Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

SonicWall NAT Policies - Basic Quick Question on How They're Setup

Posted on 2012-03-23
2
Medium Priority
?
675 Views
Last Modified: 2012-03-26
I come from more of a Cisco world, so looking at the NAT policies on a SonicWall, when I'm in a time-crunch, is a bit confusing.

This SonicWall is out of state, and is about to be replaced by an ASA 5510, and I'd ideally like to ship it out today. It's close to being fully setup, but I just need to set up the static NAT rules.

I've attached a screenshot of an example I'd like clarification. My confusion lies in the original and translated categories for source, destination, etc. On my example, what exactly is going on?
Capture.JPG
0
Comment
Question by:Tercestisi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 24

Accepted Solution

by:
smckeown777 earned 2000 total points
ID: 37759278
Hi, this is basically a Loopback NAT Policy which is common on the Sonicwall devices, its basically allowing an internal LAN device to access a service(HTTPS for example) using the Public WAN IP

Eg. You have an exchange server internally at 192.168.1.25
Your WAN Public IP is 87.x.x.x

From the LAN side you normally access the exchange server using its LAN IP, but with the Loopback policy you can use the Public WAN IP to access the same service only from the inside...

Hope I've explained it correctly!
If not I'm sure there'll be corrections ;)
0
 

Author Closing Comment

by:Tercestisi
ID: 37767892
Cool beans; thanks for the clarification!
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

During and after that shift to cloud, one area that still poses a struggle for many organizations is what to do with their department file shares.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question