![Vertiv Avocent Installer/User Manual Download Page 79](http://html.mh-extra.com/html/vertiv/avocent/avocent_installer-user-manual_1008004079.webp)
6.5 Firewall and NAT
The firewall and NAT feature enables an administrator to configure the rules governing traffic filtering, IP forwarding and
address translation within the appliance.
NOTE: The appliance is specially designed for managing and providing access to device management consoles. It is
not supported as a general purpose router, switch or packet filter.
The firewall and NAT features are built from a series of named definitions for networks, hosts, interfaces and services. Before
you can configure the firewall and NAT policies, you must define the objects that will be used within the policy rules. It is
best to start by defining the interfaces, then defining the networks that will be referenced by your policy rules before finally
defining the hosts and services. Each of these are described in the next sections.
The appliance will already have knowledge of various hosts, networks and interfaces; these objects will be created at the
time they are defined or discovered by the appliance. For example, upon connecting a UMIQ module to the appliance, a
host definition will be created matching the name assigned to the UMIQ module target.
6.5.1 Interfaces
By default, all physical and virtual interfaces defined within the appliance will be listed on the Interfaces tab. You can access
the Interfaces tab by clicking
Firewall and NAT
from the sidebar.
New virtual interfaces can be made for use with private ports by clicking
Administration - Targets - Port Configuration -
Network Settings
. For more information on creating an interface, see
Figure 6.3 Interfaces Tab
Vertiv
| Avocent® Universal Management Gateway Appliance Installer/User Guide |
73