Quick Reference Guide

Table Of Contents
52 | Chapter 4: Firewall Protection and Content Filtering
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
LAN WAN Inbound Rule: Setting Up One-to-One NAT Mapping
If you arrange with your ISP to have more than one public IP address for your use, you can
use the additional public IP addresses to map to servers on your LAN. One of these public IP
addresses will be used as the primary IP address of the VPN firewall. This address will be
used to provide Internet access to your LAN PCs through NAT. The other addresses are
available to map to your servers.
In the example shown in , we have configured multi-NAT to support multiple public IP
addresses on one WAN interface. The inbound rule instructs the VPN firewall to host an
additional public IP address (10.1.0.5) and to associate this address with the Web server on
the LAN (at 192.168.1.1). We also instruct the VPN firewall to translate the incoming HTTP
port number (port 80) to a different port number (port 8080).
This example uses the following addressing scheme:
VPN firewall FVS336Gv2
- WAN1 primary public IP address: 10.1.0.1
- WAN1 additional public IP address: 10.1.0.5
- LAN IP address 192.168.1.1
Web server PC on the VPN firewall’s LAN
- LAN IP address: 192.168.1.11
- Port number for Web service: 8080
To test the connection from a PC on the WAN side, type http://10.1.0.5. The home page of
the Web server should appear.
LAN WAN Inbound Rule: Specifying an Exposed Host
Specifying an exposed host allows you to set up a computer or server that is available to
anyone on the Internet for services that you have not yet defined.