Abilis implements NAT (Network Address Translation) with PAT (Port Address Translation) and IPACL (IP Access Control List) services.
By properly specifying:
source IP address or network;
destination IP address or network;
source UDP/TCP port;
destination UDP/TCP port;
Source/Destination IP resource;
TOS (Type of Service) for packets priority management by services;
a high level of security is granted.
Note | |
---|---|
Abilis is not a Firewall! It implements basic firewall function, but evolved features must be commissioned to a “real” firewall. Abilis and firewall can coexist with no problems. |
Inside. The set of networks there are subject of translation, usually “private” networks.
Outside. All other networks, usually “public” addresses located on the Internet.
Inside local IP address. The IP address which was assigned to a host on the inside network.
Inside global IP address. The
IP address of an inside host as it appears to the outside networks.
If, as usual, the outside network is the Internet, the address must
be one of the “public” addresses which the ISPs have
assigned to user's router for those connections. In the table of NAT
Aliases this term called as ANET:
.
Processed IP packet. It mean in this packet was changed a source or destination address in some cases a source or destination port was changed too.
Ignored IP packet. It mean that this packet was not changed.
Static Address Translation. The user can establish a one-to-one mapping between the inside local and global addresses, which happens when the number (netmask) of inside local and global addresses are identical.
Dynamic Source Address Translation. The user can establish dynamic mapping between the inside and global addresses, which happens when the number (netmask) of inside local and global addresses are different.
Port Address Translation (PAT). The user can save addresses in the global address pool by allowing source ports in TCP connections or UDP conversations to be translated. Different local addresses will be mapped to the same global address, with port translation providing the necessary uniqueness for TCP/UDP and other tricks providing uniqueness for ICMP.
Extended filtering in PAT mode. The purpose of this feature is to allow a selective activation of the PAT translation based on the destination TCP/UDP port and on the IP protocol, with the result that network managers can empower their control of the network by:
Granting access only to some service, e.g. web and ftp.
Blocking access only to specific services, e.g. realaudio / realvideo servers
Precisely distinguishing inbound connections from outbound ones
Allowing internal users to access ANY service on the Internet while outside users may access only a restricted set
Destination port mapping. This behaviour is very useful in many situations, the most frequents are:
The user has just one public IP address and on the internal LAN there are more computers on several IP addresses running different services that must be reached from outside, e.g. FTP, HTTP, SMTP and so on
The user has just one public IP address and on the internal LAN there are more computers on several IP addresses running the same service with different contents, e.g. a commercial web, a technical web, a restricted access web.
Add the resource to the Abilis system with the command:
[11:01:39] ABILIS_CPX:a res:nat
RES:NAT ALREADY EXISTS
The NAT resource may already exist in the system, but may not yet be active: set it active with the command:
[11:01:48] ABILIS_CPX:s act res:nat
COMMAND EXECUTED
Caution | |
---|---|
After adding or setting the NAT active, you must restart the Abilis to make the resource running (use the command warm start to reboot the Abilis). |
[11:01:39] ABILIS_CPX:s p nat act:yes
COMMAND EXECUTED [11:01:39] ABILIS_CPX:d p nat
RES:Nat - Not Saved (SAVE CONF), Not Refreshed (INIT) ------------------------- Run DESCR:Network_Address_Translator LOG:DS ACT:YES dimtable:1000 DNS-ALG:NO SNMP-ALG:NO PPTP-ALG:NO IKE-AWARE:NO NAT-LOOPBACK:NO - Not PAT mode parameters ---------------------------------------------- TOUT:3600 - PAT mode parameters -------------------------------------------------- FRAG:5 ICMP:5 DNS:5 SNMP:5 SNTP:5 UDP-OPENING:5 UDP-CONN:180 TCP-OPENING:5 TCP-CONN:360 TCP-CLOSING:15 TCP-CLOSED:1 TCP-RST:YES PPTP-CONN:360 INSIDE-MIL:NOLIMIT OUTSIDE-MIL:NOLIMIT VPN-MIL:NOLIMIT DMZ-MIL:NOLIMIT MIL-TIME:2
Use the following command to display resource parameters; teh command d p nat ? displays the meaning of all parameters.
[11:01:39] ABILIS_CPX:d p nat
Run DESCR:Network_Address_Translator
LOG:DS ACT:YES dimtable:1000
DNS-ALG:NO SNMP-ALG:NO PPTP-ALG:NO IKE-AWARE:NO
NAT-LOOPBACK:NO
- Not PAT mode parameters ----------------------------------------------
TOUT:3600
- PAT mode parameters --------------------------------------------------
FRAG:5 ICMP:5 DNS:5 SNMP:5 SNTP:5
UDP-OPENING:5 UDP-CONN:180
TCP-OPENING:5 TCP-CONN:360 TCP-CLOSING:15 TCP-CLOSED:1
TCP-RST:YES PPTP-CONN:360
INSIDE-MIL:NOLIMIT OUTSIDE-MIL:NOLIMIT VPN-MIL:NOLIMIT DMZ-MIL:NOLIMIT
MIL-TIME:2
Meaning of the most important parameters:
LOG
Logging functionalities activation/deactivation.
ACT
NAT runtime activation/deactivation.
dimtable
It specifies how many translations can be created at the same time.
DNS-ALG
Enable/disable DNS Application Level Gateway [NO, YES]
SNMP-ALG
Enable/disable SNMP Application Level Gateway [NO, YES]
PPTP-ALG
Enable/disable PPTP Application Level Gateway [NO, YES]
IKE-AWARE
Enable/disable IKE awareness. Minimise remap of UDP ports 500 and 4500 [NO, YES]
NAT-LOOPBACK
Enable/disable the packets loopback for destination translations [NO, YES]
TOUT
This value sets the timeout of static and dynamic translations, i.e. those created without the PAT mode. If the translation is not used for the specified time (i.e. no packets need it), it times out and it has removed by the translation table.
FRAG
Time-out for linkable fragment identifier [1..240 sec]
ICMP
Time-out for ICMP link type [1..240 sec]
DNS
Time-out for DNS link type [1..240 sec]
SNMP
Time-out for SNMP link type [1..240 sec]
SNTMP
Time-out for SNTP link type [1..240 sec]
UDP-OPENING
Time-out for UDP links in Opening state [1..240 sec]
UDP-CONN
Time-out for UDP links in Connected state [60..65535 sec]
TCP-OPENING
Time-out for TCP links in Opening state [1..240 sec]
TCP-CONN
Time-out for TCP links in Connected state [60..65535 sec]
TCP-CLOSING
Time-out for TCP links in Closed state [1..240 sec]
TCP-RST
Enable sending of RESET for expired links [NO, YES]
PPTP-CONN
Time-out for PPTP links in Connected state [60..65535 sec]
INSIDE-MIL
Maximal number of links that same IP address on INSIDE interface can open at the same time [NOLIMIT, 1..10000]
OUTSIDE-MIL
Maximal number of links that same IP address on OUTSIDE interface can open at the same time [NOLIMIT, 1..10000]
VPN-MIL
Maximal number of links that same IP address on VPN interface can open at the same time [NOLIMIT, 1..10000]
DMZ-MIL
Maximal number of links that same IP address on DMZ interface can open at the same time [NOLIMIT, 1..10000]
MIL-TIME
Resync time used for maximal initiator links procedure [2..30 sec]
The following command allows the administrator to change the configuration of the resource:
s p nat
parameter
:value
...
Caution | |
---|---|
To activate the changes made on the upper case parameters, execute the initialization command init res:nat; while to set act the changes made on the lowercase parameters a save conf and an Abilis restart are required (i.e. with warm start command). |