Kerio Tech KERIO WINROUTE FIREWALL 6 User Manual
Page 88

Chapter 7
Traffic Policy
88
Destination NAT (port mapping):
Destination address translation (also called port mapping) is used to allow access to services
hosted in private local networks behind the firewall. All incoming packets that meet defined
rules are re-directed to a defined host (destination address is changed). This actually “moves”
to the Internet interface of the WinRoute host (i.e. IP address it is mapped from). From the
client’s point of view, the service is running on the IP address from which it is mapped (usually
on the firewall’s IP address).
Options for destination NAT (port mapping):
Figure 7.18
Traffic rule — destination address translation
•
No Translation — destination address will not be modified.
•
Translate to — IP address that will substitute the packet’s destination address. This
address also represents the IP address of the host on which the service is actually
running.
The Translate to entry can be also specified by DNS name of the destination computer.
In such cases WinRoute finds a corresponding IP address using a DNS query.
Warning
We recommend you not to use names of computers which are not recorded in the local
DNS since rule is not applied until a corresponding IP address is found. This might
cause temporary malfunction of the mapped service.
•
Translate port to — during the process of IP translation you can also substitute the
port of the appropriate service. This means that the service can run at a port that is
different from the port where it is available from the Internet.
Note: This option cannot be used unless only one service is defined in the Service entry
within the appropriate traffic rule and this service uses only one port or port range.
For examples of traffic rules for port mapping and their settings, refer to chapter
Log
The following actions can be taken to log traffic:
•
Log matching packets — all packets matching with rule (permitted, denied or dropped,
according to the rule definition) will be logged in the Filter log.
•
Log matching connections — all connections matching this rule will be logged in the
Connection log (only for permit rules). Individual packets included in these connec-
tions will not be logged.