D-Link DFL-2500 User Guide - Page 133

Address translation in D-Link Firewall

Page 133 highlights

114 Chapter 14. IP Rules source and destination address and port numbers - it is possible to validate any or all of this information before passing the traffic. This checking helps the firewall to protect a private LAN against attacks from the outside. NAT mechanism discard all traffic that does not match a mapping table entry, therefore it is also regarded as a security device. However, NAT is not a substitute for firewall rules. There are TCP and UDP ports open corresponding to applications and services running on the NAT. If the NAT device is a computer, rather than a dedicated firewall, then the computer is vulnerable to attack. Therefore, the recommendation is to use NAT-enabled firewall with rule settings specified for traffic. 14.2.3 Address translation in D-Link Firewall D-Link firewalls support two types of address translation: dynamic (NAT hide), and static (SAT). Dynamic Network Address Translation The process of dynamic address translation involves the translation of multiple sender addresses into one or more sender addresses, like private IP addresses are mapped to a set of public IP addresses. Example: Dynamic NAT Sender Server 192.168.1.5 : 1038 → 195.55.66.77 : 80 FW tran 195.11.22.33: 32789 195.55.66.77 : 80 reply 195.11.22.33: 32789 195.55.66.77 : 80 FW rest 192.168.1.5 : 1038 ← 195.55.66.77 : 80 Table 14.1: Dynamic NAT. Table 14.1 shows a example of dynamic NAT, The sender, e.g. 192.168.1.5, sends a packet from a dynamically assigned port, for instance, port 1038, to a server, e.g. 195.55.66.77 port 80. Usually, the firewall translates the sender address to the address of the interface closest to the destination address. In this example, we use 195.11.22.33 as the public address. In addition, the firewall changes the D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

114
Chapter 14. IP Rules
source and destination address and port numbers - it is possible to validate
any or all of this information before passing the traffic. This checking helps
the firewall to protect a private LAN against attacks from the outside.
NAT mechanism discard all traffic that does not match a mapping table
entry, therefore it is also regarded as a security device. However, NAT is
not a substitute for firewall rules. There are TCP and UDP ports open
corresponding to applications and services running on the NAT. If the NAT
device is a computer, rather than a dedicated firewall, then the computer is
vulnerable to attack. Therefore, the recommendation is to use
NAT-enabled firewall with rule settings specified for traffic.
14.2.3
Address translation in D-Link Firewall
D-Link firewalls support two types of address translation:
dynamic
(NAT
hide), and
static
(SAT).
Dynamic Network Address Translation
The process of dynamic address translation involves the translation of
multiple sender addresses into one or more sender addresses, like private IP
addresses are mapped to a set of public IP addresses.
Example
:
Dynamic NAT
Sender
±
Server
192.168.1.5 : 1038
195.55.66.77 : 80
FW
tran
195.11.22.33: 32789
±
195.55.66.77 : 80
reply
195.11.22.33: 32789
²
195.55.66.77 : 80
FW
rest
192.168.1.5 : 1038
195.55.66.77 : 80
Table 14.1: Dynamic NAT.
Table
14.1
shows a example of dynamic NAT, The sender, e.g. 192.168.1.5,
sends a packet from a dynamically assigned port, for instance, port 1038, to
a server, e.g. 195.55.66.77 port 80.
Usually, the firewall translates the sender address to the address of the
interface closest to the destination address. In this example, we use
195.11.22.33 as the public address. In addition, the firewall changes the
D-Link Firewalls User’s Guide