A
SAT
rule with an original, untranslated address of
all-nets
always results in an all-to-one
mapping.
Specifying the Type of Port Mapping
If the
Port
property is specified for the
SAT
rule, NetDefendOS performs port translation in a way
that is slightly different to IP address translation. It uses the following rules:
•
If the
Service
object used with the SAT IP rule does not have a single value or simple range
specified for its port property, port translation will never be performed.
The term
simple range
means a range with only a lower and upper value or a single value. For
example,
50-60
is a simple range.
For this reason, an all-to-one port translation is not possible and the
All to One
property for
the IP rule is ignored for port translation.
•
If a new port number is specified and the
Service
object used with the SAT IP rule has a single
number for its port property then all connections will be translated to the new port number.
•
If a new port number is specified and the
Service
object used with the SAT IP rule has a simple
number range for its port property then all connections will be transposed to a new range
which begins with the new port number.
7.4.2. One-to-One IP Translation
The simplest form of SAT usage is the translation of a single IP address to another single, static
address. A very common scenario for this usage is to enable external users to access a protected
server in a DMZ that has a private address. This is also sometimes referred to as implementing a
Virtual IP
or a
Virtual Server
and is often used in conjunction with a DMZ.
The Role of a DMZ
At this point, it is relevant to discuss the role of the network known as the
Demilitarized Zone
(DMZ) since
SAT
rules are often used for allowing DMZ access.
The DMZ's purpose is to have a network where the administrator can place those resources
which will be accessed by external, untrusted clients and where this access typically takes place
across the public Internet. The servers in the DMZ will have the maximum exposure to external
threats and are therefore at most risk of being compromised.
By isolating these servers in a DMZ, the object is to create a distinct network, separated from
much more sensitive local, internal networks. This allows NetDefendOS to have control over
what traffic flows between the DMZ and internal networks and to better isolate any security
breaches that might occur in DMZ servers.
The illustration below shows a typical network arrangement with a NetDefend Firewall
mediating communications between the public Internet and servers in the DMZ and between
the DMZ and local clients on a network called
LAN
.
Note: The DMZ port could be any port
On some models of D-Link NetDefend hardware, there is a specific Ethernet interface
which is marked as being for the
DMZ
network. Although this is the port's intended use,
Chapter 7: Address Translation
590
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...