
Chapter 12 NAT
USG20(W)-VPN Series User’s Guide
260
Port Mapping Type
Use the drop-down list box to select how many original destination ports this NAT rule
supports for the selected destination IP address (
Original IP
). Choices are:
Any
- this NAT rule supports all the destination ports.
Port
- this NAT rule supports one destination port.
Ports
- this NAT rule supports a range of destination ports. You might use a range of
destination ports for unknown services or when one server supports more than one
service.
Service
- this NAT rule supports a service such as FTP (see
Object > Service >
Service
)
Service-Group
- this NAT rule supports a group of services such as all service objects
related to DNS (see
Object > Service > Service Group
)
Protocol Type
This field is available if
Mapping Type
is
Port
or
Ports
. Select the protocol (
TCP
,
UDP
, or
Any
) used by the service requesting the connection.
Original Port
This field is available if
Mapping Type
is
Port
. Enter the original destination port this
NAT rule supports.
Mapped Port
This field is available if
Mapping Type
is
Port
. Enter the translated destination port if
this NAT rule forwards the packet.
Original Start Port
This field is available if
Mapping Type
is
Ports
. Enter the beginning of the range of
original destination ports this NAT rule supports.
Original End Port
This field is available if
Mapping Type
is
Ports
. Enter the end of the range of original
destination ports this NAT rule supports.
Mapped Start Port
This field is available if
Mapping Type
is
Ports
. Enter the beginning of the range of
translated destination ports if this NAT rule forwards the packet.
Mapped End Port
This field is available if
Mapping Type
is
Ports
. Enter the end of the range of
translated destination ports if this NAT rule forwards the packet. The original port
range and the mapped port range must be the same size.
Enable NAT
Loopback
Enable NAT loopback to allow users connected to any interface (instead of just the
specified
Incoming Interface
) to use the NAT rule’s specified
Original IP
address to
access the
Mapped IP
device. For users connected to the same interface as the
Mapped IP
device, the USG uses that interface’s IP address as the source address for
the traffic it sends from the users to the
Mapped IP
device.
For example, if you configure a NAT rule to forward traffic from the WAN to a LAN
server, enabling NAT loopback allows users connected to other interfaces to also
access the server. For LAN users, the USG uses the LAN interface’s IP address as the
source address for the traffic it sends to the LAN server. See
for more details.
If you do not enable NAT loopback, this NAT rule only applies to packets received on
the rule’s specified incoming interface.
Security Policy
By default the security policy blocks incoming connections from external addresses.
After you configure your NAT rule settings, click the
Security Policy
link to configure
a security policy to allow the NAT rule’s traffic to come in.
The USG checks NAT rules before it applies To-USG security policies, so To-USG
security policies, do not apply to traffic that is forwarded by NAT rules. The USG still
checks other security policies, according to the source IP address and mapped IP
address.
OK
Click
OK
to save your changes back to the USG.
Cancel
Click
Cancel
to return to the
NAT
summary screen without creating the NAT rule (if it
is new) or saving any changes (if it already exists).
Table 105
Configuration > Network > NAT > Add (continued)
LABEL
DESCRIPTION
Содержание ZyWall USG20-VPN
Страница 17: ...17 PART I User s Guide ...
Страница 18: ...18 ...
Страница 99: ...99 PART II Technical Reference ...
Страница 100: ...100 ...
Страница 151: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 151 Configuration Network Interface Ethernet Edit External Type ...
Страница 152: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 152 Configuration Network Interface Ethernet Edit External Type ...
Страница 154: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 154 Configuration Network Interface Ethernet Edit Internal Type ...
Страница 155: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 155 Figure 121 Configuration Network Interface Ethernet Edit OPT ...
Страница 156: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 156 Configuration Network Interface Ethernet Edit OPT ...
Страница 170: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 170 Figure 127 Configuration Network Interface PPP Add ...
Страница 178: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 178 Figure 129 Configuration Network Interface Cellular Add Edit ...
Страница 194: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 194 Figure 139 Configuration Network Interface VLAN Add Edit ...
Страница 206: ...Chapter 9 Interfaces USG20 W VPN Series User s Guide 206 Figure 141 Configuration Network Interface Bridge Add Edit ...
Страница 282: ...Chapter 15 UPnP USG20 W VPN Series User s Guide 282 Figure 190 Network Connections My Network Places Properties Example ...
Страница 340: ...Chapter 21 IPSec VPN USG20 W VPN Series User s Guide 340 Figure 226 Configuration VPN IPSec VPN VPN Connection Edit IKE ...
Страница 348: ...Chapter 21 IPSec VPN USG20 W VPN Series User s Guide 348 Figure 228 Configuration VPN IPSec VPN VPN Gateway Add Edit ...
Страница 378: ...Chapter 22 SSL VPN USG20 W VPN Series User s Guide 378 Create a Web Application SSL Application Object ...
Страница 591: ...Chapter 31 Log and Report USG20 W VPN Series User s Guide 591 Figure 418 Configuration Log Report Email Daily Report ...
Страница 659: ...Appendix B Legal Information USG20 W VPN Series User s Guide 659 Environmental Product Declaration ...