ZyXEL Communications G-2000 Plus User Manual
Page 18

ZyAIR G-2000 Plus User’s Guide
17
Table of Contents
28.1.1 SUA (Single User Account) Versus NAT ..............................................294
28.2 Applying NAT .................................................................................................294
28.3 NAT Setup ......................................................................................................296
28.3.1.1 User-Defined Address Mapping Sets ..........................................298
28.3.1.2 Ordering Your Rules ....................................................................299
28.4 Configuring a Server behind NAT ..................................................................301
28.5 General NAT Examples ..................................................................................302
28.5.1 Example 1: Internet Access Only ..........................................................302
28.5.2 Example 2: Internet Access with an Inside Server ...............................303
28.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............304
28.5.4 Example 4: NAT Unfriendly Application Programs ...............................308
29.2.1 Configuring a Filter Rule .......................................................................316
29.2.2 Configuring a TCP/IP Filter Rule ..........................................................317
29.2.3 Configuring a Generic Filter Rule .........................................................319
29.3 Example Filter ................................................................................................321
29.4 Filter Types and NAT ......................................................................................323
29.5 Firewall Versus Filters ....................................................................................324
29.6 Applying a Filter ............................................................................................324
29.6.1 Applying LAN Filters .............................................................................324
29.6.2 Applying Remote Node Filters ..............................................................325