95
6623-3201
The following options can be set for each custom NAT:
Enabled
Set the
enabled
check box to have the rule installed in the
firewall. A rule can be temporarily disabled by unchecking this
box.
NAT Type
Determines the type of NAT the entry will perform.
Apply to
When entering a destination NAT, there are two places the
NAT can be applied:
Incoming packets
•
The rule will be applied to packets received from
the unit's network interfaces.
Locally generated packets
•
The rule will be applied to packets generated by
one of the unit's internal services.
Incoming interface
If selected, packets will be matched based on the network
interface they have been received on. Note that this can only
be applied to a Destination NAT on Incoming packets.
Outgoing interface
If selected, packets will be matched based on the network
interface they will be transmitted on. Note that this can only
be applied to a Source NAT.
Protocol
If selected, packets will be matched based on their protocol
type. Note that if you wish to match on source or destination
ports, the protocol must be set to TCP or UDP.
Source address
If selected, either a single address (for example, 172.16.1.132)
or a subnet range (for example, 172.16.0.0/24) can be entered.
Only packets matching this source address will have the filter
applied to them.
Summary of Contents for MRD-310
Page 11: ...11 6623 3201 Figure 9 Status alarm page ...
Page 51: ...51 6623 3201 Figure 43 SMS Triggers configuration page ...
Page 55: ...55 6623 3201 Figure 46 SMS Triggers number to accept added ...
Page 125: ...125 6623 3201 Figure 93 IPsec Phase 2 configuration ...
Page 137: ...137 6623 3201 Figure 100 IPsec connection status Figure 101 IPsec connection status detail ...