No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CLI-based Configuration Guide - Security

AR500, AR510, and AR530 V200R007

This document describes the configurations of Security, including AAA, DAA,NAC, BRAS Access, ACL, Firewall, Deep Security Defense, Local Attack Defense;Attack Defense, Traffic Suppression, ARP Security, Port Security, DHCP Snooping, IPSG, URPF, PKI, SSL, HTTPS, Keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Port Mapping

Port Mapping

The application-layer protocols use well-known ports for communication. Port mapping allows you to define new port numbers for different applications or specify the range of hosts that use non-well-known port numbers.

Port mapping applies to service-sensitive features such as application specific packet filter (ASPF) and Network Address Translation (NAT). For example, the FTP server 10.10.10.10 on an enterprise intranet provides the FTP service through port 2121. When accessing the FTP server through a NAT server, users must use port 2121. By default, port 21 is used for FTP packets. The FTP server cannot identify the FTP packets that use port 21. In this case, you need to map port 2121 to the FTP protocol. After port mapping, the NAT server can identify the FTP packets that use port 2121 and send the FTP packets to the FTP server. In this way, users can access the FTP server.

The device provides ACL-based port mapping and performs port mapping only for the packets matching the specified ACL. Port mapping employs basic ACLs (2000 to 2999). In ACL-based packet filtering, the device matches the destination IP addresses of the packets with the IP address in the basic ACL rules.

As shown in Figure 5-6, the PC on the external network access the WWW server (port 8080) on the internal network. When the device receives packets sent by the PC, it matches the packets with the ACL. Only packets with the destination IP address 10.38.2.4 can pass through the device.

Figure 5-6  Port mapping diagram
Translation
Download
Updated: 2019-05-25

Document ID: EDOC1000097287

Views: 13496

Downloads: 40

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next