?
Solved

SonicWall NAT Policies - Basic Quick Question on How They're Setup

Posted on 2012-03-23
2
Medium Priority
?
680 Views
Last Modified: 2012-03-26
I come from more of a Cisco world, so looking at the NAT policies on a SonicWall, when I'm in a time-crunch, is a bit confusing.

This SonicWall is out of state, and is about to be replaced by an ASA 5510, and I'd ideally like to ship it out today. It's close to being fully setup, but I just need to set up the static NAT rules.

I've attached a screenshot of an example I'd like clarification. My confusion lies in the original and translated categories for source, destination, etc. On my example, what exactly is going on?
Capture.JPG
0
Comment
Question by:Tercestisi
2 Comments
 
LVL 24

Accepted Solution

by:
smckeown777 earned 2000 total points
ID: 37759278
Hi, this is basically a Loopback NAT Policy which is common on the Sonicwall devices, its basically allowing an internal LAN device to access a service(HTTPS for example) using the Public WAN IP

Eg. You have an exchange server internally at 192.168.1.25
Your WAN Public IP is 87.x.x.x

From the LAN side you normally access the exchange server using its LAN IP, but with the Loopback policy you can use the Public WAN IP to access the same service only from the inside...

Hope I've explained it correctly!
If not I'm sure there'll be corrections ;)
0
 

Author Closing Comment

by:Tercestisi
ID: 37767892
Cool beans; thanks for the clarification!
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article explains the fundamentals of industrial networking which ultimately is the backbone network which is providing communications for process devices like robots and other not so interesting stuff.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

598 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question