IPv4 Firewall Protection
128
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
LAN WAN or DMZ WAN Inbound Rule: Set Up One-to-One NAT Mapping
In this example, multi-NAT is configured to support multiple public IP addresses on one WAN
interface. An inbound rule configures the wireless VPN firewall to host an additional public IP
address and associate this address with a web server on the LAN.
The following addressing scheme is used to illustrate this procedure:
• NETGE
AR wireless VPN firewall:
- W
AN IP address. 10.1.0.118
- LAN IP addre
ss subnet. 192.168.1.1 with subnet 255.255.255.0
- DMZ IP a
ddress subnet. 192.168.10.1 with subnet 255.255.255.0
• W
eb server PC on the wireless VPN firewall’s LAN:
- LAN IP addre
ss. 192.168.1.2
- DMZ IP a
ddress. 192.168.10.2
- Access to web serve
r is (simulated) public IP address. 10.1.0.52
Tip: If you arra
nge with your ISP to have more than one public IP address for
your use, you can use the additional public IP addresses to map to
servers on your LAN or DMZ. One of these public IP addresses is used
as the primary IP address of the router that provides Internet access to
your LAN PCs through NAT. The other addresses are available to map to
your servers.
To configure the wireless VPN firewall for additional IP addresses:
1. Select Security > Firewall. Th
e Firewall submenu tabs display.
2. If
your server is to be on your LAN, click the LAN WAN Rules submenu tab. (This is the
screen used in this example). If your server is to be on your DMZ, click the DMZ WAN
Rules submenu tab.
3. Click the Add t
able button under the Inbound Services table. The Add LAN WAN Inbound
Service screen displays: