![D-Link DFL-210 - NetDefend - Security Appliance User Manual Download Page 286](http://html1.mh-extra.com/html/d-link/dfl-210-netdefend-security-appliance/dfl-210-netdefend-security-appliance_user-manual_3099699286.webp)
2.
Specify a suitable name for the rule, for example NAT_HTTP
3.
Now enter:
•
Action: NAT
•
Service: http
•
Source Interface: lan
•
Source Network: lannet
•
Destination Interface: any
•
Destination Network: all-nets
4.
Under the NAT tab, make sure that the Use Interface Address option is selected
5.
Click OK
Protocols Handled by NAT
Dynamic address translation is able to deal with the TCP, UDP and ICMP protocols with a good
level of functionality since the algorithm knows which values can be adjusted to become unique in
the three protocols. For other IP level protocols, unique connections are identified by their sender
addresses, destination addresses and protocol numbers.
This means that:
•
An internal machine can communicate with several external servers using the same IP protocol.
•
An internal machine can communicate with several external servers using different IP protocols.
•
Several internal machines can communicate with different external servers using the same IP
protocol.
•
Several internal machines can communicate with the same server using different IP protocols.
•
Several internal machines can not communicate with the same external server using the same IP
protocol.
Note
These restrictions apply only to IP level protocols other than TCP, UDP and ICMP,
such as OSPF, L2TP, etc. They do not apply to the protocols transported by TCP,
UDP and ICMP such as telnet, FTP, HTTP and SMTP. NetDefendOS can alter port
number information in the TCP and UDP headers to make each connection unique,
even though such connections have had their sender addresses translated to the same
IP.
Some protocols, regardless of the method of transportation used, can cause problems during address
translation.
Anonymizing Internet Traffic with NAT
A useful application of the NAT feature in NetDefendOS is for anonymizing service providers to
anonymize traffic between clients and servers across the public Internet so that the client's public IP
address is not present in any server access requests or peer to peer traffic.
We shall examine the typical case where the D-Link Firewall acts as a PPTP server and terminates
the PPTP tunnel for PPTP clients. Clients that wish to be anonymous, communicate with their local
7.1. NAT
Chapter 7. Address Translation
286
Summary of Contents for DFL-210 - NetDefend - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449...