
• Action: NAT
• Service: ftp-inbound-service
3. For Address Filter enter:
• Source Interface: dmz
• Destination Interface: core
• Source Network: dmz_net
• Destination Network: wan_ip
4. For NAT check Use Interface Address
5. Click OK
E. Allow incoming connections (SAT requires an associated Allow rule):
1. Go to: Policies > Add > IPRule
2. Now enter:
• Name: Allow-ftp
• Action: Allow
• Service: ftp-inbound-service
3. For Address Filter enter:
• Source Interface: any
• Destination Interface: core
• Source Network: all-nets
• Destination Network: wan_ip
4. Click OK
Example 6.3. Protecting FTP Clients
In this scenario shown below the Clavister Security Gateway is protecting a workstation that will
connect to FTP servers on the Internet.
Chapter 6: Security Mechanisms
395
Kommentare zu diesen Handbüchern