671
Field descriptions
Assets field descriptions
This allocated pool of addresses is dynamically assigned to connecting clients. An IP address becomes
available for reassignment again when the connection ends, and the assigned address is no longer in
use.
Associated tasks
The task that you can perform with this tab is:
■
Dynamic NAT Pool Properties—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
Static NAT Pool Properties—General tab
The Static NAT Pool Properties dialog box lets you map a client IP address to a specific NAT pool
address. The address map is then assigned in advance of the connection and is always the same.
You can only use subnet entities with static one-to-one NAT addressing, but you can have subnets
which consist of only one entity, if necessary. The mapping must also be one-to-one. In other words,
you must have the same number of entities in your real subnet as you do in your NAT subnet.
Table D-119
Dynamic NAT Pool Properties—General tab
Field
Description
NAT Pool name
A unique name for the dynamic NAT pool.
The maximum length is 256 characters.
Allowed characters are a-z, A-Z, numerals, periods (.), dashes (-), and underscores (_).
Do not include spaces in the name. The characters @,!,#,$,%,^,&,*,<,> and other reserved
characters are also invalid.
Use a name format such as symantecs.org.
Starting IP Address
Start address of the NAT pool address range.
If you need to allocate an entire network of addresses for a NAT pool, exclude all 0s and 1s in
the subnet broadcast address. For example, use 192.168.1.1 through 192.168.1.254 instead
of 192.168.1.0 through 192.168.1.255.
Ending IP Address
Ending address of the NAT pool address range.
The same recommendations for starting IP addresses apply to ending IP addresses.
Caption
An optional, brief description of the NAT pool.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...