D-Link DFL-1000 [47/168] Virtual ips

D-Link DFL-1000 [47/168] Virtual ips
DFL-1000 User Manual
4
7
Arranging a one-time schedule in the policy list to deny access
Virtual IPs
NAT mode security policies hide the addresses of more secure networks from less secure networks. To
allow connections from a less secure network to an address in a more secure network, you must create a
mapping between an address in the less secure network and an address in the more secure network.
This mapping is called a virtual IP.
For example, if the computer hosting your web server is located on your DMZ network, it could have a
private IP address such as 10.10.10.3. To get packets from the Internet to the web server, you must have
an external address for the web server on the Internet. You must then add a virtual IP that maps the
external IP address of the web server to the actual address of the web server on the DMZ network. To
allow connections from the Internet to the web server, you must then add an Ext
->
DMZ firewall policy
and set Destination to the virtual IP.
You can create two types of virtual IPs:
Static NAT
Used in Ext -> Int, Ext -> DMZ, and DMZ -> Int policies to translate an address on a less secure
network to a hidden address on a more secure network. Static NAT translates the source address of
outbound packets to the address on the less secure network.
Port
Forwarding
Used in Ext
->
Int, Ext
->
DMZ, and DMZ
->
Int policies to translate an address and a port
number on a less secure network to a hidden address and, optionally, a different port number on a
more secure network. Using port forwarding you can also route packets with a specific port number
and a destination address that matches the IP address of the interface that receives the packets.
This technique is called port forwarding or port address translation (PAT). You can also use port
forwarding to change the destination port of the forwarded packets.
If you use the setup wizard to configure internal server settings, the firewall adds port forwarding virtual IPs
and policies for each server that you configure. For each server located on your internal network the firewall
adds an Ext
->
Int policy. For each server located on your DMZ network, the firewall adds an Ext
->
DMZ
policy.
Virtual IPs are not required in Transparent mode.
This section describes:
Adding static NAT virtual IPsSee Adding static NAT virtual IPs
Adding static NAT virtual IPsSee Adding port forwarding virtual IPs
Adding static NAT virtual IPsSee Adding policies with virtual IPs
Adding static NAT virtual IPs
Go to Firewall > Virtual IP .

Содержание

Скачать