P-660R-F1 Series User’s Guide
11
6.1 NAT Overview
.....................................................................................................................
75
6.1.1 NAT Definitions
...........................................................................................................
75
6.1.2 What NAT Does
..........................................................................................................
76
6.1.3 How NAT Works
.........................................................................................................
76
6.1.4 NAT Application
..........................................................................................................
77
6.1.5 NAT Mapping Types
...................................................................................................
77
6.2 SUA (Single User Account) Versus NAT
..............................................................................
78
6.3 NAT General Setup
.............................................................................................................
79
6.4 Port Forwarding
....................................................................................................................
80
6.4.1 Default Server IP Address
..........................................................................................
80
6.4.2 Port Forwarding: Services and Port Numbers
............................................................
80
6.4.3 Configuring Servers Behind Port Forwarding (Example)
............................................
81
6.5 Configuring Port Forwarding
...............................................................................................
81
6.5.1 Port Forwarding Rule Edit
.........................................................................................
82
6.6 The SIP ALG Screen
...........................................................................................................
83
6.7 DMZ Hosting
.......................................................................................................................
84
Chapter
7
Firewalls
..................................................................................................................................
85
7.1 Overview
..............................................................................................................................
85
7.1.1 What You Can Do in the Firewall Screens
..................................................................
85
7.1.2 What You Need to Know About Firewall
.....................................................................
85
7.1.3 Firewall Rule Setup Example
.....................................................................................
86
7.2 The Firewall General Screen
...............................................................................................
89
7.3 The Firewall Rule Screen
.....................................................................................................
90
7.3.1 Configuring Firewall Rules
........................................................................................
93
7.3.2 Customized Services
.................................................................................................
94
7.3.3 Configuring a Customized Service
...........................................................................
95
7.4 The Firewall Threshold Screen
............................................................................................
96
7.4.1 Threshold Values
........................................................................................................
97
7.4.2 Configuring Firewall Thresholds
.................................................................................
97
7.5 Firewall Technical Reference
...............................................................................................
99
7.5.1 Firewall Rules Overview
.............................................................................................
99
7.5.2 Guidelines For Enhancing Security With Your Firewall
............................................
100
7.5.3 Security Considerations
............................................................................................
100
7.5.4 Triangle Route
..........................................................................................................
101
Chapter
8
Packet Filters
......................................................................................................................
105
8.1 Overview
............................................................................................................................
105
8.1.1 What You Can Do in the Packet Filter Screen
..........................................................
105
8.1.2 What You Need to Know About the Packet Filter
.....................................................
105
8.2 The Packet Filter Screen
....................................................................................................
105