Comodo Help
Find the desired product help
Comodo Dome Firewall

Comodo Dome Firewall

Dome Firewall Virtual Appliance Admin Guide

English

Print Help Download Help
Manage Firewall Configuration > Destination Network Address Translation
  • Introduction To Comodo Dome Firewall - Virtual Appliance
    • Install Dome Firewall And Login To The Administrative Console
  • The Main Interface
  • The Dashboard
  • View And Modify System Status And General Configuration
    • Manage Admin Accounts
      • Add And Manage Administrators
      • Manage Administrative Roles
    • License Activation
    • SNMP Settings
    • Central Management
    • Configure SSH Access
    • High Availability
    • View And Update Firmware Version
    • Create And Schedule Backup Of DFW State
      • Manually Create A Backup
      • Schedule Backup Operations
      • Encrypt Backup Archives
      • Export A Backup
      • Import A Backup Archive From A Local Computer
      • Roll Back The Virtual Appliance To A Previous Time Point
      • Reset The Virtual Appliance To Factory Defaults
    • Shutdown Or Restart The Dome Firewall Virtual Appliance
  • View DFW Virtual Appliance Status
    • System Status
    • Network Status
    • System Usage Summaries
    • Network Traffic
    • Network Connections
    • SSLVPN Connections
  • Network Configuration
    • Configure Interface Devices, Uplinks And VLANs
      • Configure Interface Devices
      • Add And Manage Gateway Uplink Devices
      • Create VLANs
    • Routes
      • Add And Manage Static Routes
      • Add And Manage Policy Routing Rules
  • Configure DFW Virtual Appliance Services And Protection Settings
    • DHCP Server
    • Advanced Threat Protection
      • Manage The ATP Profiles
      • Comodo Antivirus
    • Time Server
    • Intrusion Prevention
      • Configure Intrusion Prevention System
      • Manage IPS Rulesets
      • Manage Application Identification Rulesets
    • Configure Wireless Hotspot
      • Configure Captive Portal Service
      • Customize The Login Page
      • Add And Manage Permanent Users
    • Internet Content Adaptation Protocol
    • Quality Of Service
  • Manage Firewall Configuration
    • Firewall Objects
      • Manage Firewall Address Objects
      • Manage Firewall Object Groups
      • Manage Firewall Schedules
      • Active Directory Integration
    • Destination Network Address Translation
    • Source Network Address Translation
    • Configure System Access
    • Configure Firewall Policy Rules
      • Manage Firewall Policy Rules
      • Manage VPN Firewall Rules
  • Configure Proxy Services
    • HTTP/HTTPS Proxy Server
      • Configure URL And Content Filtering
      • HTTPS Proxy
  • Configure Virtual Private Network Settings
    • SSL VPN Server
      • Configure General SSL VPN Server Settings
      • Manage SSL VPN Client Accounts
      • Configure Advanced SSL VPN Server Settings
      • Configure Clients To Connect To Dome Firewall
    • IPsec Configuration
    • Configure L2TP Server
    • Configure IPSec/L2TP Users
  • View Logs
    • Realtime Logs
    • Configure Log Settings
    • Generate Reports
  • Appendix - Minimum Requirements For Software Installations

Destination Network Address Translation


  • Destination Network Address Translation (DNAT) is used to provide access to internal applications/devices from outside of the network
  • For example, you can provide access to web, ftp, mail and other services that are located inside the network
  • The common use of DNAT is to redirect traffic sent to a public-facing IP address / port to an internal IP / port
  • Dome Firewall lets you create DNAT rules to route traffic for any incoming IP address to devices with internal IP / port
  • Appropriate DFW policies will be applied for the DNAT rules
  • DNAT rules can be created and managed from the 'DNAT' interface
  • Click 'Firewall' on the left then 'DNAT' to open the interface



 The interface displays all current DNAT rules in effect and allows you to create new rules.


DNAT Table - Column Descriptions

Column

Description

#

 ID number of the rule. Translation is applied based on the first matching rule in the list, regardless of other matching rules that follow.

Source

 The Firewall Object containing the IP address, IP address range or subnet of the host(s) from which the traffic originates.

Destination

 The interface device through which the traffic is directed to external network.

Service

 The service that uses the traffic, indicated as the protocol and the port used.

NAT to

 The IP address of the host, to be contained in the headers of the outgoing packets.

Remark

 A short description of the rule.

Count

 Indicates the number of packets and size of data intercepted by the rule.

Actions

Displays control buttons for managing the rule.


 - Move up / down a rule.


- Enable or disable the rule.


 - Edit rule parameters. The 'Edit' interface is similar to the 'Add Rule' interface. See 'Creating a DNAT rule' for more details.


- Removes the rule.


  • Show system rules - There are no system defined DNAT rules


Creating a DNAT rule

 

A destination network translation rule can be created by defining the type of incoming IP details, service / port, protocol and to which internal IP address this should be forwarded to.


To create a new DNAT rule

  • Click 'Firewall' > 'DNAT' on the left menu
  • Click 'Add a new Port forwarding / Destination NAT Rule'




You can create a DNAT rule in either simple or advanced mode:

  • Simple Mode – Specify the incoming traffic type, incoming service / port, and the destination / port the traffic should be forwarded to. The default permission is 'Allow'.
  • Advanced Mode – You can restrict how and who should use the DNAT rule. For example, you can allow only one port or a specific SSLVPN user to use the DNAT rule. You can use the filter to allow, deny or reject traffic for a matching DNAT rule from here.


Simple Mode


The default filter policy for a DNAT rule created in this mode is to 'Allow'.

  • Click 'Simple Mode' at top-right

The following parameters can be configured:

  • Incoming IP - Select the type of incoming source from the 'Type' drop-down and specify the source in the text box below it. The options available are:
  • Zone/VPN/Uplink – The interfaces configured in the 'Interface Configuration' screen will be available for selection. Select this option if the incoming source is a network zone or an Interface connected to the virtual appliance. Choose the network zone and/or the interface from the options listed in the text box. Press and hold the Ctrl key in the keyboard to choose multiple zones/interfaces.
  • Network/IP/Range - Select this option if the rule is to be applied to incoming traffic from a network IP or from a specific IP address or address range. Enter the IP address of the network(s) in CIDR notation or the specific IP address(es) or address range in the text box, as one entry per line.
  • SSL VPN User - Select this option if the rule is to be applied to traffic from VPN user(s) added to the network. Choose user(s) from the list of pre-registered users displayed in the textbox. Press and hold the Ctrl key in the keyboard to choose VPN users.
  • Incoming Service / Port - Specify the service, protocol and incoming destination port for the rule.
  • Service - Select the service for which the rule to be applied from the drop-down.
  • Protocol - Select the protocol for the service. Usually this field will be auto selected based on the service selected.
  • Incoming port - Select the destination port for the service. Usually this field will be auto selected based on the service selected.
  • Translate to – Specify to which IP and port the incoming traffic should be forwarded to. Select whether network address translation should be performed or not.
  • Insert IP – Enter the IP to which the traffic should be forwarded to. Note – You have to specify a single IP only.
  • Port / Range – Enter the port number / port range to which the incoming traffic should be forwarded to.
  • NAT – Select whether network address translation should be done or not. If you select 'Do not NAT', destination address translation will not be performed.
  • General Settings - Configure the General Settings to enable/disable, enter a short description and select a position for the rule in the list.
  • Enabled - Leave this checkbox selected if you want the rule to be activated upon creation.
  • Log - Select this checkbox if you want the packets allowed by the rule are to be logged. See View Logs for more details on configuring storage of logs and viewing the logs.
  • Remark - Enter a short description for the rule. The description will appear in the remark column of the respective rules interface
  • Position - Set the priority for the rule in the list of rules in the respective rules interface. The rules are processed in the order they appear on the list.
  • Click 'Create Rule' to add your new rule in simple mode.
  • Click 'Apply' in the confirmation dialog.
  • To add more restrictions, configure the rule in 'Advanced Mode'.


Advanced Mode

  • Click 'Advanced Mode' at top-right. The screen is similar to 'Simple Mode' except you have two more restriction settings, 'Access From' and 'Filter Policy'.

In this mode, you can configure to allow traffic from specific source(s) and choose whether the traffic for a matching DNAT rule should be allowed, dropped or rejected.

  • Configure 'Incoming IP', 'Incoming Service / Port' and 'Translate to' sections as explained in 'Simple Mode'
  • 'Access From' and 'Filter Policy' are available when you choose 'Advanced Mode' as shown below:



  • Access From - Select the type of incoming source from the 'Source Type' drop-down and specify the source in the text box below it. The options available are:
  • Any – Access allowed from all zones, 'Zone/VPN/Uplink', 'Network/IP/Range' and 'SSL VPN User'
  • Zone/VPN/Uplink – The interfaces configured in the 'Interface Configuration' screen will be available for selection, including dynamic IP pool network addresses configured in 'IPSEC' section. Select this option if the incoming source is a network zone or an interface connected to the virtual appliance. Choose the network zone and/or the interface from the options listed in the text box. Press and hold the Ctrl key in the keyboard to choose multiple zones/interfaces.
  • Network/IP/Range - Select this option if the rule is to be applied to incoming traffic from a network IP or from a specific IP address or address range. Enter the IP address of the network(s) in CIDR notation or the specific IP address(es) or address range in the text box, as one entry per line.
  • SSL VPN User - Select this option if the rule is to be applied to traffic from VPN user(s) added to the network. Choose user(s) from the list of pre-registered users displayed in the textbox. Press and hold the Ctrl key in the keyboard to choose VPN users.
  • Filter Policy – Select whether network packets from a matching rule should be allowed, dropped or rejected from the drop-down.
  • Click 'Create Rule' to add your new rule in advanced mode.
  • Click 'Apply' in the confirmation dialog.


Edit a DNAT Rule

  • Click the edit button  under 'Actions' in the rule row that you want to update.
  • The process is similar to creating a new DNAT rule explained above.
  • Click 'Update Rule' below and 'Apply' in the confirmation dialog.

Remove a DNAT Rule

  • Click the delete button  in the row of the rule you want to remove.

  • Click 'Apply in the confirmation dialog.

    Our Products
    • Free Antivirus
    • Free Internet Security
    • Website Malware Removal
    • Free Anti-Malware
    • Anti-Spam (Free Trial)
    • Windows Antivirus
    • Antivirus for Windows 7
    • Antivirus for Windows 8
    • Antivirus for Windows 10
    • Antivirus for MAC
    • Antivirus for Linux
    • Free Endpoint Security
    • Free ModSecurity
    • Free RMM
    • Free Website Malware Scanner
    • Free Device Manager for Android
    • Free Demo
    • Network Security
    • Endpoint Protection
    • Antivirus for Android
    • Comodo Antivirus
    • Wordpress Security
    Cheap CDN
    • Bootstrap CDN
    • Semantic UI CDN
    • Jquery CDN
    • CDN Plans
    • CDN
    • Free CDN
    Enterprise
    • Patch Management Software
    • Patch Manager
    • Service Desk
    • Website Down
    • Endpoint Protection Solutions
    • Website Security Check
    • Remote Monitoring and Management
    • Website Security
    • Device Manager
    • ITSM
    • CRM
    • MSP
    • Android Device Manager
    • MDR Services
    • Managed IT Support Services
    • Free EDR
    Free SSL Certificate
    Support Partners Terms and Conditions Privacy Policy

    © Comodo Group, Inc. 2025. All rights reserved.