 address matches the specified ACL, the NAT-PT prefix will be added to translate the source IPv4 address into an IPv6 address. CAUTION: The natpt-prefix argument in the natpt v4bound dynamic command must be specified by the natpt prefix command in advance. Related commands: display natpt address-mapping. # Configure a dynamic source address mapping policy for packets from IPv4 hosts to IPv6 hosts in system view. Use ACL 2000 to match IPv4 packets and add the NAT-PT prefix 2001:: to translate the source IPv4 address into an IPv6 address. [Sysname] natpt prefix 2001:: [Sysname] natpt v4bound dynamic acl number 2000 prefix 2001:: natpt v4bound static natpt v4bound static ipv4-address ipv6-address undo natpt v4bound static ipv4-address ipv6-address System view Default Level 2: System level ipv4-address: IPv4 address to be mapped. ipv6-address: IPv6 address to which an IPv4 address is mapped. Use the natpt v4bound static command to configure a static IPv4/IPv6 address mapping on the IPv4 side. Use the undo natpt v4bound static command to remove a static IPv4/IPv6 address mapping on the IPv4 side. The ipv6-address prefix should be contained in the configured NAT-PT prefix. Related commands: display natpt address-mapping. 27

31 # Configure a static mapping between the IPv4 address and the IPv6 address 2001::1 on the IPv4 side in system view. [Sysname] natpt v4bound static ::1 natpt v4bound static v6server natpt v4bound static v6server protocol protocol-type ipv4-address-destination ipv4-port-number ipv6-address-destination ipv6-port-number undo natpt v4bound static v6server protocol protocol-type ipv4-address-destination ipv4-port-number ipv6-address-destination ipv6-port-number System view Default Level 2: System level protocol protocol-type: Specifies the protocol type. The protocol-type argument can be: tcp: Specifies the TCP protocol. udp: Specifies the UDP protocol. ipv4-address-destination: IPv4 address to which an IPv6 address is mapped. ipv4-port-number: IPv4 port number, in the range of 1 to ipv6-address-destination: Destination IPv6 address to be mapped. ipv6-port-number: IPv6 port number, in the range of 1 to Use the natpt v4bound static v6server command to configure a static NAPT-PT mapping for an IPv6 server. Use the undo natpt v4bound static v6server command to remove a static NAPT-PT mapping for an IPv6 server. Related commands: display natpt address-mapping. # In system view, configure a static NAPT-PT mapping for an IPV6 server, in which the protocol type is TCP, the IPv4 address and port number are and 80 respectively, and the IPv6 address and port number are 2001::1 and 80 respectively. [Sysname] natpt v4bound static v6server protocol tcp ::

32 natpt v6bound dynamic Default Level natpt v6bound dynamic { acl6 number acl6-number prefix natpt-prefix } { address-group address-group [ no-pat ] interface interface-type interface-number } undo natpt v6bound dynamic { acl6 number acl6-number prefix natpt-prefix } System view 2: System level acl6 number acl6-number: Specifies the IPv6 ACL number. If the source IPv6 address of a packet sent from an IPv6 network to an IPv4 network matches this IPv6 ACL, the source IPv6 address is translated based on the command. The IPv6 ACL number ranges 2000 to prefix natpt-prefix: Specifies the NAT-PT prefix. If the destination IPv6 address of a packet sent from an IPv6 network to an IPv4 network is in this NAT-PT prefix, the source IPv6 address is translated based on the command. The NAT-PT prefix is 96 bits in length. address-group address-group: Specifies the number of the IPv4 address pool for the translation of the source IPv6 address. The IPv4 address pool number is in the range of 1 to 32. no-pat: Specifies no port address translation. If the no-pat keyword is not provided, port address translation will be performed. interface interface-type interface-number: Specifies the IPv4 address of the interface as the translated source IPv6 address. interface-type interface-number specifies the interface type and number. Use the natpt v6bound dynamic command to configure a dynamic source address mapping policy for packets from IPv6 hosts to IPv4 hosts. Use the undo natpt v6bound dynamic command to remove the dynamic mapping. Related commands: display natpt address-mapping. # Configure a dynamic source address mapping policy for packets from IPv6 hosts to IPv4 hosts in system view. Translate the source address of an IPv6 packet that matches IPv6 ACL 2001 into an IPv4 address in address pool 1. [Sysname] natpt address-group [Sysname] natpt v6bound dynamic acl6 number 2001 address-group 1 natpt v6bound static natpt v6bound static ipv6-address ipv4-address undo natpt v6bound static ipv6-address ipv4-address 29

NAT Configuration. Contents. 1 NAT Configuration. 1.1 NAT Overview. 6 3 2014 NAT Configuration

NAT Configuration. Contents. 1 NAT Configuration. 1.1 NAT Overview. 6 3 2014 NAT Configuration NAT Configuration Contents 1 NAT Configuration 1.1 NAT Overview 1.2 NAT Features Supported by the AR1200 1.3 Configuring NAT 1.3.1 Establishing the Configuration Task 1.3.2 Configuring an Address Pool

More information

Network Address Translation Commands

Network Address Translation Commands Network Address Translation Commands This chapter describes the function and displays the syntax for Network Address Translation (NAT) commands. For more information about defaults and usage guidelines,

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.

More information

HP 5120 SI Switch Series

HP 5120 SI Switch Series HP 5120 SI Switch Series Layer 3 - IP Services Command Reference Part number: 5998-1810 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright 2012 Hewlett-Packard

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract

HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract HP 5820X & 5800 Switch Series Layer 3 - IP Services Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration

More information

Adding an Extended Access List

Adding an Extended Access List CHAPTER 11 This chapter describes how to configure extended access lists (also known as access control lists), and it includes the following topics: Information About Extended Access Lists, page 11-1 Licensing

More information

Implementing Network Address Translation and Port Redirection in epipe

Implementing Network Address Translation and Port Redirection in epipe Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4

More information

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation

Expert Reference Series of White Papers. The Basics of Configuring and Using Cisco Network Address Translation Expert Reference Series of White Papers The Basics of Configuring and Using Cisco Network Address Translation 1-800-COURSES www.globalknowledge.com The Basics of Configuring and Using Cisco Network Address

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Configuring Network Address Translation

Configuring Network Address Translation CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections

More information

Chapter 11 Network Address Translation

Chapter 11 Network Address Translation Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Configuring Network Address Translation

Configuring Network Address Translation 6 Configuring Network Address Translation Contents NAT Services on the ProCurve Secure Router....................... 6-2 Many-to-One NAT for Outbound Traffic........................ 6-2 Using NAT with

More information

IP Filter/Firewall Setup

IP Filter/Firewall Setup IP Filter/Firewall Setup Introduction The IP Filter/Firewall function helps protect your local network against attack from outside. It also provides a method of restricting users on the local network from

More information

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted

More information

NETWORK ADDRESS TRANSLATION. Whitepaper

NETWORK ADDRESS TRANSLATION. Whitepaper NETWORK ADDRESS TRANSLATION Whitepaper Table of Contents Introduction...2 Quick Overview...2 How NAT Works...2 Static NAT...2 Static NAT with Port Address Translation (PAT)...3 Dynamic NAT...3 Dynamic

More information

Evaluation guide. Vyatta Quick Evaluation Guide

Evaluation guide. Vyatta Quick Evaluation Guide VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Network Address Translation (NAT)

Network Address Translation (NAT) CHAPTER 6 Network Address Translation (NAT) 6.1 Introduction NAT (Network Address Translation) is a method of mapping one or more IP addresses and/or service ports into different specified services. It

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Packet Filtering using the ADTRAN OS firewall has two fundamental parts:

Packet Filtering using the ADTRAN OS firewall has two fundamental parts: TECHNICAL SUPPORT NOTE Configuring Access Policies in AOS Introduction Packet filtering is the process of determining the attributes of each packet that passes through a router and deciding to forward

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

ProCurve Switch 1700-8 ProCurve Switch 1700-24

ProCurve Switch 1700-8 ProCurve Switch 1700-24 Management and Configuration Guide ProCurve Switch 1700-8 ProCurve Switch 1700-24 www.procurve.com ProCurve Series 1700 Switch Management and Configuration Guide Copyright 2007 Hewlett-Packard Development

More information

FTP Server Configuration

FTP Server Configuration FTP Server Configuration For HP customers who need to configure an IIS or FileZilla FTP server before using HP Device Manager Technical white paper 2 Copyright 2012 Hewlett-Packard Development Company,

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

HP ProCurve 1800 Switches. Management and Configuration Guide

HP ProCurve 1800 Switches. Management and Configuration Guide HP ProCurve 1800 Switches Management and Configuration Guide July 2009 HP ProCurve 1800 Switches Management and Configuration Guide Copyright 2006, 2009 Hewlett-Packard Development Company, L.P. The information

More information

How To Load Balance On A Libl Card On A S7503E With A Network Switch On A Server On A Network With A Pnet 2.5V2.5 (Vlan) On A Pbnet 2 (Vnet

How To Load Balance On A Libl Card On A S7503E With A Network Switch On A Server On A Network With A Pnet 2.5V2.5 (Vlan) On A Pbnet 2 (Vnet H3C SecBlade LB Card Configuration Examples Keyword: LB Abstract: This document describes the configuration examples for the H3C SecBlade LB service cards in various applications. Acronyms: Acronym Full

More information

HP IMC User Behavior Auditor

HP IMC User Behavior Auditor HP IMC User Behavior Auditor Administrator Guide Abstract This guide describes the User Behavior Auditor (UBA), an add-on service module of the HP Intelligent Management Center. UBA is designed for IMC

More information

Configuring Class Maps and Policy Maps

Configuring Class Maps and Policy Maps CHAPTER 4 Configuring Class Maps and Policy Maps This chapter describes how to configure class maps and policy maps to provide a global level of classification for filtering traffic received by or passing

More information

Configuration Guide. DHCP Server. LAN client

Configuration Guide. DHCP Server. LAN client DHCP Server Configuration Guide 4.0 DHCP Server LAN client LAN client LAN client Copyright 2007, F/X Communications. All Rights Reserved. The use and copying of this product is subject to a license agreement.

More information

HP Service Manager Architecture and Security HP Software-as-a-Service

HP Service Manager Architecture and Security HP Software-as-a-Service HP Service Manager Architecture and Security HP Software-as-a-Service Introduction...2 Architecture...2 Infrastructure Setup...4 Security Setup...4 Customer Infrastructure Requirements...5 Introduction

More information

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 ARP Configuration Commands... 1-1 1.1 ARP Configuration Commands... 1-1 1.1.1 arp static... 1-1 1.1.2 arp timer aging... 1-2 1.1.3 debugging arp packet...

More information

Topic 7 DHCP and NAT. Networking BAsics.

Topic 7 DHCP and NAT. Networking BAsics. Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide

HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide HP Intelligent Management Center v7.1 Virtualization Monitor Administrator Guide Abstract This guide describes the Virtualization Monitor (vmon), an add-on service module of the HP Intelligent Management

More information

H3C MSR Series Routers

H3C MSR Series Routers H3C MSR Series Routers Layer 3 - IP Services Configuration Guide(V7) Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Software version: MSR-CMW710-R0007 Document version: 6W100-20140320 Copyright

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...

More information

HP StorageWorks EVA Hardware Providers quick start guide

HP StorageWorks EVA Hardware Providers quick start guide Windows 2003 HP StorageWorks EVA Hardware Providers quick start guide EVA 4000 EVA 6000 EVA 8000 product version: 3.0 first edition (May 2005) part number: T1634-96051 This guide provides a summary of

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband

More information

Application Note: GateManager Internet requirement and port settings

Application Note: GateManager Internet requirement and port settings Application Note: GateManager Internet requirement and port settings Informational document regards GateManager Internet requirement. Who to read this document: This document is intended for the person

More information

DNS Commands ip dns spoofing

DNS Commands ip dns spoofing DNS Commands ip dns spoofing ip dns spoofing To enable Domain Name System (DNS) spoofing, use the ip dns spoofing command in global configuration mode. To disable DNS spoofing, use the no form of this

More information

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.

Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC. VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

Concepts & Examples ScreenOS Reference Guide

Concepts & Examples ScreenOS Reference Guide Concepts & Examples ScreenOS Reference Guide Address Translation Release 6.3.0, Rev. 02 Published: 2012-12-10 Revision 02 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA

More information

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software

More information

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005

More information

Configuring T1 and E1 WAN Interfaces

Configuring T1 and E1 WAN Interfaces Configuration Guide 5991-3823 December 2005 Configuring T1 and E1 WAN Interfaces This configuration guide explains the processes for configuring your Secure Router Operating System (SROS) T1/E1 product

More information

Configuring a Backup Path Test Using Network Monitoring

Configuring a Backup Path Test Using Network Monitoring 6AOSCG0006-29B February 2011 Configuration Guide Configuring a Backup Path Test Using Network Monitoring This configuration guide describes how to configure a demand routing test call to test the availability

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 4 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup 1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007

Wireless Edge Services xl Module 2.0 Update NPI Technical Training June 2007 ProCurve Wireless Edge Services xl Module v.2 Software NPI Technical Training NPI Technical Training Version: 1.5 12 June 2007 2007 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

Firewall Firewall August, 2003

Firewall Firewall August, 2003 Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also

More information

Table of Contents 1 IP Addressing Configuration 1-1

Table of Contents 1 IP Addressing Configuration 1-1 Table of Contents 1 IP Addressing Configuration 1-1 IP Addressing Overview 1-1 IP Address Classes 1-1 Special IP Addresses 1-2 Subnetting and Masking 1-2 Configuring IP Addresses 1-3 Assigning an IP Address

More information

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Understanding and Configuring NAT Tech Note PAN-OS 4.1 Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Starting a Management Session

Starting a Management Session Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007

More information

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3 Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to

More information

Introduction to Network Address Translation

Introduction to Network Address Translation 1 Introduction to Network Address Translation Session 2 Agenda Basic Concept of Network Address Translation (NAT) and PAT Definition, Benefits, Availability and Application Support NAT Concepts and Terminology

More information

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products

More information

Configuring IP Load Sharing in AOS Quick Configuration Guide

Configuring IP Load Sharing in AOS Quick Configuration Guide Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used

More information

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Internet Protocol: IP packet headers. vendredi 18 octobre 13 Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)

More information

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

This Technical Support Note shows the different options available in the Firewall menu of the ADTRAN OS Web GUI.

This Technical Support Note shows the different options available in the Firewall menu of the ADTRAN OS Web GUI. TECHNICAL SUPPORT NOTE Introduction to the Firewall Menu in the Web GUI Featuring ADTRAN OS and the Web GUI Introduction This Technical Support Note shows the different options available in the Firewall

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Router - Network Address Translation (NAT)

Router - Network Address Translation (NAT) BCM50 Rls 6.0 Router - Network Address Translation (NAT) Task Based Guide Copyright 2010 Avaya Inc. All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

Networking Security IP packet security

Networking Security IP packet security Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights

More information

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance CHAPTER 5 Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance This chapter describes how to configure the switch ports and VLAN interfaces of the ASA 5505 adaptive

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

Configuring NetFlow Secure Event Logging (NSEL)

Configuring NetFlow Secure Event Logging (NSEL) 75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter

More information

Parallels Plesk Control Panel

Parallels Plesk Control Panel Parallels Plesk Control Panel Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax: +1 (425) 282 6444 Copyright 1999-2008, Parallels,

More information

NAT (Network Address Translation) & PAT (Port Address Translation)

NAT (Network Address Translation) & PAT (Port Address Translation) NAT (Network Address Translation) & PAT (Port Address Translation) First let s define NAT terms: Inside local address The IP address assigned to a host on the inside network. The address is usually not

More information

Cisco Collaboration with Microsoft Interoperability

Cisco Collaboration with Microsoft Interoperability Cisco Collaboration with Microsoft Interoperability Infrastructure Cheatsheet First Published: June 2016 Cisco Expressway X8.8 Cisco Unified Communications Manager 10.x or later Microsoft Lync Server 2010

More information

Release Notes: Version P.1.8 Software. Related Publications. for HP ProCurve 1810G Switches

Release Notes: Version P.1.8 Software. Related Publications. for HP ProCurve 1810G Switches Release Notes: Version P.1.8 Software for HP ProCurve 1810G Switches Release P.1.8 supports the HP ProCurve 1810G-8 (J9449A) and 1810G-24 (J9450A) switches. These release notes include information on the

More information

UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23)

UNCLASSIFIED. BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) BlackBerry Enterprise Server Isolation in a Microsoft Exchange Environment (ITSG-23) March 2007 This page intentionally left blank. March 2007 Foreword The BlackBerry Enterprise Server Isolation in a Microsoft

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

IOS Server Load Balancing

IOS Server Load Balancing IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com

Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 craig@web400.com

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Configuring the Firewall Management Interface

Configuring the Firewall Management Interface Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management

More information

ASA/PIX: Load balancing between two ISP - options

ASA/PIX: Load balancing between two ISP - options ASA/PIX: Load balancing between two ISP - options Is it possible to load balance between two ISP links? on page 1 Does the ASA support PBR (Policy Based Routing)? on page 1 What other options do we have?

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information