Using Simple Dynamic NAT
User Guide
103
Service-based dynamic NAT
Each service is configured individually for
outgoing dynamic NAT.
N
OTE
Machines making incoming requests over a VPN connection
are allowed to access masqueraded hosts by their actual
private addresses.
Using Simple Dynamic NAT
In the majority of networks, the preferred security policy is
to globally apply network address translation to all outgo-
ing packets. Simple dynamic NAT provides a quick
method to set a NAT policy for your entire network. For
more information on this type of NAT, see the following
FAQ:
https://support.watchguard.com/advancedfaqs/
nat_howdynamicnat.asp
Enabling simple dynamic NAT
The default configuration of simple dynamic NAT enables
it from all non-routable addresses to the external network.
From Policy Manager:
1
Select
Setup
=>
NAT
.
The NAT Setup dialog box appears, as shown in the following
figure.
2
Select the checkbox marked
Enable Dynamic NAT
.
The default dynamic entries are:
•
192.168.0.0/16 - External
•
172.16.0.0/12 - External
•
10.0.0.0/8 - External
Summary of Contents for Firebox X1000
Page 1: ...WatchGuard Firebox System User Guide WatchGuard Firebox System...
Page 12: ...xii WatchGuard Firebox System...
Page 44: ...Chapter 2 Service and Support 22 WatchGuard Firebox System...
Page 61: ...Cabling the Firebox User Guide 39...
Page 68: ...Chapter 3 Getting Started 46 WatchGuard Firebox System...
Page 78: ...Chapter 4 Firebox Basics 56 WatchGuard Firebox System...
Page 156: ...Chapter 8 Configuring Filtered Services 134 WatchGuard Firebox System...
Page 182: ...Chapter 9 Configuring Proxied Services 160 WatchGuard Firebox System...
Page 220: ...Chapter 11 Intrusion Detection and Prevention 198 WatchGuard Firebox System...
Page 242: ...Chapter 12 Setting Up Logging and Notification 220 WatchGuard Firebox System...
Page 256: ...Chapter 13 Reviewing and Working with Log Files 234 WatchGuard Firebox System...
Page 274: ...Chapter 14 Generating Reports of Network Activity 252 WatchGuard Firebox System...