Scenarios Guide 5
Contents
1. Preface...................................................................................................... 7
About This Document .........................................................................................................8
Document Conventions ......................................................................................................8
Command Line Interface (CLI) Conventions ............................................................................... 8
Illustration Conventions ............................................................................................................... 8
Frequently Used Acronyms ......................................................................................................... 9
2. Scenarios................................................................................................ 11
NAT Scenarios .................................................................................................................12
Source NAT from a DIP Pool with PAT ..................................................................................... 12
Source NAT from the Egress Interface IP Address ................................................................... 14
Destination NAT to a Single IP Address Using Port Mapping ................................................... 16
Destination NAT to a Single IP Address without Port Mapping ................................................. 18
Destination NAT to Multiple IP Addresses with Port Mapping ................................................... 19
Policy Scenarios...............................................................................................................22
Interzone Policies ...................................................................................................................... 22
Intrazone Policies ...................................................................................................................... 24
Global Policies ........................................................................................................................... 26
VPN Scenarios ................................................................................................................. 27
Site-to-site VPN with AutoKey ...................................................................................................27
Site-to-Site VPN with Manual Keying ........................................................................................ 29
Network Attack Prevention ........................................................................................................ 31
Defending Against DoS and DDoS Attacks...................................................................... 32
ICMP Flood Prevention.............................................................................................................. 32
UDP Flood Prevention ............................................................................................................... 32
SYN Flood Prevention ............................................................................................................... 33
FIN Flood Prevention................................................................................................................. 33
IP Fragment Prevention............................................................................................................. 33
TCP-FIN-no-ACK....................................................................................................................... 34
Additional Attack Detection and Prevention ..................................................................... 35
Viewing Attack Settings ............................................................................................................. 35