Specifications

Figure 3.43: VPN Connection
To define a rule, first select the transmission protocol: tcp, udp, or icmp. If
you select tcp or udp, you only need to specify the destination port or port
range. If you enter icmp, choose the message type from the list.
Activate ‘Log Access Violation’, if desired.
Masquerading
In this dialog, activate masquerading for the collection, as shown in Fig-
ure 3.46 on page 91. This is only possible, however, if a local subnet is
routed, but not a remote one. All packets that leave the tunnel on the local
side are then masqueraded.
Destination NAT
In the final dialog for VPN configuration, shown in Figure 3.47 on page 92,
configure the rule for “Destination NAT”. Select the transmission protocol
(tcp or udp), enter the destination port (a port or port range), then enter the
IP address and the port to which the packets should be redirected.
If you click ‘Add’, the rule appears in the overview window. With ‘Change’,
edit an existing rule. ‘Delete’ removes a rule.
88 Using the FAS