SlideShare a Scribd company logo
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network
                                How To – Configure Port Forwarding using Virtual Host
                                to access devices on Internal network


Applicable to – versions 9.5.3 build 14 or above

This article describes a detailed configuration example that demonstrates how to configure
Cyberoam to provide the access of internal resources.

Article covers how to

         Create virtual host
         Create firewall rule to allow the inbound traffic

Virtual host

Virtual host implementation is based on the Destination NAT concept of older versions of
Cyberoam.

Virtual Host maps services of a public IP address to services of a host in a private network. In
other words it is a mapping of public IP address to an internal IP address. This virtual host is
used as the Destination address to access internal or DMZ server.

A Virtual host can be a single IP address or an IP address range or Cyberoam interface itself.
Cyberoam will automatically respond to the ARP request received on the WAN zone for the
external IP address of Virtual host.

Sample schema

Throughout the article we will use the network parameters displayed in the below given
network diagram. Outbound traffic from LAN and DMZ is allowed while inbound traffic is
restricted. The public servers - mail and web server are hosted in DMZ.


           Network                   External IP address
                                                              IP address (Internal)
           components                (Public)
           Web server                203.88.135.208           192.168.1.4 (Mapped)
           Mail server               204.88.135.192           192.168.1.15
                                                              (Mapped)

For virtual host:

External IP: IP address through which Internet user’s access internal server.
Mapped IP: IP address bound to the internal server.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network




Configuration
Entire configuration is to be done from Web Admin Console unless specified.

Step 1: Create virtual host for Web server


Go to Firewall  Virtual Host  Create and create virtual host with the parameters as
specified in sample schema

In our example, Internet users will access internal web server using public IP 203.88.135.208
which is mapped to local IP 192.168.1.4. In other words, all the inbound requests from
203.88.135.208 will be forwarded to 192.168.1.4.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network




Note

      If servers are hosted on LAN, change the Physical Zone to LAN.

      In case you have custom zones, change the Physical Zones accordingly.

      Public IP address is the IP address through which Internet user’s access internal
       server/host. If public IP address is already configured as main Interface IP or alias IP,
       then use the option – Interface IP to select it as an external IP or else select the option
       IP and add the Public IP Address.

Step 2: Create virtual host for Mail server


Go to Firewall  Virtual Host  Create and create virtual host with the parameters as
specified in sample schema

In our example, Internet users will access internal mail server using public IP 203.88.135.192
which is mapped to local IP 192.168.1.15. In other words, all the inbound requests from
203.88.135.192 will be forwarded to 192.168.1.15.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network




Step 3: Loopback firewall rule

Once the virtual host is created successfully, Cyberoam automatically creates a loopback
firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the
service specified in virtual host.

Loopback rules allow same zone internal users to access the internal resources using its
public IP (external IP) or FQDN.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network


For our example, DMZ to DMZ firewall rule is created as virtual host (mapped IP address)
belongs to DMZ interface subnet.

Check creation of loopback rule from Firewall  Manage Firewall




Step 4: Add Firewall rules

Rule 1

Go to Firewall  Create Rule and create firewall rule for each server with the
parameters as displayed in the below given screens.




Click Create and the Firewall Rule for Webserver will be created successfully.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network




Click Create and the Firewall Rule for Mailserver will be created successfully.


Note
Change the Destination Host according to the actual server Location (Zone).

To create firewall rules to allow internal users to access resources in DMZ using its public IP
(external IP) or FQDN follow the below mentioned steps:

Go to Firewall  Create Rule and create firewall rule for each server with the
parameters as displayed in the below given screens.




Click Create and the Firewall Rule for Webserver will be created successfully.
How To – Configure Port Forwarding using Virtual Host to access devices on Internal network




Click Create and the Firewall Rule for Mailserver will be created successfully.

Note:

DO NOT “Apply NAT” for inbound SMTP rules. This will setup the MailServer as an OPEN
RELAY.




                                                         Document version – 3.0- 12/05/2011

More Related Content

What's hot

MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
Akbar Azwir, MM, PMP, PMI-SP, PSM I, CISSP
 
Network testing course
Network testing courseNetwork testing course
Network testing course
tcpipguru
 
Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Matrixcomsec Ttg
 
Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Sophan Nhean
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
NetProtocol Xpert
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
Networkel
 
SonicWAA VPN Policy Configuration
SonicWAA VPN Policy ConfigurationSonicWAA VPN Policy Configuration
SonicWAA VPN Policy Configurationneweb
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
Arpan Patel
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
Aalap Tripathy
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
Zack Chou
 
Configure basic firewall and vpn
Configure basic firewall and vpnConfigure basic firewall and vpn
Configure basic firewall and vpnKumar
 
Cctv mtnl config
Cctv mtnl configCctv mtnl config
Cctv mtnl config
HOME
 
Ip phone boot up process
Ip phone boot up processIp phone boot up process
Ip phone boot up process
IT Tech
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
Swarup Kumar Mall
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
sergio goco
 
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
 Configuring a Cisco Router as a PPPoE Client for DSL Connectivity Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
3Anetwork com
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
Networkel
 

What's hot (20)

MikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port KnockingMikroTik Firewall : Securing your Router with Port Knocking
MikroTik Firewall : Securing your Router with Port Knocking
 
Nat 03
Nat 03Nat 03
Nat 03
 
Network testing course
Network testing courseNetwork testing course
Network testing course
 
Hybrid IP PBX February 2014
Hybrid IP PBX February 2014Hybrid IP PBX February 2014
Hybrid IP PBX February 2014
 
Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3Dhcp & dhcp relay agent in cent os 5.3
Dhcp & dhcp relay agent in cent os 5.3
 
Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)Basic Cisco ASA 5506-x Configuration (Firepower)
Basic Cisco ASA 5506-x Configuration (Firepower)
 
Designing airportextreme802.11nnetworks
Designing airportextreme802.11nnetworksDesigning airportextreme802.11nnetworks
Designing airportextreme802.11nnetworks
 
CCNA point to point
CCNA  point to pointCCNA  point to point
CCNA point to point
 
SonicWAA VPN Policy Configuration
SonicWAA VPN Policy ConfigurationSonicWAA VPN Policy Configuration
SonicWAA VPN Policy Configuration
 
Secure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIPSecure Network Design with High-Availability & VoIP
Secure Network Design with High-Availability & VoIP
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
FreePBX Application Introduce
FreePBX Application IntroduceFreePBX Application Introduce
FreePBX Application Introduce
 
Configure basic firewall and vpn
Configure basic firewall and vpnConfigure basic firewall and vpn
Configure basic firewall and vpn
 
Cctv mtnl config
Cctv mtnl configCctv mtnl config
Cctv mtnl config
 
Ip phone boot up process
Ip phone boot up processIp phone boot up process
Ip phone boot up process
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
IP and VoIP Fundamentals
IP and VoIP FundamentalsIP and VoIP Fundamentals
IP and VoIP Fundamentals
 
Configure router for wap (wireless access point
Configure router for wap (wireless access pointConfigure router for wap (wireless access point
Configure router for wap (wireless access point
 
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
 Configuring a Cisco Router as a PPPoE Client for DSL Connectivity Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
Configuring a Cisco Router as a PPPoE Client for DSL Connectivity
 
Network Access - CCNA 200-125 Training
Network Access - CCNA 200-125 TrainingNetwork Access - CCNA 200-125 Training
Network Access - CCNA 200-125 Training
 

Viewers also liked

How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...SaNju MuLak
 
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...SaNju MuLak
 
Domain controller join domain
Domain controller   join domainDomain controller   join domain
Domain controller join domaincuongcong15
 
Nat pat
Nat patNat pat
Port forward
Port forwardPort forward
Port forwardlyndyv
 
NAT Scneario
NAT ScnearioNAT Scneario
NAT Scneario
Mansour Naslcheraghi
 
CCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukarCCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukar
ALLCAD Services Pvt Limited
 
Session 6 Tp 6
Session 6 Tp 6Session 6 Tp 6
Session 6 Tp 6githe26200
 
Elfiq Multiple Is Ps For Cost Control & Performance
Elfiq Multiple Is Ps For Cost Control & PerformanceElfiq Multiple Is Ps For Cost Control & Performance
Elfiq Multiple Is Ps For Cost Control & PerformanceBryanHildebrand
 
Day 17.1 nat pat
Day 17.1 nat pat Day 17.1 nat pat
Day 17.1 nat pat
CYBERINTELLIGENTS
 
Nat
NatNat
group policies in windows 2008 server
group policies in windows 2008 servergroup policies in windows 2008 server
group policies in windows 2008 server
kgotthold
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group PolicyRaja Waseem Akhtar
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
Muuluu
 
Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy Changes
Eduardo Castro
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
Unitek Eduation
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
Hamed Moghaddam
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu theviper0308
 

Viewers also liked (20)

How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
How to -_implement_clientless_single_sign_on_authentication_in_single_active_...
 
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
How to -_implement_clientless_single_sign_on_authentication_in_multiple_activ...
 
Domain controller join domain
Domain controller   join domainDomain controller   join domain
Domain controller join domain
 
Nat pat
Nat patNat pat
Nat pat
 
Port forward
Port forwardPort forward
Port forward
 
NAT Scneario
NAT ScnearioNAT Scneario
NAT Scneario
 
CCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukarCCNA CHAPTER 12 BY jetarvind kumar madhukar
CCNA CHAPTER 12 BY jetarvind kumar madhukar
 
NAT64 Overview
NAT64 OverviewNAT64 Overview
NAT64 Overview
 
Session 6 Tp 6
Session 6 Tp 6Session 6 Tp 6
Session 6 Tp 6
 
Elfiq Multiple Is Ps For Cost Control & Performance
Elfiq Multiple Is Ps For Cost Control & PerformanceElfiq Multiple Is Ps For Cost Control & Performance
Elfiq Multiple Is Ps For Cost Control & Performance
 
Day 17.1 nat pat
Day 17.1 nat pat Day 17.1 nat pat
Day 17.1 nat pat
 
Nat
NatNat
Nat
 
Nat
NatNat
Nat
 
group policies in windows 2008 server
group policies in windows 2008 servergroup policies in windows 2008 server
group policies in windows 2008 server
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group Policy
 
NAT and PAT
NAT and PATNAT and PAT
NAT and PAT
 
Windows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy ChangesWindows Server 2008 R2 Group Policy Changes
Windows Server 2008 R2 Group Policy Changes
 
Group Policy Windows Server 2008
Group Policy Windows Server 2008Group Policy Windows Server 2008
Group Policy Windows Server 2008
 
Cisco CCNA- NAT Configuration
Cisco CCNA- NAT ConfigurationCisco CCNA- NAT Configuration
Cisco CCNA- NAT Configuration
 
Tutorial mikrotik step by step anung muhandanu
Tutorial mikrotik step by step  anung muhandanu Tutorial mikrotik step by step  anung muhandanu
Tutorial mikrotik step by step anung muhandanu
 

Similar to How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_internal_network

FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
IPMAX s.r.l.
 
Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourselfGuest Internet
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
Adhie Lesmana
 
HiGuard Pro installation
HiGuard Pro installationHiGuard Pro installation
HiGuard Pro installationsharetech
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
Mohammed Adam
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
fankrid
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
Kapil Sabharwal
 
System installation in CCTV
System installation in CCTVSystem installation in CCTV
System installation in CCTV
hepzijustin
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
Dewa Ketut Setiawan
 
SunEyes T Series User Manual
SunEyes T Series User ManualSunEyes T Series User Manual
SunEyes T Series User Manual
SecurityCameraTalk
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball Networks
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdf
DiogoCampezatto
 
Oracle soa cloud project
Oracle soa cloud projectOracle soa cloud project
Oracle soa cloud project
Gopinath Soundarrajan
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
Amir Jafari
 
CAHs Using Health Information Technology
CAHs Using Health Information TechnologyCAHs Using Health Information Technology
CAHs Using Health Information Technologywebhostingguy
 
Load Balancer Device and Configurations.
Load Balancer Device and Configurations.Load Balancer Device and Configurations.
Load Balancer Device and Configurations.
Web Werks Data Centers
 
use of Alias IP Range-Google cloud .pptx
use of Alias IP Range-Google cloud .pptxuse of Alias IP Range-Google cloud .pptx
use of Alias IP Range-Google cloud .pptx
Amit Pandey
 

Similar to How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_internal_network (20)

FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 
Caravan park and campground WiFi hotspot Do it yourself
Caravan park and campground WiFi hotspot   Do it yourselfCaravan park and campground WiFi hotspot   Do it yourself
Caravan park and campground WiFi hotspot Do it yourself
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
HiGuard Pro installation
HiGuard Pro installationHiGuard Pro installation
HiGuard Pro installation
 
Wireless Penetration Testing
Wireless Penetration TestingWireless Penetration Testing
Wireless Penetration Testing
 
How to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_modeHow to -_deploy_cyberoam_in_gateway_mode
How to -_deploy_cyberoam_in_gateway_mode
 
P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.P&G BT Global Services - LLD Final Revision Year 2008.
P&G BT Global Services - LLD Final Revision Year 2008.
 
Eternity NE VoIP
Eternity NE VoIPEternity NE VoIP
Eternity NE VoIP
 
System installation in CCTV
System installation in CCTVSystem installation in CCTV
System installation in CCTV
 
Tutorial mikrotik step by step
Tutorial mikrotik step by stepTutorial mikrotik step by step
Tutorial mikrotik step by step
 
SunEyes T Series User Manual
SunEyes T Series User ManualSunEyes T Series User Manual
SunEyes T Series User Manual
 
Eyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration GuideEyeball AnyConnect™ Gateway Administration Guide
Eyeball AnyConnect™ Gateway Administration Guide
 
Cognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdfCognex In-Sight - Network Settings.pdf
Cognex In-Sight - Network Settings.pdf
 
Oracle soa cloud project
Oracle soa cloud projectOracle soa cloud project
Oracle soa cloud project
 
Kwfsbs67 en-v1
Kwfsbs67 en-v1Kwfsbs67 en-v1
Kwfsbs67 en-v1
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
CCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 SubnettingCCNA R&S-15-Perspectives on IPv4 Subnetting
CCNA R&S-15-Perspectives on IPv4 Subnetting
 
CAHs Using Health Information Technology
CAHs Using Health Information TechnologyCAHs Using Health Information Technology
CAHs Using Health Information Technology
 
Load Balancer Device and Configurations.
Load Balancer Device and Configurations.Load Balancer Device and Configurations.
Load Balancer Device and Configurations.
 
use of Alias IP Range-Google cloud .pptx
use of Alias IP Range-Google cloud .pptxuse of Alias IP Range-Google cloud .pptx
use of Alias IP Range-Google cloud .pptx
 

Recently uploaded

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 

Recently uploaded (20)

Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 

How to -_configure_port_forwarding_using_virtual_host_to_access_devices_on_internal_network

  • 1. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to – versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources. Article covers how to  Create virtual host  Create firewall rule to allow the inbound traffic Virtual host Virtual host implementation is based on the Destination NAT concept of older versions of Cyberoam. Virtual Host maps services of a public IP address to services of a host in a private network. In other words it is a mapping of public IP address to an internal IP address. This virtual host is used as the Destination address to access internal or DMZ server. A Virtual host can be a single IP address or an IP address range or Cyberoam interface itself. Cyberoam will automatically respond to the ARP request received on the WAN zone for the external IP address of Virtual host. Sample schema Throughout the article we will use the network parameters displayed in the below given network diagram. Outbound traffic from LAN and DMZ is allowed while inbound traffic is restricted. The public servers - mail and web server are hosted in DMZ. Network External IP address IP address (Internal) components (Public) Web server 203.88.135.208 192.168.1.4 (Mapped) Mail server 204.88.135.192 192.168.1.15 (Mapped) For virtual host: External IP: IP address through which Internet user’s access internal server. Mapped IP: IP address bound to the internal server.
  • 2. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Configuration Entire configuration is to be done from Web Admin Console unless specified. Step 1: Create virtual host for Web server Go to Firewall  Virtual Host  Create and create virtual host with the parameters as specified in sample schema In our example, Internet users will access internal web server using public IP 203.88.135.208 which is mapped to local IP 192.168.1.4. In other words, all the inbound requests from 203.88.135.208 will be forwarded to 192.168.1.4.
  • 3. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Note  If servers are hosted on LAN, change the Physical Zone to LAN.  In case you have custom zones, change the Physical Zones accordingly.  Public IP address is the IP address through which Internet user’s access internal server/host. If public IP address is already configured as main Interface IP or alias IP, then use the option – Interface IP to select it as an external IP or else select the option IP and add the Public IP Address. Step 2: Create virtual host for Mail server Go to Firewall  Virtual Host  Create and create virtual host with the parameters as specified in sample schema In our example, Internet users will access internal mail server using public IP 203.88.135.192 which is mapped to local IP 192.168.1.15. In other words, all the inbound requests from 203.88.135.192 will be forwarded to 192.168.1.15.
  • 4. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Step 3: Loopback firewall rule Once the virtual host is created successfully, Cyberoam automatically creates a loopback firewall rule for the zone of the mapped IP address. Loopback firewall rule is created for the service specified in virtual host. Loopback rules allow same zone internal users to access the internal resources using its public IP (external IP) or FQDN.
  • 5. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network For our example, DMZ to DMZ firewall rule is created as virtual host (mapped IP address) belongs to DMZ interface subnet. Check creation of loopback rule from Firewall  Manage Firewall Step 4: Add Firewall rules Rule 1 Go to Firewall  Create Rule and create firewall rule for each server with the parameters as displayed in the below given screens. Click Create and the Firewall Rule for Webserver will be created successfully.
  • 6. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Click Create and the Firewall Rule for Mailserver will be created successfully. Note Change the Destination Host according to the actual server Location (Zone). To create firewall rules to allow internal users to access resources in DMZ using its public IP (external IP) or FQDN follow the below mentioned steps: Go to Firewall  Create Rule and create firewall rule for each server with the parameters as displayed in the below given screens. Click Create and the Firewall Rule for Webserver will be created successfully.
  • 7. How To – Configure Port Forwarding using Virtual Host to access devices on Internal network Click Create and the Firewall Rule for Mailserver will be created successfully. Note: DO NOT “Apply NAT” for inbound SMTP rules. This will setup the MailServer as an OPEN RELAY. Document version – 3.0- 12/05/2011