Cisco SA520-K9 Administration Guide - Page 112

Destination NAT Settings, Enable Port Forwarding

Page 112 highlights

Firewall Configuration Configuring Firewall Rules to Control Inbound and Outbound Traffic 4 • Service: Choose from a list of common services or a custom defined service. For more information, see Appendix B, "Standard Services" and Creating Custom Services, page 104. • Action: You can choose to block or to allow and to apply the rule always or only on a specified schedule. Choose BLOCK always, ALLOW always, BLOCK by schedule, or ALLOW by schedule. • Select Schedule: If you choose one of the "by schedule" actions, choose a schedule from the list. For more information about schedules, see Creating Schedules for a Firewall Rules, page 105. • Source Hosts: You can apply the rule to all users or you can specify users by entering an IP address or address range. - If you choose Single Address, enter an IP address in the From field. - If you choose Address Range, enter the first address in the From field and enter the last address in the To field. • Destination Hosts (available only if the traffic flow is from DMZ to LAN): You can apply the rule to all users or you can specify users by entering an IP address or address range. - If you choose Single Address, enter an IP address in the From field. - If you choose Address Range, enter the first address in the From field and enter the last address in the To field. • Local Server: Shows the IP address of the local server (only applies to IPv4 Firewall rules.) • Log: You can choose whether or not to log the packets for this rule. Click Never if you do not want to log the packets, or click Always to log the packets. STEP 4 For a WAN-to-LAN or a WAN-to-DMZ rule, enter the following information in the Destination NAT Settings area: • Internal IP Address: Enter the IP address of the server that is hosting the service. • Enable Port Forwarding: Check the box to forward traffic to a particular port. • Translate Port Number: If you enabled port forwarding, enter the port number that will be the destination for the forwarded traffic. Cisco SA500 Series Security Appliances Administration Guide 112

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

Firewall Configuration
Configuring Firewall Rules to Control Inbound and Outbound Traffic
Cisco SA500 Series Security Appliances Administration Guide
112
4
Service
: Choose from a list of common services or a custom defined service.
For more information, see
Appendix B, “Standard Services”
and
Creating
Custom Services, page104
.
Action:
You can choose to block or to allow and to apply the rule always or
only on a specified schedule. Choose BLOCK always, ALLOW always,
BLOCK by schedule, or ALLOW by schedule.
Select Schedule:
If you choose one of the “by schedule” actions, choose a
schedule from the list.
For more information about schedules, see
Creating Schedules for a
Firewall Rules, page 105
.
Source Hosts
: You can apply the rule to all users or you can specify users
by entering an IP address or address range.
-
If you choose Single Address, enter an IP address in the
From
field.
-
If you choose Address Range, enter the first address in the
From
field and
enter the last address in the
To
field.
Destination Hosts
(available only if the traffic flow is from DMZ to LAN
)
: You
can apply the rule to all users or you can specify users by entering an IP
address or address range.
-
If you choose Single Address, enter an IP address in the
From
field.
-
If you choose Address Range, enter the first address in the
From
field and
enter the last address in the
To
field.
Local Server:
Shows the IP address of the local server
(only applies to IPv4
Firewall rules.)
Log:
You can choose whether or not to log the packets for this rule. Click
Never
if you do not want to log the packets, or click
Always
to log the
packets.
STEP 4
For a WAN-to-LAN or a WAN-to-DMZ rule, enter the following information in the
Destination NAT Settings
area:
Internal IP Address:
Enter the IP address of the server that is hosting the
service.
Enable Port Forwarding:
Check the box to forward traffic to a particular
port.
Translate Port Number:
If you enabled port forwarding, enter the port
number that will be the destination for the forwarded traffic.