Edit Destination NAT
You can configure security devices running ScreenOS 5.x and later, to translate the
destination IP address. Enable Destination NAT and enter the destination IP address you
want to translate to.
Other destination NAT options include:
•
Destination Port—Your security devices can perform one-to-one destination NAT
without changing the destination port numbers. However, you can configure the device
to map the original destination port number in the segment header to another port
number.
•
To enable destination port translation, select
Destination Port
and enter the port
number you want to translate to.
•
To use the original destination port number, leave the default of None.
•
Upper IP Address—Your device can also translate the destination IP address to a range
of IP addresses. Select the
Upper IP Address
and enter the upper IP address. The
device uses an address shifting mechanism to maintain the relationships among the
original range of destination addresses after translating them to the new range of
addresses.
Using the Device Manager, you can also implement NAT on any device interface in any
zone except Untrust. For details, see NSM Online Help “Configuring Firewall/VPN Devices”.
For J Series devices, you can configure a NAT for a policy rule as one of the following:
•
An interface
•
A pool of a specific device interface
•
A PoolSet defined under the “source NAT” setting for a device (collection of IP ranges)
You cannot configure NAT settings for SRX Series gateways using Policy Manager. NAT
settings must be configured in the device for SRX Series gateways. However, if the device
is managed in central management mode, you can right-click the device and select
Policy
> View Pending Device Policy
to view all security policies that include NAT settings.
Enabling GTP for Firewall Rules
You can use a GTP object in a firewall rule to control how your security devices handle
GPRS traffic. To add a GTP object, you must have already configured the object in Object
Manager.
Configuring Traffic Shaping in a Security Policy
Traffic shaping enables you to control the amount of bandwidth that is available to the
matching network traffic in a rule. You can also define a priority that defines how the
security device handles the matching network traffic that exceeds the defined maximum
bandwidth. For security devices running ScreenOS 5.3 and later, you can also manage
the flow of traffic through the security device by limiting bandwidth at the point of ingress.
455
Copyright © 2010, Juniper Networks, Inc.
Chapter 9: Configuring Security Policies
Содержание NETWORK AND SECURITY MANAGER 2010.4 - ADMININISTRATION GUIDE REV1
Страница 6: ...Copyright 2010 Juniper Networks Inc vi...
Страница 36: ...Copyright 2010 Juniper Networks Inc xxxvi Network and Security Manager Administration Guide...
Страница 52: ...Copyright 2010 Juniper Networks Inc 2 Network and Security Manager Administration Guide...
Страница 90: ...Copyright 2010 Juniper Networks Inc 40 Network and Security Manager Administration Guide...
Страница 146: ...Copyright 2010 Juniper Networks Inc 96 Network and Security Manager Administration Guide...
Страница 236: ...Copyright 2010 Juniper Networks Inc 186 Network and Security Manager Administration Guide...
Страница 292: ...Copyright 2010 Juniper Networks Inc 242 Network and Security Manager Administration Guide...
Страница 314: ...Copyright 2010 Juniper Networks Inc 264 Network and Security Manager Administration Guide...
Страница 368: ...Copyright 2010 Juniper Networks Inc 318 Network and Security Manager Administration Guide...
Страница 370: ...Copyright 2010 Juniper Networks Inc 320 Network and Security Manager Administration Guide...
Страница 484: ...Copyright 2010 Juniper Networks Inc 434 Network and Security Manager Administration Guide...
Страница 584: ...Copyright 2010 Juniper Networks Inc 534 Network and Security Manager Administration Guide...
Страница 588: ...Copyright 2010 Juniper Networks Inc 538 Network and Security Manager Administration Guide...
Страница 600: ...Copyright 2010 Juniper Networks Inc 550 Network and Security Manager Administration Guide...
Страница 678: ...Copyright 2010 Juniper Networks Inc 628 Network and Security Manager Administration Guide...
Страница 694: ...Copyright 2010 Juniper Networks Inc 644 Network and Security Manager Administration Guide...
Страница 700: ...Copyright 2010 Juniper Networks Inc 650 Network and Security Manager Administration Guide...
Страница 706: ...Copyright 2010 Juniper Networks Inc 656 Network and Security Manager Administration Guide...
Страница 708: ...Copyright 2010 Juniper Networks Inc 658 Network and Security Manager Administration Guide...
Страница 758: ...Copyright 2010 Juniper Networks Inc 708 Network and Security Manager Administration Guide...
Страница 788: ...Copyright 2010 Juniper Networks Inc 738 Network and Security Manager Administration Guide...
Страница 882: ...Copyright 2010 Juniper Networks Inc 832 Network and Security Manager Administration Guide...
Страница 908: ...Copyright 2010 Juniper Networks Inc 858 Network and Security Manager Administration Guide...
Страница 918: ...Copyright 2010 Juniper Networks Inc 868 Network and Security Manager Administration Guide...
Страница 920: ...Copyright 2010 Juniper Networks Inc 870 Network and Security Manager Administration Guide...
Страница 1005: ...PART 6 Index Index on page 957 955 Copyright 2010 Juniper Networks Inc...
Страница 1006: ...Copyright 2010 Juniper Networks Inc 956 Network and Security Manager Administration Guide...