This is done using by configuring policies. First, what interfaces are being used? Once you can determine the interfaces, you will need to check the zones assigned to each. If the WAN and LAN are bound to the trust, you don't need a policy. If the traffic crosses zones, you will need a policy. The exception to this rule is when you have intra zone blocking enabled. When you are creating the policies, you select objects from the address book. That said, you may need need to create custom service and address objects prior to configuring a rule. This is where you would define the subnets, IPs and ports/services. If you require NAT, you have the option to use MIPs and VIPs. A mapped IP is used for one to one NAT. You can bind a MIP to a interface so that the IP is translated to a single internal IP via Policy. If you need to use a single IP translating to a single host over several ports, you can use a VIP. This would allow you to map a single IP to an internal server running for example HTTP and FTP. Does this help? Let me know.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.