D-Link DFL-800-AV-12 User Manual - Page 216

Port Translation, 7.3.5. Protocols handled by SAT, Port Address Translation

Page 216 highlights

7.3.4. Port Translation Chapter 7. Address Translation NetDefendOS can be used to translate ranges and/or groups into just one IP address. # Action Src Iface 1 SAT any Src Net all-nets Dest Iface core Dest Net 194.1.2.16-194.1.2.20, 194.1.2.30 Parameters http SETDEST all-to-one 192.168.0.50 80 This rule produces a N:1 translation of all addresses in the group (the range 194.1.2.16 - 194.1.2.20 and 194.1.2.30) to the IP 192.168.0.50. • Attempts to communicate with 194.1.2.16, port 80, will result in a connection to 192.168.0.50 • Attempts to communicate with 194.1.2.30, port 80, will result in a connection to 192.168.0.50 Note When all-nets is the destination, All-to-One mapping is always done. 7.3.4. Port Translation Port Translation, also known as Port Address Translation (PAT), can be used to modify the source or destination port. # Action Src Iface 1 SAT any Src Net all-nets Dest Iface Dest Net Parameters core wwwsrv_pub TCP 80-85 SETDEST 192.168.0.50 1080 This rule produces a 1:1 translation of all ports in the range 80 - 85 to the range 1080 - 1085. • Attempts to communicate with the web servers public address, port 80, will result in a connection to the web servers private address, port 1080. • Attempts to communicate with the web servers public address, port 84, will result in a connection to the web servers private address, port 1084. Note In order to create a SAT Rule that allows port transation, a Custom Service must be used with the SAT Rule. 7.3.5. Protocols handled by SAT Generally, static address translation can handle all protocols that allow address translation to take place. However, there are protocols that can only be translated in special cases, and other protocols that simply cannot be translated at all. Protocols that are impossible to translate using SAT are most likely also impossible to translate using NAT. Reasons for this include: • The protocol cryptographically requires that the addresses are unaltered; this applies to many VPN protocols. • The protocol embeds its IP addresses inside the TCP or UDP level data, and subsequently requires that, in some way or another, the addresses visible on IP level are the same as those embedded in the data. Examples of this include FTP and logons to NT domains via NetBIOS. • Either party is attempting to open new dynamic connections to the addresses visible to that party. In some cases, this can be resolved by modifying the application or the firewall 216

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

NetDefendOS can be used to translate ranges and/or groups into just one IP address.
#
Action
Src Iface
Src Net
Dest Iface
Dest Net
Parameters
1
SAT
any
all-nets
core
194.1.2.16-194.1.2.20,
194.1.2.30
http
SETDEST
all-to-one
192.168.0.50 80
This rule produces a N:1 translation of all addresses in the group (the range 194.1.2.16 - 194.1.2.20
and 194.1.2.30) to the IP 192.168.0.50.
Attempts to communicate with 194.1.2.16, port 80, will result in a connection to 192.168.0.50
Attempts to communicate with 194.1.2.30, port 80, will result in a connection to 192.168.0.50
Note
When all-nets is the destination, All-to-One mapping is always done.
7.3.4. Port Translation
Port Translation
, also known as
Port Address Translation
(PAT), can be used to modify the source
or destination port.
#
Action
Src Iface
Src Net
Dest Iface
Dest Net
Parameters
1
SAT
any
all-nets
core
wwwsrv_pub
TCP 80-85 SETDEST 192.168.0.50 1080
This rule produces a 1:1 translation of all ports in the range 80 - 85 to the range 1080 - 1085.
Attempts to communicate with the web servers public address, port 80, will result in a
connection to the web servers private address, port 1080.
Attempts to communicate with the web servers public address, port 84, will result in a
connection to the web servers private address, port 1084.
Note
In order to create a SAT Rule that allows port transation, a Custom Service must be
used with the SAT Rule.
7.3.5. Protocols handled by SAT
Generally, static address translation can handle all protocols that allow address translation to take
place. However, there are protocols that can only be translated in special cases, and other protocols
that simply cannot be translated at all.
Protocols that are impossible to translate using SAT are most likely also impossible to translate
using NAT. Reasons for this include:
The protocol cryptographically requires that the addresses are unaltered; this applies to many
VPN protocols.
The protocol embeds its IP addresses inside the TCP or UDP level data, and subsequently
requires that, in some way or another, the addresses visible on IP level are the same as those
embedded in the data. Examples of this include FTP and logons to NT domains via NetBIOS.
Either party is attempting to open new dynamic connections to the addresses visible to that
party. In some cases, this can be resolved by modifying the application or the firewall
7.3.4. Port Translation
Chapter 7. Address Translation
216