SonicWALL NSA 6600 Security Camera User Manual


 
36 | Configuring NAT Mode Gateway
Configuring NAT Mode Gateway
This section provides an overview of a Dell SonicWALL NSA
6600 appliance operating as a single network gateway in NAT
mode, which is the default mode for a newly configured
NSA 6600. This section is relevant to administrators following
deployment Scenario A.
Note: No additional configuration is necessary to deploy your
appliance as a single network gateway in Many-to-One
NAT mode.
Overview of NAT Mode
Network Address Translation (NAT) allows private IP addresses
on internal networks to be mapped to at least one public IP
address on the WAN interface of the Dell SonicWALL security
appliance. Outbound traffic from the internal network uses
many-to-one NAT address mappings for their LANs, WLANs,
and other internal networks.
All traffic in SonicOS must go through both an access rule and a
NAT policy, a fundamental part of the NAT Mode architecture.
The NAT policy is even used for traffic that needs no IP address
translation, such as traffic traveling between two different LAN
interfaces, traffic on the simplest types of VPNs, or through
Layer 2 Bridge Mode / Transparent Mode configurations.
The Dell SonicWALL NSA 6600 ships with the internal DHCP
server active on the LAN port. However, if a DHCP server is
already active on your LAN, the Dell SonicWALL appliance will
disable its own DHCP server to prevent conflicts.
As shown in the illustration, ports X1 and X0 are preconfigured
as WAN and LAN, respectively. The remaining ports (X2-X17)
can be configured to meet the needs of your network. In the
example diagram, certain interfaces are configured for specific
zones:
•X1WAN
X0—LAN
X12—Wireless LAN
•X16DMZ
SonicWALL NSA 6600
CONSOLE
SDHC
MGMT
X19 X17
X16
X14 X12 X10 X8 X6 X4
1GE1GE
10GE
BYPASS
STATUS
X2 X0
X1X3X5X7
X9X11X13X15
X18
M0
ALARM
TEST
PWR
SonicPoint
X1
X0
X8
X16
Internet
Dell SonicWALL NSA Appliance
DMZ Zone
WLAN Zone
LAN Zone