Prestige 1600 Universal Access Concentrator

9.1.3

 

How NAT works ...................................................................................................................................

9-2

9.1.4

 

NAT Mapping Types ............................................................................................................................

9-2

9.1.5 SUA (Single User Account) Versus NAT.............................................................................................

9-3

9.2 SMT Menus ...................................................................................................................................................

9-3

9.2.1 Applying NAT in the SMT Menus .......................................................................................................

9-3

9.2.2

 

Configuring NAT ..................................................................................................................................

9-5

9.2.3 Address Mapping Sets and NAT Server Sets:.......................................................................................

9-5

9.2.4

 

Ordering Your Rules .............................................................................................................................

9-7

9.3 NAT Server Sets............................................................................................................................................

9-9

9.3.1 Multiple Servers behind NAT ...............................................................................................................

9-9

9.3.2

 

Configuring Inside Servers....................................................................................................................

9-9

9.4 Examples.....................................................................................................................................................

9-10

9.4.1

 

Internet Access Only ...........................................................................................................................

9-10

9.4.2 Example 2 - Internet Access with a Default Inside Server..................................................................

9-11

9.4.3

 

Example 3 - General Case...................................................................................................................

9-12

9.4.4 NAT Unfriendly Application Programs..............................................................................................

9-14

9.4.5

 

Example 4 - Remote Management ......................................................................................................

9-14

9.4.6 Applying NAT to the Ethernet Port ....................................................................................................

9-14

Chapter 10

Filter Configuration............................................................................................................................................

10-1

10.1

About Filtering .........................................................................................................................................

10-1

10.2 The Filter Structure of the Prestige .........................................................................................................

10-1

10.3 Configuring a Filter Set............................................................................................................................

10-3

10.3.1 Filter Rules Summary Menu ...........................................................................................................

10-4

10.4 Configuring a Filter Rule..........................................................................................................................

10-5

10.5 Filter Types and NAT ...............................................................................................................................

10-5

10.5.1

TCP/IP Filter Rule...........................................................................................................................

10-6

10.5.2

Device Filter Rule ...........................................................................................................................

10-9

10.6

Applying a Filter.....................................................................................................................................

10-11

10.6.1

Ethernet traffic ..............................................................................................................................

10-11

10.6.2

Remote Node Filters .....................................................................................................................

10-12

10.7

Filter Example........................................................................................................................................

10-12

10.7.1 Configuring a FTP_WAN Filter Rule...........................................................................................

10-12

Chapter 11

SNMP Configuration ..........................................................................................................................................

11-1

11.1

About SNMP............................................................................................................................................

11-1

11.2

Supported MIBs.......................................................................................................................................

11-2

11.3

SNMP Configuration................................................................................................................................

11-2

11.4

SNMP Traps ............................................................................................................................................

11-3

 

 

Table of Contents

vii