
Now that we’ve seen some of the other ways NAT and PAT can be used to
carefully control inbound and outbound traffic, let’s look at how to create these con-
figurations.
NAT Policy Basics
First, let’s familiarize ourselves with the policy creation screen; each of the fields
refers to previously defined objects such as IP addresses, defined services, or firewall
interfaces (Figure 7.10).
Figure 7.10 Add NAT Policy Screen
Each of the eight main fields refers to the various components of the packet that
can be identified or transformed:
■
Original Source The Source IP address of the packet entering the fire-
wall.This entry can be a single host IP address, a range ...