
To add an IP policy, go to
Policies > Firewalling > Main IP Rules
. The
main
IP rule set will now
be displayed. Press the
Add
button and select
IP Policy
from the menu.
The properties for the new object will appear. In this example, the policy will be called
lan_to_wan
. The
Service
is set to
http-all
which is suitable for web browsing (it allows HTTP and
HTTPS connections).
The destination network is specified as the predefined
IP4 Address
object
all-nets
. This is used
since it cannot be known in advance to which IP address web browsing will be directed and
all-nets
allows browsing to any IP address. IP rule sets are processed in a top down fashion, with
the search ending at the first matching entry. An
all-nets
entry like this should be placed towards
the end of the rule set since other rules with narrower destination addresses should trigger first.
In addition to entering the above for the policy, the
Source Translation
should be set to NAT and
the
Address Action
left as
Outgoing Interface IP
. Note that the default source translation value for
an IP policy is
Auto
and this would also provide NAT translation between a private and public IP
address but NAT is specified explicitly in this section for clarity.
By using
NAT
, cOS Core will use the destination interface's IP address as the source IP. This means
that external hosts will send their responses back to the interface IP and cOS Core will
automatically forward the traffic back to the originating local host. Only the outgoing interface
therefore needs to have a public IPv4 address and the internal network topology is hidden.
For web browsing, public DNS lookup also needs to be allowed in order to resolve URIs into IP
addresses. The service
http-all
does not include the
DNS
protocol so a similar IP rule set entry that
allows this is needed. This could be done with a single IP policy that uses a custom service which
combines the
HTTP
and
DNS
protocols. However, the recommended method is to create an
entirely new IP set entry that specifies the service as
dns-all
. This provides more clarity when the
configuration is examined for problems. The screenshot below shows a new IP policy called
Chapter 4: cOS Core Configuration
55
Содержание NetWall 6000 Series
Страница 1: ...Clavister NetWall 6000 Series Getting Started Guide...
Страница 15: ...Chapter 1 NetWall 6000 Series Overview 15...
Страница 37: ...Chapter 3 Installation 37...
Страница 78: ...Chapter 4 cOS Core Configuration 78...