NAT Configuration. Contents. 1 NAT Configuration. 1.1 NAT Overview NAT Configuration

Size: px
Start display at page:

Download "NAT Configuration. Contents. 1 NAT Configuration. 1.1 NAT Overview. 6 3 2014 NAT Configuration"

Transcription

1 NAT Configuration Contents 1 NAT Configuration 1.1 NAT Overview 1.2 NAT Features Supported by the AR Configuring NAT Establishing the Configuration Task Configuring an Address Pool Associating an ACL with an Address Pool Configuring Easy IP Configuring an Internal Server Configuring Static NAT Enabling NAT ALG Configuring NAT Filtering Configuring NAT Mapping Configuring DNS Mapping Configuring Twice NAT Configuring NAT Log Output Checking the Configuration 1.4 Configuration Examples Example for Configuring Static NAT Example for Configuring the NAT Server Example for Configuring Outbound NAT Example for Configuring Twice NAT 1 NAT Configuration Network Address Translation (NAT) translates private addresses into public addresses. It conserves IPv4 addresses and improves network security by shielding the private network topology. NAT Overview NAT enables hosts on a private network to access the public network. NAT Features Supported by the AR1200 The AR1200 supports the following NAT features: static NAT, port address translation (PAT), internal server, NAT Application Level Gateway (ALG), NAT filtering, NAT mapping, Easy IP, twice NAT, and NAT multi-instance. Configuring NAT To implement communication between the private network and the public network through NAT, use Easy IP for a single user and an address pool for multiple users. Configuration Examples This section provides several configuration examples of NAT. Parent topic: Configuration Guide - IP Service 1.1 NAT Overview NAT enables hosts on a private network to access the public network. Private Network Address and Public Network Address A private network address, which is also called a private address, is the IP address of an internal network or host. A public network address, which is also called a public address, is a unique IP address on the Internet. The Internet Assigned Number Authority (IANA) defines the following IP addresses as private addresses: Class A: Class B: Class C: After planning the scale of the intranet, an enterprise chooses the proper private address segment. The private address segments of enterprises can overlap each other. If an intranet does not use the IP address in the defined private address segments, errors may occur during communication with other networks. Principle of NAT As shown in Figure 1, the private address must be translated when a host on a private network accesses the Internet or interworks with the hosts on a public network. Figure 1 Networking of NAT 1/15

2 The private network uses network segment and its public address is The host on the private network accesses the server on the public network in Web mode. The host sends a data packet, and uses port 6084 as the source port and port 80 as the destination port. After the address is translated, the source address/port of the packet is changed to :32814, and the destination address/port remains unchanged. The AR1200 maintains a mapping table between addresses and ports. After the web server responds to the host, the AR1200 translates the destination IP address/port in the returned data packet to :6084. In this way, the host on the private network can access the server on the public network. Parent topic: NAT Configuration NAT Features Supported by the 1.2 AR1200 The AR1200 supports the following NAT features: static NAT, port address translation (PAT), internal server, NAT Application Level Gateway (ALG), NAT filtering, NAT mapping, Easy IP, twice NAT, and NAT multi-instance. Static NAT Static NAT maps a private address to a public address. That is, the number of private addresses is equal to the number of public addresses. Static NAT cannot save public addresses, but can shield the topology of the private network. When a packet is sent from a private network to the public network, static NAT translates the source IP address of the packet to a public address. When the public network returns a response, static NAT translates the destination IP address of the response packet to the private address. PAT Port address translation (PAT), which is also called network address port translation (NAPT), maps a public address to multiple private addresses. Therefore, public addresses are saved. PAT translates source IP addresses of packets from hosts that reside on the private network to a public address. The translated port numbers of these packets are different, and the private addresses can share a public address. A mapping table between private addresses and ports is configured for PAT. Before packets from different private addresses are sent to the public network, the PAT-enabled device replaces the source addresses with the same public address. The source port numbers of the packets, however, are replaced with different port numbers. When the public network returns response packets to private networks, the PAT-enabled device translates the destination IP addresses to private addresses according to the port numbers. Figure 1 shows how PAT translates IP addresses and port numbers. Figure 1 PAT working process Internal Server NAT can shield internal hosts. In applications, users on the public network may need to access the internal hosts. For example, users on the public network need to access a Web server or a file transfer protocol (FTP) server. NAT allows you to flexibly configure IP addresses for internal servers. For example, you can use or even :8080 as the public address of a Web server, and use as the public address of an FTP server. Multiple servers (Web servers for example) can be provided for external user. You can configure an internal server and map the public address and port to the internal server. In this way, hosts on the public network can access the internal server. NAT Mapping The NAT function saves IPv4 addresses and improves network security. NAT implementation of different vendors may be different; therefore, the applications using the simple traversal of UDP through NAT (STUN), traversal using relay NAT (TURN), and Interactive Connectivity Establishment (ICE) technologies may fail to traverse the NAT devices of these vendors. These technologies are commonly used on the SIP proxy. NAT mapping enables these applications to traverse the NAT devices. 2/15

3 NAT Filtering A NAT device filters the traffic from external network to internal network. After a host on the internal network sends an access request to a host on the external network, the host on the external network transmits traffic to the internal host. The NAT device filters the traffic sent to the internal host. Easy IP Easy IP takes the public IP address of the interface as the source address after NAT is performed. In addition, it uses the Access Control List (ACL) to control the private addresses to be translated. NAT ALG Some protocols are sensitive to the NAT function and cannot work correctly without special processing. Packets of these protocols contain the IP address and/or port number in the payload, which affects protocol interaction. The NAT ALG function allows such protocol packets to traverse NAT devices. It replaces the IP address and port number in the payload to implement transparent transmission and relay of protocol packets. The NAT ALG of the AR1200 supports the domain name system (DNS), FTP, Real-Time Streaming Protocol (RTSP) and Session Initiation Protocol (SIP). Twice NAT Basic NAT translates only the source or destination address of packets, whereas twice NAT translates both the source and destination addresses. The twice NAT technology applies to the scenario where IP addresses of hosts on private and public networks overlap. As shown in Figure 2, the IP address of PC1 on the private network is the same as the IP address of PC3 on the public network. If PC2 on the private network sends a packet to PC3, the packet will be forwarded to PC1. Twice NAT translates the overlapping IP address into a unique temporary address (based on basic NAT) according to the mapping between the overlapping address pool and the temporary address pool. In this way, packets can be forwarded correctly. Figure 2 Networking of twice NAT You can configure twice NAT on the AR1200 as follows: 1. Configure basic NAT (many-to-many NAT): Configure an NAT address pool that contains IP addresses to and apply it to the interface connecting to the WAN. 2. Configure the mapping from overlapping addresses to temporary addresses: to The mapping indicates that one overlapping address pool maps one temporary address pool. The translation rules are as follows: Temporary address = Start IP address in the temporary address pool + (Overlapping IP address - Start IP address in the overlapping address pool) Overlapping address = Start IP address in the overlapping address pool + (Temporary IP address - Start IP address in the temporary address pool) When PC2 on the private network accesses PC3 on the public network using the domain name, packets are processed as follows: 1. PC2 sends a DNS request for resolving the domain name of the web server. After the DNS server resolves the DNS request, the AR1200 receives the response packet from the DNS server. The AR1200 resolves the address in the payload of the response packet and detects that the address is an overlapping address (it is in the overlapping address pool). The AR1200 translates the address into the temporary address , and translates the destination address of the response packet using basic NAT. Then the AR1200 sends the packet to PC2. 2. PC2 sends an access request packet with the temporary address corresponding to to access the public network. When the packet reaches the AR1200, the AR1200 translates the source address of the packet using basic NAT and then translates the destination address (temporary address) to the overlapping address The AR1200 sends the packet to the WAN-side outbound interface. The packet is then forwarded to PC3 hop by hop. 4. When the packet sent from PC3 to PC2 reaches the AR1200, the AR1200 checks the source address , which is the overlapping address (it is in the overlapping address pool). The AR1200 translates the source address to the temporary address , and translates the destination address using basic NAT. Then the AR1200 sends it to PC2. Source Address Associated with the VPN Before NAT Is Performed The NAT-enabled AR1200 allows users on private networks to access the public network and allows users in different VPNs to access the public network through the same egress. In addition, users in the VPNs with the same IP address can access the public network. NAT Server Associated with VPNs The NAT-enabled AR1200 supports association between VPNs and NAT server, and allows users on the public network to access hosts in the VPNs. This function is applicable when IP addresses of multiple VPNs overlap. Parent topic: NAT Configuration 1.3 Configuring NAT To implement communication between the private network and the public network through NAT, use Easy IP for a single user and an address pool for multiple users. Establishing the Configuration Task Before configuring NAT, familiarize yourself with the applicable environment, complete the pre-configuration tasks, and obtain the required data. Configuring an Address Pool Configure a NAT address pool when multiple users on the private network need to access the public network. 3/15

4 Associating an ACL with an Address Pool Network administrators can use ACLs to control which users can access public networks using NAT. Configuring Easy IP Easy IP uses an interface IP address as the source address of data packets matching an ACL. Configuring an Internal Server Deploying a server on the private network improves security of the server and prevents attacks from the public network. Users on the private and public networks can access the server. Configuring Static NAT Static NAT maps a private address to a public address. Static NAT does not save public addresses but shields the private network topology. Enabling NAT ALG Errors may occur when NAT translates protocol packets encapsulated in IP data packets. The NAT ALG function ensures that the protocol packets are translated successfully. Configuring NAT Filtering A NAT device filters the traffic from external network to internal network. After an internal host sends an access request to an external host, the external host transmits traffic to the internal host. The NAT device filters the traffic sent to the internal host. Configuring NAT Mapping NAT mapping allows applications using the STUN, TURN, and ICE technologies to traverse the NAT server. Configuring DNS Mapping A private network may deploy different servers such as FTP servers and web servers, but has no DNS server deployed. If hosts on the private network need to differentiate and access servers using domain names, configure DNS mapping. Configuring Twice NAT Twice NAT translates both the source and destination IP addresses of a data packet. It applies to the situation where IP addresses of internal hosts and external hosts overlap. Configuring NAT Log Output The NAT log output function enables the AR1200 to collect and record information about the NAT session table in real time, enhancing network security. According to the NAT logs, you can easily find users that have accessed a network using NAT. Checking the Configuration After NAT is configured, you can view information about NAT. Parent topic: NAT Configuration Establishing the Configuration Task Before configuring NAT, familiarize yourself with the applicable environment, complete the pre-configuration tasks, and obtain the required data. Applicable Environment NAT must be configured at the boundary between the private network and the public network so that it can translate private and public addresses. Pre-configuration Tasks Before configuring NAT, complete the following task: Creating a basic ACL or an advanced ACL and configuring ACL rules Data Preparation To configure NAT, you need the following data. No. Data 1 Number of the public address pool, start IP address, and end IP address 2 Number of the basic ACL or advanced ACL 3 Information about the internal server, including the protocol type, public address, public port number, private address (the VPN instance may be included), and (optional) private port number 4 Information about static NAT, including the protocol type, public address, public port number, private address (the VPN instance may be included), (optional) private port number, and subnet mask 5 Index of the overlapping address pool and temporary address pool, start IP address, address pool length, and (optional) VPN instance 6 Domain name, public address, and public port number Configuring an Address Pool Configure a NAT address pool when multiple users on the private network need to access the public network. nat address-group group-index start-address end-address 4/15

5 A public address pool is configured. A public address pool is a set of public addresses. When performing NAT on data packets from the private network, the AR1200 selects an IP address from the address pool as the source address. The public address pool IDs are numerals. Up to 8 address pools can be configured. By default, no public address pool is configured on the AR Associating an ACL with an Address Pool Network administrators can use ACLs to control which users can access public networks using NAT. interface interface-type interface-number The interface view is displayed. 3. Run: nat outbound acl-number [ address-group group-index [ no-pat ] interface loopback interface-number ] An ACL is associated with an address pool. After an ACL is associated with an address pool, the AR1200 translates source addresses of data packets matching the ACL to an IP address in the address pool. Different IP address translation entries can be configured on an interface. In the command, no-pat indicates one-to-one NAT, that is, only the IP address is translated and the port number is not translated Configuring Easy IP Easy IP uses an interface IP address as the source address of data packets matching an ACL. interface interface-type interface-number The interface view is displayed. 3. Run: nat outbound acl-number [ address-group group-index [ no-pat ] interface loopback interface-number ] Easy IP is configured Configuring an Internal Server Deploying a server on the private network improves security of the server and prevents attacks from the public network. Users on the private and public networks can access the server. interface interface-type interface-number The interface view is displayed. 3. Run: nat server protocol { tcp udp } global { global-address current-interface } global-port inside host-address [ host-port ] [ vpn-instance vpn-instance-name ] [ acl acl-number ] [ description description ] nat server protocol { tcp udp } global interface loopback interface-number global-port [ vpn-instance vpn-instance-name ] inside host-address [ host-port ] [ vpn-instance vpn-instance-name ] [ acl acl-number ] [ description description ] nat server [ protocol { protocol-number icmp tcp udp } ] global global-address inside host-address [ vpn-instance vpn-instance-name ] [ acl acl-number ] [ description description ] An internal server is configured. Users on the public network can access the configured internal server. When a host on the public network sends a connection request to the public address (global-address) of the internal server, NAT translates the destination address of the request to a private address (host-address). The AR1200 then forwards the request the server. 5/15

6 NOTE: When configuring an internal server, ensure that global-address and host-address are different from interface IP addresses and IP addresses in the user address pool Configuring Static NAT Static NAT maps a private address to a public address. Static NAT does not save public addresses but shields the private network topology. interface interface-type interface-number The interface view is displayed. 3. Run: nat static protocol { tcp udp } global { global-address current-interface } global-port inside host-address [ host-port ] [ vpn-instance vpn-instance-name ] [ netmask mask ] [ acl acl-number ] [ description description ] nat static protocol { tcp udp } global interface loopback interface-number global-port [ vpn-instance vpn-instance-name ]inside host-address [ host-port ] [ vpn-instance vpn-instance-name ] [ netmask mask ] [ acl acl-number ] [ description description ] nat static [ protocol { protocol-number icmp tcp udp } ] global global-address inside host-address [ vpn-instance vpn-instance-name ] [ netmask mask ] [ acl acl-number ] [ description description ] Static NAT is configured. NOTE: When configuring static NAT, ensure that global-address and host-address are different from interface IP addresses and IP addresses in the user address pool Enabling NAT ALG Errors may occur when NAT translates protocol packets encapsulated in IP data packets. The NAT ALG function ensures that the protocol packets are translated successfully. nat alg { all dns ftp rtsp sip } enable The NAT ALG function is enabled. After the NAT ALG function is enabled for an application protocol, packets of the application protocol can traverse the NAT server. The application protocol cannot work without the NAT ALG function. In the command, all indicates that NAT traversal applies to the DNS, FTP, SIP, and RTSP protocols Configuring NAT Filtering A NAT device filters the traffic from external network to internal network. After an internal host sends an access request to an external host, the external host transmits traffic to the internal host. The NAT device filters the traffic sent to the internal host. Context NAT filtering has the following modes: Endpoint-independent filtering Address-dependent filtering Address and port-dependent filtering nat filter-mode { endpoint-dependent endpoint-independent endpoint-and-port-dependent } The NAT filtering mode is set. NAT filtering applies to the traffic from an external network to an internal network. The default mode is endpoint-and-port-dependent. In this mode, the system uses the 6/15

7 source IP address, source port, destination IP address, destination port, and protocol number as the index to search the NAT mapping table Configuring NAT Mapping NAT mapping allows applications using the STUN, TURN, and ICE technologies to traverse the NAT server. Context The NAT function saves IPv4 addresses and improves network security. NAT mapping has the following modes: Endpoint-independent mapping: reuses the port mapping for subsequent packets sent from the same internal IP address and port to any external IP address and port. Address-dependent mapping: reuses the port mapping for subsequent packets sent from the same internal IP address and port to the same external IP address, regardless of the external port. Address and port-dependent mapping: reuses the port mapping for subsequent packets sent from the same internal IP address and port to the same external IP address and port while the mapping is still active. nat mapping-mode endpoint-independent [ tcp udp ] [ dest-port port-number ] The NAT mapping mode is set. NAT mapping applies to the traffic from an internal network to an external network. The default mode is address and port-dependent mapping Configuring DNS Mapping A private network may deploy different servers such as FTP servers and web servers, but has no DNS server deployed. If hosts on the private network need to differentiate and access servers using domain names, configure DNS mapping. nat dns-map domain-name global-address global-port { tcp udp } The mapping from a domain name to a public IP address, port number, and protocol type is configured. Up to 32 mapping entries can be configured on the AR Run: nat alg { all dns ftp rtsp sip } enable The NAT ALG function is enabled for DNS. CAUTION: The NAT ALG function allows hosts on a private network to access servers on the private network through the external DNS server Configuring Twice NAT Twice NAT translates both the source and destination IP addresses of a data packet. It applies to the situation where IP addresses of internal hosts and external hosts overlap. Context When IP addresses of internal hosts and external hosts overlap, configure the mapping between the overlapping address pool and the temporary address pool. Then the overlapping address is translated to a unique temporary address and packets can be forwarded correctly. In addition, configure outbound NAT to implement twice NAT. nat overlap-address map-index overlappool-startaddress temppool-startaddress pool-length length [ inside-vpn-instance inside-vpn-insta Twice NAT is configured. The overlapping address pool and temporary address pool contain consecutive IP addresses. The lengths of the two address pools are the same, and up to 255 IP addresses can be configured in each of the two address pools. Up to 8 mapping entries between the overlapping address pool and the temporary address pool can be configured. 7/15

8 When the VPN instance in the NAT mapping is deleted, the twice NAT configuration is also deleted Configuring NAT Log Output The NAT log output function enables the AR1200 to collect and record information about the NAT session table in real time, enhancing network security. According to the NAT logs, you can easily find users that have accessed a network using NAT. Context NAT logs are generated when the AR1200 performs address translation. The logs record the original source IP addresses, source ports, destination IP addresses, destination ports, and translated source IP addresses and source ports, as well as user actions and time stamps. You can view NAT logs to learn about information about users have accessed a network using NAT. The AR1200 can send NAT logs to a specified log host, as shown in Figure 1. Figure 1 Sending NAT logs to a specified log host firewall log session enable The firewall log function is enabled. 3. Run: firewall log session nat enable The NAT session log function is enabled. 4. Run: info-center enable The information center is enabled. 5. Run: info-center loghost ip-address [ channel { channel-number channel-name } facility local-number { language language-name The channel through which logs are output to the log host is configured. The AR1200 supports a maximum of eight log hosts to implement backup among log hosts. NOTE: For details on how to configure the AR1200 to send logs to a log host, see Example for Outputting Log Information to a Log Host in "Information Center Configuration" of the Huawei AR1200 Series Enterprise Routers Configuration Guide - Device Management Checking the Configuration After NAT is configured, you can view information about NAT. Run the display nat alg command to check whether the NAT ALG function is enabled. Run the display nat address-group [ group-index ] [ verbose ] command to check the configuration of the NAT address pool. Run the display nat dns-map [ domain-name ] command to check information about DNS mapping. Run the display nat outbound [ acl acl-number address-group group-index interface { EthernetGigabitEthernet } interface-number.subnumber ] command to check information about outbound NAT. Run the display nat overlap-address { map-index all inside-vpn-instance inside-vpn-instance-name } command to check information about twice NAT. Run the display nat server [ global global-address inside host-address [ vpn-instance vpn-instance-name ] interface interface-type interface-number.subnumber ] command to check the configuration of the NAT server. Run the display nat static [ global global-address inside host-address [ vpn-instance vpn-instance-name ] interface interface-type interface-name ] command to check the configuration of static NAT. Run the display nat mapping table { all number } command to view the NAT mapping table information or number of entries in the table. 1.4 Configuration Examples 8/15

9 This section provides several configuration examples of NAT. Example for Configuring Static NAT Example for Configuring the NAT Server Example for Configuring Outbound NAT Example for Configuring Twice NAT Parent topic: NAT Configuration Example for Configuring Static NAT Networking Requirements As shown in Figure 1, the server is the internal server of a company and needs to provide services for external users.the private IP address of the web server is and its public address is /24. The IP address of the carrier device connected to the router is /24. It is required that external users use the public address of the internal server to access the internal server. Figure 1 Networking diagram for configuring static NAT Configuration Roadmap The configuration roadmap is as follows: 1. Configure IP addresses for interfaces and configure static NAT on the WAN-side interface to allow external users to access the internal server. 2. Configure a default route. 1. Configure IP addresses for interfaces and configure static NAT on the router. <Huawei> [Huawei] vlan 100 [Huawei-vlan100] quit [Huawei] interface vlanif 100 [Huawei-Vlanif100] ip address [Huawei-Vlanif100] quit [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] port link-type access [Huawei-Ethernet2/0/0] port default vlan 100 [Huawei-Ethernet2/0/0] quit [Huawei] interface gigabitethernet 3/0/0 [Huawei-GigabitEthernet3/0/0] ip address [Huawei-GigabitEthernet3/0/0] nat static global inside [Huawei-GigabitEthernet3/0/0] quit 2. Configure a default route with next hop address on the router. [Huawei] ip route-static Verify the configuration. Configuration Files Run the display nat static command on the router. The command output is as follows: [Huawei] display nat static Static Nat Information: Interface : GigabitEthernet3/0/0 Global IP/Port : /---- Inside IP/Port : /---- Protocol : ---- VPN instance-name : ---- Acl number : ---- Netmask : Description : ---- Total : 1 Verify that external users can access the server. vlan batch 100 interface Vlanif100 ip address /15

10 interface Ethernet2/0/0 port link-type access port default vlan 100 interface GigabitEthernet 3/0/0 ip address nat static global inside ip route-static return Parent topic: Configuration Examples Example for Configuring the NAT Server Networking Requirements As shown in Figure 1, a company is connected to the wide area network (WAN) through the AR1200 enabled with the network address translation (NAT) function. The company provides the web server and FTP server for users on the public network to access. The private IP address of the web server is :8080 and its public address is /24. The private IP address of the FTP server is /24 and its public address is /24.and the interface address of the AR1200 connected to the carrier device is /24. Figure 1 Network diagram for configuring the NAT server Configuration Roadmap The configuration roadmap is as follows: 1. Configure IP addresses for interfaces and configure the NAT servers on the WAN-side interface to allow external users to access the internal servers. 2. Configure a default route. 3. Enable the FTP NAT ALG function to allow the external FTP packets to traverse the NAT servers. 1. Configure IP addresses for the interfaces on the AR1200 and configure the NAT server on the WAN-side interface. <Huawei> [Huawei] vlan 100 [Huawei-vlan100] quit [Huawei] interface vlanif 100 [Huawei-Vlanif100] ip address [Huawei-Vlanif100] quit [Huawei] interface Ethernet 0/0/0 [Huawei-Ethernet0/0/0] port link-type access [Huawei-Ethernet0/0/0] port default vlan 100 [Huawei-Ethernet0/0/0] quit [Huawei] vlan 200 [Huawei-vlan200] quit [Huawei] interface vlanif 200 [Huawei-Vlanif200] ip address [Huawei-Vlanif200] quit [Huawei] interface Ethernet 0/0/1 [Huawei-Ethernet0/0/1] port link-type access [Huawei-Ethernet0/0/1] port default vlan 200 [Huawei-Ethernet0/0/1] quit [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] ip address [Huawei-Ethernet2/0/0] nat server protocol tcp global www inside [Huawei-Ethernet2/0/0] nat server protocol tcp global ftp inside ftp [Huawei-Ethernet2/0/0] quit 2. On the AR1200, configure a static route with the next hop address [Huawei] ip route-static Enable the NAT ALG function for FTP packets on the AR /15

11 [Huawei] nat alg ftp enable 4. Verify the configuration. Run the display nat server command on the AR1200 to view the NAT server configuration. [Huawei] display nat server Nat Server Information: Interface : Ethernet2/0/0 Global IP/Port : /80(www) Inside IP/Port : /8080 Protocol : 6(tcp) VPN instance-name : ---- Acl number : ---- Global IP/Port : /21(ftp) Inside IP/Port : /21(ftp) Protocol : 6(tcp) VPN instance-name : ---- Acl number : ---- Total : 2 Run the display nat alg command on the AR1200, and the command output is as follows: [Huawei] display nat alg NAT Application Level Gateway Information: Application Status dns Disabled ftp Enabled rtsp Disabled sip Disabled Configuration Files Verify that external users can access the web server and FTP server. vlan batch nat alg ftp enable interface Vlanif100 ip address interface Vlanif200 ip address interface Ethernet0/0/0 port link-type access port default vlan 100 interface Ethernet0/0/1 port link-type access port default vlan 200 interface Ethernet2/0/1 ip address nat server protocol tcp global www inside nat server protocol tcp global ftp inside ftp ip route-static Ethernet 2/0/0 return Parent topic: Configuration Examples Example for Configuring Outbound NAT Networking Requirements As shown in Figure 1, the intranet of area A is connected to the wide area network (WAN) through the AR1200. The network address translation (NAT) function is enabled on the AR1200. To ensure the security of company A's intranet, you need to use the IP addresses in the public address pool ( ) to replace the host addresses of area A on the network segment /24. The hosts of area A then can access servers on the WAN. The intranet of area B is also connected to the WAN through the AR1200. Only a few public IP addresses are allocated to area B. To save the public IP addresses and improve the security of company B's intranet, you need to use the IP addresses in the public address pool ( ) to replace the host addresses of area B on the network segment /24. The hosts of company B then can access servers on the WAN. On the AR1200, the public address of Ethernet2/0/0 on the AR1200 is /24 and the interface address of the AR1200 connected to the carrier device is /24. Figure 1 Network diagram for configuring outbound NAT 11/15

12 Configuration Roadmap The configuration roadmap is as follows: 1. Configure IP addresses for interfaces. 2. Configure a default route. 3. Configure outbound NAT on the WAN-side interface to allow internal hosts to access external networks. 1. Configure IP addresses for the interfaces of the AR1200. <Huawei> [Huawei] vlan 100 [Huawei-vlan100] quit [Huawei] interface vlanif 100 [Huawei-Vlanif100] ip address [Huawei-Vlanif100] quit [Huawei] interface Ethernet 0/0/0 [Huawei-Ethernet0/0/0] port link-type access [Huawei-Ethernet0/0/0] port default vlan 100 [Huawei-Ethernet0/0/0] quit [Huawei] vlan 200 [Huawei-vlan200] quit [Huawei] interface vlanif 200 [Huawei-Vlanif200] ip address [Huawei-Vlanif200] quit [Huawei] interface Ethernet 0/0/1 [Huawei-Ethernet0/0/1] port link-type access [Huawei-Ethernet0/0/1] port default vlan 200 [Huawei-Ethernet0/0/1] quit [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] ip address [Huawei-Ethernet2/0/0] quit 2. On the AR1200, configure a static route with the next hop address [Huawei] ip route-static Configure outbound NAT on the AR1200. [Huawei] nat address-group [Huawei] nat address-group [Huawei] acl 2000 [Huawei-acl-basic-2000] rule 5 permit source [Huawei-acl-basic-2000] quit [Huawei] acl 2001 [Huawei-acl-basic-2001] rule 5 permit source [Huawei-acl-basic-2001] quit [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] nat outbound 2000 address-group 1 no-pat [Huawei-Ethernet2/0/0] nat outbound 2001 address-group 2 [Huawei-Ethernet2/0/0] quit 4. Verify the configuration. Run the display nat outbound command on the AR1200, and the command output is as follows: [Huawei] display nat outbound NAT Outbound Information: Interface Acl Address-group/IP/Interface Type Ethernet2/0/ no-pat Ethernet2/0/ pat Total : /15

13 Configuration Files Perform the ping operation on the AR1200. <Huawei> ping -a PING : 56 data bytes, press CTRL_C to break Reply from : bytes=56 Sequence=1 ttl=255 time=1 ms Reply from : bytes=56 Sequence=2 ttl=255 time=1 ms Reply from : bytes=56 Sequence=3 ttl=255 time=1 ms Reply from : bytes=56 Sequence=4 ttl=255 time=1 ms Reply from : bytes=56 Sequence=5 ttl=255 time=1 ms <Huawei> ping -a PING : 56 data bytes, press CTRL_C to break Reply from : bytes=56 Sequence=1 ttl=255 time=1 ms Reply from : bytes=56 Sequence=2 ttl=255 time=1 ms Reply from : bytes=56 Sequence=3 ttl=255 time=1 ms Reply from : bytes=56 Sequence=4 ttl=255 time=1 ms Reply from : bytes=56 Sequence=5 ttl=255 time=1 ms vlan batch acl number 2000 rule 5 permit source acl number 2001 rule 5 permit source interface Vlanif100 ip address interface Vlanif200 ip address interface Ethernet0/0/0 port link-type access port default vlan 100 interface Ethernet0/0/1 port link-type access port default vlan 200 interface Ethernet2/0/0 ip address nat outbound 2000 address-group 1 no-pat nat outbound 2001 address-group 2 nat address-group nat address-group ip route-static Ethernet 2/0/0 return Parent topic: Configuration Examples Example for Configuring Twice NAT Networking Requirements As shown in Figure 1, the IP address of PC1 on the private network is the same as the IP address of host A on the public network. When PC2 sends a packet to host A, the packet may be forwarded to PC1. In addition to the network address translation function, twice NAT of the AR1200 specifies the mapping between the overlapping address pool and the temporary address pool. The overlapping IP address is translated to a unique temporary address so that packets can be forwarded correctly. Figure 1 Networking diagram for twice NAT configuration Configuration Roadmap 13/15

14 The configuration roadmap is as follows: 1. Configure IP addresses for interfaces. 2. Configure DNS mappings to allow users to access servers by using domain names. 3. Map the overlapping address pool to the temporary address pool. 4. Configure outbound NAT to allow internal users to access external networks. 1. Configure IP addresses for the interfaces of the AR1200. <Huawei> [Huawei] vlan 100 [Huawei-vlan100] quit [Huawei] interface vlanif 100 [Huawei-Vlanif100] ip address [Huawei-Vlanif100] quit [Huawei] interface Ethernet 0/0/0 [Huawei-Ethernet0/0/0] port link-type access [Huawei-Ethernet0/0/0] port default vlan 100 [Huawei-Ethernet0/0/0] quit [Huawei] vlan 200 [Huawei-vlan200] quit [Huawei] interface vlanif 200 [Huawei-Vlanif200] ip address [Huawei-Vlanif200] quit [Huawei] interface Ethernet 0/0/1 [Huawei-Ethernet0/0/1] port link-type access [Huawei-Ethernet0/0/1] port default vlan 200 [Huawei-Ethernet0/0/1] quit [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] ip address [Huawei-Ethernet2/0/0] quit 2. Configure DNS mappings on the AR1200. [Huawei] nat alg dns enable [Huawei] nat dns-map tcp 3. Configure the mapping between the overlapping address pool and the temporary address pool on the AR1200. [Huawei] nat overlap-address pool-length Configure a static route on the AR1200 from the temporary address pool to outbound interface Ethernet2/0/0. [Huawei] ip route-static ethernet 2/0/ Configure outbound NAT on outbound interface Ethernet2/0/0 of the AR1200. a. Create an ACL and configure an ACL rule to permit the packets of host A. [Huawei] acl 3180 [Huawei-acl-adv-3180] rule permit ip source [Huawei-acl-adv-3180] quit b. Configure the NAT address pool for outbound NAT. [Huawei] nat address-group c. Configure outbound NAT on outbound interface Ethernet2/0/0. 6. Verify the configuration. Configuration Files [Huawei] interface ethernet 2/0/0 [Huawei-Ethernet2/0/0] nat outbound 3180 address-group 1 [Huawei-Ethernet2/0/0] quit Run the display nat overlap-address all command on the AR1200 to view the mapping between address pools. [Huawei] display nat overlap-address all Nat Overlap Address Pool To Temp Address Pool Map Information: Id Overlap-Address Temp-Address Pool-Length Inside-VPN-Instance-Name Total : 1 Run the display nat outbound command on the AR1200 to view outbound NAT information. [Huawei] display nat outbound NAT Outbound Information: Interface Acl Address-group/IP/Interface Type Ethernet2/0/ pat Total : /15

15 vlan batch acl number 3180 rule 5 permit ip source nat alg dns enable nat address-group nat dns-map tcp nat overlap-address pool-length 254 ip route-static Ethernet2/0/ interface Vlanif100 ip address interface Vlanif200 ip address interface Ethernet0/0/0 port link-type access port default vlan 100 interface Ethernet0/0/1 port link-type access port default vlan 200 interface Ethernet2/0/0 ip address nat outbound 3180 address-group 1 return Parent topic: Configuration Examples 15/15

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls

HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls HP A-F1000-A-EI_A-F1000-S-EI VPN Firewalls NAT Command Reference Part number: 5998-2659 Document version: 6PW100-20110909 Legal and notice information Copyright 2011 Hewlett-Packard Development Company,

More information

Topic 7 DHCP and NAT. Networking BAsics.

Topic 7 DHCP and NAT. Networking BAsics. Topic 7 DHCP and NAT Networking BAsics. 1 Dynamic Host Configuration Protocol (DHCP) IP address assignment Default Gateway assignment Network services discovery I just booted. What network is this? What

More information

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)

H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Network Protocol Configuration

Network Protocol Configuration Table of Contents Table of Contents Chapter 1 Configuring IP Addressing... 1 1.1 IP Introduction... 1 1.1.1 IP... 1 1.1.2 IP Routing Protocol... 1 1.2 Configuring IP Address Task List... 2 1.3 Configuring

More information

2. IP Networks, IP Hosts and IP Ports

2. IP Networks, IP Hosts and IP Ports 1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3

More information

Configuring Network Address Translation (NAT)

Configuring Network Address Translation (NAT) 8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and

More information

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6

NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6 (Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means

More information

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Understanding and Configuring NAT Tech Note PAN-OS 4.1 Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...

More information

This page displays the device information, such as Product type, Device ID, Hardware version, and Software version.

This page displays the device information, such as Product type, Device ID, Hardware version, and Software version. Huawei HG622 -- HUAWEI Home Gateway STATUS Device Device xtm WAN LAN WLAN This page displays the device information, such as Product type, Device ID, Hardware version, and Software version. XTM This page

More information

Configuring Static and Dynamic NAT Translation

Configuring Static and Dynamic NAT Translation This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source list C Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks

Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Technical White Paper for Traversal of Huawei Videoconferencing Systems Between Private and Public Networks Huawei Technologies Co., Ltd. All rights reserved. Contents Contents 1 Overview... 1 2 H.323...

More information

HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract

HP 5820X & 5800 Switch Series Layer 3 - IP Services. Configuration Guide. Abstract HP 5820X & 5800 Switch Series Layer 3 - IP Services Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software configuration

More information

Evaluation guide. Vyatta Quick Evaluation Guide

Evaluation guide. Vyatta Quick Evaluation Guide VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

Configuring Network Address Translation

Configuring Network Address Translation CHAPTER5 Configuring Network Address Translation The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. This chapter contains the following major sections

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) 100-101: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1) Course Overview This course provides students with the knowledge and skills to implement and support a small switched and routed network.

More information

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address

Personal Telepresence. Place the VidyoPortal/VidyoRouter on a public Static IP address NAT Introduction: Vidyo Conferencing in Firewall and NAT Deployments Vidyo Technical Note Section 1 The VidyoConferencing platform utilizes reflexive addressing to assist in setup of Vidyo calls. Reflexive

More information

IP Addressing A Simplified Tutorial

IP Addressing A Simplified Tutorial Application Note IP Addressing A Simplified Tutorial July 2002 COMPAS ID 92962 Avaya Labs 1 All information in this document is subject to change without notice. Although the information is believed to

More information

Knowledgebase Solution

Knowledgebase Solution Knowledgebase Solution Goal Enable coexistence of a 3 rd -party VPN / Firewall with an EdgeMarc appliance. Describe characteristics and tradeoffs of different topologies. Provide configuration information

More information

Broadband Phone Gateway BPG510 Technical Users Guide

Broadband Phone Gateway BPG510 Technical Users Guide Broadband Phone Gateway BPG510 Technical Users Guide (Firmware version 0.14.1 and later) Revision 1.0 2006, 8x8 Inc. Table of Contents About your Broadband Phone Gateway (BPG510)... 4 Opening the BPG510's

More information

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

Firewall Defaults and Some Basic Rules

Firewall Defaults and Some Basic Rules Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Cisco Expressway Basic Configuration

Cisco Expressway Basic Configuration Cisco Expressway Basic Configuration Deployment Guide Cisco Expressway X8.1 D15060.03 August 2014 Contents Introduction 4 Example network deployment 5 Network elements 6 Internal network elements 6 DMZ

More information

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes

Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP

More information

BASIC ANALYSIS OF TCP/IP NETWORKS

BASIC ANALYSIS OF TCP/IP NETWORKS BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

- Introduction to Firewalls -

- Introduction to Firewalls - 1 Firewall Basics - Introduction to Firewalls - Traditionally, a firewall is defined as any device (or software) used to filter or control the flow of traffic. Firewalls are typically implemented on the

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Network Address Translation (NAT)

Network Address Translation (NAT) Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT. Taken from http://www.cs.virginia.edu/~itlab/ book/slides/module17-nat.ppt 1 Private Network Private IP network

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract

HP A5820X & A5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract HP A5820X & A5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP A Series products and guides you through the software

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Firewalls P+S Linux Router & Firewall 2013

Firewalls P+S Linux Router & Firewall 2013 Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network

More information

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)

More information

CSCE 465 Computer & Network Security

CSCE 465 Computer & Network Security CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Firewall 1 Basic firewall concept Roadmap Filtering firewall Proxy firewall Network Address Translation

More information

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering Introduction Digi Connect Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering The Digi Connect supports five features which provide security and IP traffic forwarding when using incoming

More information

Configuring IP Load Sharing in AOS Quick Configuration Guide

Configuring IP Load Sharing in AOS Quick Configuration Guide Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used

More information

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1 Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,

More information

Lab Exercise Configure the PIX Firewall and a Cisco Router

Lab Exercise Configure the PIX Firewall and a Cisco Router Lab Exercise Configure the PIX Firewall and a Cisco Router Scenario Having worked at Isis Network Consulting for two years now as an entry-level analyst, it has been your hope to move up the corporate

More information

ICS 351: Today's plan

ICS 351: Today's plan ICS 351: Today's plan Quiz, on overall Internet function, linux and IOS commands, network monitoring, protocols IPv4 addresses: network part and host part address masks IP interface configuration IPv6

More information

Policy Based Forwarding

Policy Based Forwarding Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus

More information

Implementing Network Address Translation and Port Redirection in epipe

Implementing Network Address Translation and Port Redirection in epipe Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4

More information

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

Configuring the Transparent or Routed Firewall

Configuring the Transparent or Routed Firewall 5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing

More information

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3

Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3 Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to

More information

IP Filtering for Patton RAS Products

IP Filtering for Patton RAS Products RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering

More information

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title

NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005

More information

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual

More information

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL:

Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Document No. FO1101 Issue Date: Work Group: FibreOP Technical Team October 31, 2013 FINAL: Title: FibreOP Business Internet 5 Static IP Customer Configuration Version 1.1 Summary: This document provides

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

Network Address Translation (NAT)

Network Address Translation (NAT) CHAPTER 6 Network Address Translation (NAT) 6.1 Introduction NAT (Network Address Translation) is a method of mapping one or more IP addresses and/or service ports into different specified services. It

More information

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information

More information

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0

Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners

More information

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup

1:1 NAT in ZeroShell. Requirements. Overview. Network Setup 1:1 NAT in ZeroShell Requirements The version of ZeroShell used for writing this document is Release 1.0.beta11. This document does not describe installing ZeroShell, it is assumed that the user already

More information

IOS NAT Load Balancing for Two ISP Connections

IOS NAT Load Balancing for Two ISP Connections IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview 2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014

More information

Tech-Note Bridges Vs Routers Version 1.0-02/06/2009. Bridges Vs Routers

Tech-Note Bridges Vs Routers Version 1.0-02/06/2009. Bridges Vs Routers Tech-Note Bridges Vs Routers - 02/06/2009 1 2 Index 1. About this tech-note... 3 2. Recommended configurations... 4 3. Issues that may arise with other types of connections... 5 3.1. Connected to a router

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Chapter 11 Network Address Translation

Chapter 11 Network Address Translation Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses

More information

Optimum Business SIP Trunk Set-up Guide

Optimum Business SIP Trunk Set-up Guide Optimum Business SIP Trunk Set-up Guide For use with IP PBX only. SIPSetup 07.13 FOR USE WITH IP PBX ONLY Important: If your PBX is configured to use a PRI connection, do not use this guide. If you need

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1

MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1 Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...

More information

VegaStream Information Note Considerations for a VoIP installation

VegaStream Information Note Considerations for a VoIP installation VegaStream Information Note Considerations for a VoIP installation To get the best out of a VoIP system, there are a number of items that need to be considered before and during installation. This document

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Configuring Network Address Translation

Configuring Network Address Translation 6 Configuring Network Address Translation Contents NAT Services on the ProCurve Secure Router....................... 6-2 Many-to-One NAT for Outbound Traffic........................ 6-2 Using NAT with

More information

GregSowell.com. Mikrotik Basics

GregSowell.com. Mikrotik Basics Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

More information

Virtual Fragmentation Reassembly

Virtual Fragmentation Reassembly Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background

More information

Proxy Server, Network Address Translator, Firewall. Proxy Server

Proxy Server, Network Address Translator, Firewall. Proxy Server Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as

More information

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch

Vocia MS-1 Network Considerations for VoIP. Vocia MS-1 and Network Port Configuration. VoIP Network Switch. Control Network Switch Vocia MS-1 Network Considerations for VoIP Vocia software rev. 1.4 or higher required Vocia MS-1 and Network Port Configuration The Vocia Message Server 1 (MS-1) has a number of roles in a Vocia Paging

More information

The information in this document is based on these software and hardware versions:

The information in this document is based on these software and hardware versions: Contents Introduction Prerequisites Requirements Components Used Background Information Advanced Protocol Handling Configuration Scenarios Scenario 1: FTP Client configured for Active Mode Scenario 2:

More information

Quidway MPLS VPN Solution for Financial Networks

Quidway MPLS VPN Solution for Financial Networks Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

School of Information Science (IS 2935 Introduction to Computer Security, 2003)

School of Information Science (IS 2935 Introduction to Computer Security, 2003) Student Name : School of Information Science (IS 2935 Introduction to Computer Security, 2003) Firewall Configuration Part I: Objective The goal of this lab is to allow students to exploit an active attack

More information

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products

More information