P-660R-F1 Series User’s Guide
11
6.1 NAT Overview .....................................................................................................................75
6.1.1 NAT Definitions ...........................................................................................................75
6.1.2 What NAT Does ..........................................................................................................76
6.1.3 How NAT Works .........................................................................................................76
6.1.4 NAT Application ..........................................................................................................77
6.1.5 NAT Mapping Types ...................................................................................................77
6.2 SUA (Single User Account) Versus NAT ..............................................................................78
6.3 NAT General Setup .............................................................................................................79
6.4 Port Forwarding ....................................................................................................................80
6.4.1 Default Server IP Address ..........................................................................................80
6.4.2 Port Forwarding: Services and Port Numbers ............................................................80
6.4.3 Configuring Servers Behind Port Forwarding (Example) ............................................81
6.5 Configuring Port Forwarding ...............................................................................................81
6.5.1 Port Forwarding Rule Edit .........................................................................................82
6.6 The SIP ALG Screen ...........................................................................................................83
6.7 DMZ Hosting .......................................................................................................................84
Chapter 7
Firewalls .................................................................................................................................. 85
7.1 Overview ..............................................................................................................................85
7.1.1 What You Can Do in the Firewall Screens ..................................................................85
7.1.2 What You Need to Know About Firewall .....................................................................85
7.1.3 Firewall Rule Setup Example .....................................................................................86
7.2 The Firewall General Screen ...............................................................................................89
7.3 The Firewall Rule Screen .....................................................................................................90
7.3.1 Configuring Firewall Rules ........................................................................................93
7.3.2 Customized Services .................................................................................................94
7.3.3 Configuring a Customized Service ...........................................................................95
7.4 The Firewall Threshold Screen ............................................................................................96
7.4.1 Threshold Values ........................................................................................................97
7.4.2 Configuring Firewall Thresholds .................................................................................97
7.5 Firewall Technical Reference ...............................................................................................99
7.5.1 Firewall Rules Overview .............................................................................................99
7.5.2 Guidelines For Enhancing Security With Your Firewall ............................................100
7.5.3 Security Considerations ............................................................................................100
7.5.4 Triangle Route ..........................................................................................................101
Chapter 8
Packet Filters ...................................................................................................................... 105
8.1 Overview ............................................................................................................................105
8.1.1 What You Can Do in the Packet Filter Screen ..........................................................105
8.1.2 What You Need to Know About the Packet Filter .....................................................105
8.2 The Packet Filter Screen ....................................................................................................105