
Packet filtering
54
System Administrator’s Guide
You can use the Source NAT functionality of Packet Filtering to tweak your Shiva VPN
Gateway's masquerading behavior.
See “Network address translation (NAT/masquerading)” on page 36 for information on
configuring the basic masquerading (Source NAT) relationships between your Shiva
VPN Gateway's interfaces.
Enable
Uncheck to temporarily disable this rule
Descriptive Name
An arbitrary name for this rule.
Match Packets with the following
•
Source Address: The address from which the request originated (for
masquerading this will typically be a private LAN or DMZ address)
•
Outgoing Interface: The interface that receives the request (for masquerading
this will typically be private interface, i.e. LAN or DMZ)
•
Destination Address: The destination address of the request
•
Destination Services: The destination service(s) (port(s)) of the request
After the packet
•
To Source Address: The address to replace the Source Address (for
masquerading this will typically be a public address of the Shiva VPN Gateway,
i.e. WAN/Internet)
•
To Source Service: The service to replace Source Services, this need not be the
same as the Source Service used to match the packet, but often will be
Destination NAT/port forwarding
Destination NAT alters the destination address and optionally the destination port of
packets received by the Shiva VPN Gateway. Typically this is used for port forwarding.
Summary of Contents for SHIVA 1100
Page 38: ...QoS traffic shaping 38 System Administrator s Guide...
Page 44: ...DHCP relay 44 System Administrator s Guide...
Page 66: ...Access control 66 System Administrator s Guide...
Page 122: ...Technical Support 122 System Administrator s Guide...
Page 132: ...132 System Administrator s Guide...