HP TMS zl Module Security Administrator's Guide

2-63
Managing TMS zl Firewalls
Configuring Firewalls
d. Select Exit from the Services File menu to close the Services window.
Configuring NAT Policies
NAT policies have many uses. For example, you can use a NAT policy to
perform NAT on traffic that is transmitted between the public and private
networks. You can also use NAT to conceal your private IP addresses from
users in a guest VLAN or allow guest endpoints to access services in the
internal network.
You can also delete NAT policies and prioritize NAT policies to identify the
order in which they will be executed.
Some manual configuration must be completed at the TMS zl module before
NIM can be used to manage configurations, as explained in Configuring TMS
zl Modules.
See the TMS zl Module Administrator Guide for detailed information.
NAT policies and VPN policies support only single-entry address objects and
service objects. The following table identifies when you can use each object
type:
Object Type Firewall NAT Port Trigger VPN
Single-Entry
IP xxx x
IP Range x x x x
Network xxx x
Single Port x x x x
Schedule x
Multiple-Entry
IP x x
IP Range x x
Network x x
Domain x x
Port Range x x
Address Objects x x
Service Objects x