HP VPN Firewall Appliances NAT and ALG Configuration Guide
30
# Associate address pool 1 and ACL 2001 with the outbound interface GigabitEthernet 0/2.
• No-PAT
[Firewall] interface gigabitethernet 0/2
[Firewall-GigabitEthernet0/2] nat outbound 2001 address-group 1 no-pat
[Firewall-GigabitEthernet0/2] quit
• NAPT
[Firewall] interface gigabitethernet 0/2
[Firewall-GigabitEthernet0/2] nat outbound 2001 address-group 1
[Firewall-GigabitEthernet0/2] quit
Common internal server configuration example
Network requirements
As shown in Figure 28, a company provides two Web servers, one FTP server, and one SMTP server for
external users to access. The internal network address is 10.110.0.0/16. The internal address for the FTP
server is 10.110.10.3/16, for Web server 1 is 10.110.10.1/16, for Web server 2 is 10.110.10.2/16, and
for the SMTP server is 10.110.10.4/16. The company has three public IP addresses in the range of
202.38.1.1/24 to 202.38.1.3/24. Specifically, the company has the following requirements:
• External hosts can access internal servers with public address 202.38.1.1/24.
• Port 8080 is used for Web server 2.
Figure 28 Network diagram
Configuration procedure
# As shown in Figure 28, configure the IP addresses for the interfaces. (Details not shown.)
# Enter interface GigabitEthernet 0/2 view.
<Firewall> system-view
[Firewall] interface gigabitethernet 0/2
# Configure the internal FTP server.
[Firewall-GigabitEthernet0/2] nat server protocol tcp global 202.38.1.1 21 inside
10.110.10.3 ftp
# Configure the internal Web server 1.
[Firewall-GigabitEthernet0/2] nat server protocol tcp global 202.38.1.1 80 inside
10.110.10.1 www
# Configure the internal Web server 2.
FTP server
10.110.10.3/16
Web server 1
10.110.10.1/16
Web server 2
10.110.10.2/16
SMTP server
10.110.10.4/16
Host
Internet
GE0/1
10.110.10.10/16
GE0/2
202.38.1.1/24
Firewall