SonicWALL 5.8.1 Microscope & Magnifier User Manual


  Open as PDF
of 1490
 
Network > NAT Policies
357
SonicOS 5.8.1 Administrator Guide
Original Service: Any
Translated Service: Original
Inbound Interface: X2
Outbound Interface: X1
Comment: Enter a short description
Enable NAT Policy: Checked
Create a reflective policy: Unchecked
When done, click on the OK button to add a
nd activate the NAT Policy. This policy can be
duplicated for subnets behind the other interfaces of the SonicWALL security appliance – just
replace the Original Source with the subnet behind that interface, adjust the source interface,
and add another NAT policy.
Creating a Many-to-Many NAT Policy
The Many-to-Many NAT policy allows you to translate a group of addresses into a group of
different addresses. This allows the SonicWALL security appliance to utilize several addresses
to perform the dynamic translation. Thus allowing a much higher number of concurrent the
SonicWALL security appliance to perform up to a half-million concurrent connections across
the interfaces.
This policy is easy to set up and activate. You first need to go to the Network > Address
Objects and click on the Add button at the bottom of the screen. When the Add Address
Object window appears, enter in a description for the range in the Name field, choose Range
from the drop-down menu, enter the range of addresses (usually public IP addresses supplied
by your ISP) in the Starting IP Address and Ending IP Address fields, and select WAN as
the zone from the Zone Assignment menu. When done, click on the OK button to create the
range object.
Select Network > NAT Policies and click on the Add button. The Add NAT Policy window is
displayed. To create a NAT policy to allow the systems on the LAN interface (by default, the X0
interface) to initiate traffic using the public range addresses, choose the following from the
drop-down menus:
Original Source: LAN Primary Subnet
Translated Source: public_range
Original Destination: Any
Translated Destination: Original
Original Service: Any
Translated Service: Original
Inbound Interface: X0
Outbound Interface: X1
Comment: Enter a short description
Enable NAT Policy: Checked
Create a reflective policy: Unchecked
When done, click on the OK button to add and activate the NA
T Policy. With this policy in place,
the SonicWALL security appliance dynamically maps outgoing traffic using the four available
IP addresses in the range we created.