737
Programming Operations Guide
Chapter 37
Configuring NAT (Network Address Translation)
Business Communications Manager provides security and firewall features to protect your private
data resources from outsiders.
This section includes information about the different types of NAT, as well as:
•
“Enabling and disabling NAT” on page 738
•
“Configuring an Interface with NAT” on page 739
The Network Address Translation feature is a network security feature. NAT translates the IP
addresses used within your private network to different IP addresses known to Internet users
outside your private network. NAT helps ensure network security because each outgoing or
incoming request must go through a translation process that also provides the opportunity to
qualify or authenticate the request or match it to a previous request. NAT also translates port
numbers.
NAT is defined by creating a set of rules and then defining the order in which these rules are
evaluated.
Business Communications Manager supports both static and dynamic NAT for a number of packet
types and protocols:
Static NAT
Static NAT is the one-to-one mapping of an IP address on your private network to an IP address
from outside your network. Inbound rules must have external IP addresses mapped to specific
internal IP addresses.
Dynamic NAT
Dynamic NAT is the mapping between a private network and the outside network, of one address
to a pool of addresses, a pool of addresses to one address or a pool of addresses to another. The
mappings are made in a translation table and remain there until the table is cleared or until an entry
times out.
NAT Support for:
Type
Packets (static and
dynamic)
TCP, UDP, IP
Protocols
H.323, FTP, HTTP, POP3, Telnet, SMTP, DNS, TFTP, GOPHER, FINGER, NNTP, RPC,
SUNNFS and SNMP
Note:
When using an inbound translation, be sure that all private addresses belong to the
existing systems.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...