Route Policy

Posted on 2013-10-28
Last Modified: 2013-10-31
What's the meaning of this rule ?
What's the difference between NAT Policies (under Network) and Access rules (under Firewall) ?

For the rule defined in NAT polices (Inbound & outbound interface), does it mean a rule will be written in Access rule to allow the flow between different zone (eg. Inbound (LAN) and Outbound (WAN) ?  Do I need to manually define it under Access rule ?

Question by:AXISHK
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
LVL 15

Assisted Solution

by:Skyler Kincaid
Skyler Kincaid earned 500 total points
ID: 39607777
Typically the Access Rules define the ports, IPs and services that are blocked or allowed.

NAT Policies define where the traffic goes and if it is translated at all.

For Example:

You could have an Access Rule that would allow port 80000 from the WAN and a NAT Policy that would take port 80000, translate it to 3389 and send it to your Terminal Server at a specified IP.

But to answer your question:

It basically allows HTTP FTP and VNC to whatever is on from within the internal HP Office Network. I am guessing the x.x.x.x from Translated and Des Original means that no translation takes place.

Expert Comment

ID: 39608234
To over-simplify:

A NAT policy is a router function that allows you to map one IP address to another (inside = outside):

    For example - (inside) could be mapped to (outside)

Access rules are a firewall function that permits traffic to bass between zones:

    For example - You could permit traffic on TCP 80 (HTTP) from the outside to, which would translate to

Author Comment

ID: 39609042
So, Access Rule will be proceeded before NAT Policy and I need to add entries in Access Rule first , correct ?

A NAT rule in NAT policy need a corresponding entry in Access Rule to allow traffic flow between two zones involved in NAT, correct ?

For the attached file,

For HK network (Source) connect to x.x.x.x (public IP - a internal FTP server) , Sonicwall will replace the source header to x.x.x.x (public IP of ftp server) while the destination public IP will be replaced to internal IP of the FTP. Why the NAT appear so strange ?

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

LVL 15

Expert Comment

by:Skyler Kincaid
ID: 39609228
Correct. Create the access rules that will be referenced in the NAT policy.

Author Comment

ID: 39610871
Thanks, any idea for the rule defined in the attached file.

"For HK network (Source) connect to x.x.x.x (public IP - a internal FTP server) , Sonicwall will replace the source header to x.x.x.x (public IP of ftp server) while the destination public IP will be replaced to internal IP of the FTP. "

LVL 15

Expert Comment

by:Skyler Kincaid
ID: 39612654
It is really difficult to answer your questions with x.x.x.x substituted for everything.

Author Comment

ID: 39613322
Please refer to the attached file.

Column "Translated" & "Destination Original" are referring to the same IP address.

LVL 15

Accepted Solution

Skyler Kincaid earned 500 total points
ID: 39613341
Okay so that helps me visualize it more.

For some reason whoever set this up is having any HTTP (port 80), VNC (ports 5800 and 5900), FTP (port 21) that is going to (which I am assuming is server) from inside the network be translated to what appears to be your public IP address.

So if I am on one of your computers using any of the protocols listed (HTTP, VNC, or FTP) and connecting to your server the firewall is going to make it appear as though it is coming from your public IP address instead of from the internal private IP of the computer being used.

I am not sure why they would do this or what the point is. This outline is assuming that the HK Office Network is your internal network.

Featured Post

Retailers - Is your network secure?

With the prevalence of social media & networking tools, for retailers, reputation is critical. Have you considered the impact your network security could have in your customer's experience? Learn more in our Retail Security Resource Kit Today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers ( and Greg Ross from Paessler ( for a discussion about smart network …
A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question