In message <26427B746059D311A1560000F6C4483601C7C78E@INTERGW>, Mike Glassman -
Admin writes:
>All,
>
>I know there's an option under Checkpoint FW-1 (4.1 SP1) to perform port
>NAT'ing as apposed to IP NAT'ing.
IIRC, you could do PAT in older versions of FW-1 as well. Just go to
NAT policy rules tab and _manually_ set ports and sources you want to
translate.
>I specifically want to be able to NAT a port that software runs on, on an
>internall machine, so anyone accessing from outside, doesn't know what the
>real port is (well heck, that's what NAT's for isn't it).
I have to ask this: If the service can be accessed from the outside,
then what's the point in hiding the real port address?
Regards,
Saso
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]