Solved

Router NAT/Transparent Mode

Posted on 2006-11-06
4
2,875 Views
Last Modified: 2013-11-29
i have fortigate 100. what is NAT/Transparent Mode? what's the difference?
why they have to change default setting when switching to NAT to Transparent?
http://www.fureai.or.jp/~htamura/gif/Snap4.gif
0
Comment
Question by:Hiroyuki Tamura
4 Comments
 
LVL 4

Accepted Solution

by:
periferral earned 50 total points
ID: 17883416
NAT is layer 3. It is used to change the IP addresses of private IP addressing to public IP addressing.
For example, if you have a network inside 192.168.0.X, this is a private IP address. You will then NAT this IP address to something else like 76.32.33.54 which is an internet routable IP address. This is commonly used in Routers and wireless gateways that connect to the internet.

Transparent mode means this is layer 2. This means that the device does not really have an IP address (in reality however one is assigned). Transparent mode is used in splitting up networks into 2 networks, secure and insure in cases of firewalls. For example. if you have a range of addresses 192.168.0.0-255. Lets says some of these machines are just hosts but others are servers. A sysadmin will split this network into 2 192.168.0.0-127 255.255.255.128 and assign these to hosts and then the other 128 to the servers. Then put a firewall in between them in transparent mode. Now even though all machines are a part of 1 network, you can firewall in between using layer 2, rather than layer 3. You need VLANs to separate the 2 networks.

0
 
LVL 76

Assisted Solution

by:arnold
arnold earned 75 total points
ID: 17883435
transparent mode means that the routees work does not require an alteration of the other systems.  In a NAT mode, the client systems will likely be assigned new IPs (in NAT that usually means that those will be private ips such as 192.168.0.4 with the router having the IP 192.168.0.1 which is also the default gateway.)
0
 

Author Comment

by:Hiroyuki Tamura
ID: 18047989
thank you, all:)
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Wireshark 7 53
SRX240 SYSLOG Setting 6 50
HP Laser Jet Errors 10 52
server plus 2 43
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now