SonicWALL manual SonicWALL NSA 5000/4500/3500 Getting Started Guide

Page 42

Before configuring NAT Policies, you must create all Address Objects associated with the policy. For instance, if you are creating a One-to-One NAT policy, first create Address Objects for your public and private IP addresses.

Address Objects are one of four object classes (Address, User, Service and Schedule) in SonicOS Enhanced. These Address Objects allow for entities to be defined one time, and to be re- used in multiple referential instances throughout the SonicOS interface. For example, take an internal Web server with an IP address of 67.115.118.80. Rather than repeatedly typing in the IP address when constructing Access Rules or NAT Policies, Address Objects allow you to create a single entity called “My Web Server” as a Host Address Object with an IP address of 67.115.118.80. This Address Object, “My Web Server”, can then be easily and efficiently selected from a drop-down menu in any configuration screen that employs Address Objects as a defining criterion.

Since there are multiple types of network address expressions, there are currently the following Address Objects types:

Host – Host Address Objects define a single host by its IP address.

Range – Range Address Objects define a range of contiguous IP addresses.

Network – Network Address Objects are like Range objects in that they comprise multiple hosts, but rather than being bound by specified upper and lower range delimiters, the boundaries are defined by a valid netmask.

MAC Address – MAC Address Objects allow for the identification of a host by its hardware address or MAC (Media Access Control) address.

FQDN Address – FQDN Address Objects allow for the identification of a host by its Fully Qualified Domain Names (FQDN), such as www.sonicwall.com.

SonicOS Enhanced provides a number of Default Address Objects that cannot be modified or deleted. You can use the Default Address Objects when creating a NAT policy, or you can create custom Address Objects to use. All Address Objects are available in the drop-down lists when creating a NAT policy.

SonicWALL NSA 5000/4500/3500 Getting Started Guide Page 41

Image 42
Contents Getting Started Guide Document Contents SonicWALL NSA Getting Started GuideBack SonicWALL NSA SeriesPre-Configuration Tasks This SectionCheck Package Contents Obtain Internet Service Provider ISP Information Obtain Configuration InformationAdministrator Information Registration InformationFront Panel Power Supply Back Panel8 The Back Panel Registering Your Appliance on mysonicwall.com Before You Register Registering and Licensing Your Appliance on mysonicwall.com Product RegistrationGateway Services Licensing Security Services and SoftwareService Bundles Support ServicesSonicWALL NSA 5000/4500/3500 Getting Started Guide Registering a Second Appliance as a Backup Registration Next StepsDeployment Scenarios ABC Selecting a Deployment ScenarioScenario a NAT/Route Mode Gateway Scenario B State Sync Pair in NAT/Route Mode Scenario C L2 Bridge Mode Initial Setup Connecting the WAN PortSystem Requirements Connecting the LAN Port Applying PowerAccessing the Management Interface Accessing the Setup WizardConnecting to Your Network Testing Your ConnectionActivating Licenses in SonicOS Saving a Backup Copy of Your Preferences Upgrading Firmware on Your SonicWALLObtaining the Latest Firmware Using SafeMode to Upgrade Firmware Upgrading the Firmware with Current SettingsUpgrading the Firmware with Factory Defaults On the System Settings page, click Upload New FirmwareUploaded Firmware New Confirmation dialog box, click OK to proceedConfiguring a State Sync Pair in NAT/Route Mode Initial High Availability SetupScenario B Configuring High Availability Configuring Advanced HA SettingsNavigate to the High Availability Advanced 30 Configuring a State Sync Pair in NAT/Route Mode Synchronizing Settings Adjusting High Availability Settings Synchronizing FirmwareHA License Configuration Overview Associating Pre-Registered Appliances Click RegisterConfiguring L2 Bridge Mode Configuring the Primary Bridge InterfaceConnection Overview Configuring the Secondary Bridge Interface IP Assignment drop-down, select Layer 2 Bridged ModeAdditional Deployment Configuration Creating Network Access Rules WAN DMZSonicWALL NSA 5000/4500/3500 Getting Started Guide Creating a NAT Policy SonicWALL NSA 5000/4500/3500 Getting Started Guide Configuring Address Objects Configuring NAT Policies Leave Create a reflexive policy uncheckedEnabling Security Services in SonicOS Enabling Gateway Anti-VirusSonicWALL NSA 5000/4500/3500 Getting Started Guide Enabling Intrusion Prevention Services Security Services Gateway Anti-Virus page, click AcceptSecurity Services Intrusion Prevention page, click Accept Enabling Anti-Spyware Applying Security Services to Network Zones Deploying SonicPoints for Wireless Access Configuring SonicPoint Provisioning ProfilesUpdating SonicPoint Firmware Select Enable SonicPoint 802.11g Radio tab Select Enable RadioConfiguring a Wireless Zone Assigning an Interface to the Wireless Zone Connecting the SonicPoint Troubleshooting Diagnostic Tools Using Packet CaptureUsing Ping Using the Active Connections Monitor Using Log View Deployment Configuration Reference Checklist For this Task See this ChapterSupport and Training Options Support Services Customer SupportSonicWALL Live Product Demos Knowledge PortalUser Forums Training Related Documentation Product Safety and Regulatory Information Rack Mounting the SonicWALL Safety and Regulatory InformationLithium Battery Warning Cable ConnectionsHinweis zur Lithiumbatterie Safety and Regulatory Information in GermanWeitere Hinweise zur Montage KabelverbindungenCispr 22 EN 55022 Class a FCC Part 15 Class a NoticeCanadian Radio Frequency Emissions Statement Regulatory Information for KoreaCopyright Notice Trademarks70 Notes SonicWALL NSA 5000/4500/3500 Getting Started Guide 72 Notes Rev a 01/08