Skip to Main Content
Configuring SonicWALL Firewalls
book

Configuring SonicWALL Firewalls

by Dan Bendell
May 2006
Intermediate to advanced content levelIntermediate to advanced
600 pages
15h 25m
English
Syngress
Content preview from Configuring SonicWALL Firewalls
Now that we’ve seen some of the other ways NAT and PAT can be used to
carefully control inbound and outbound traffic, let’s look at how to create these con-
figurations.
NAT Policy Basics
First, let’s familiarize ourselves with the policy creation screen; each of the fields
refers to previously defined objects such as IP addresses, defined services, or firewall
interfaces (Figure 7.10).
Figure 7.10 Add NAT Policy Screen
Each of the eight main fields refers to the various components of the packet that
can be identified or transformed:
Original Source The Source IP address of the packet entering the fire-
wall.This entry can be a single host IP address, a range ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Mastering VMware vSphere 6.7

Mastering VMware vSphere 6.7

Nick Marshall, Mike Brown, G. Blair Fritz, Ryan Johnson
Mastering VMware vSphere 6.7 - Second Edition

Mastering VMware vSphere 6.7 - Second Edition

Martin Gavanda, Andrea Mauro, Paolo Valsecchi, Karel Novak

Publisher Resources

ISBN: 1597492507