Installation guide
Switch Security
6-40
3. Refer to the following information as displayed within the Interface tab:
4. To Edit an existing interface, select it from the list of available interfaces and click the Edit button.
An Edit Interface screen displays allowing the user to modify the VLAN and interface type (inside or
outside).
5. If an interface is obsolete or of no use to the NAT translation process, select it and click the Delete
button to remove it from the list of interfaces available
6. If modifying an existing interface is not a valid option, consider configuring a new interface. To define
a new NAT interface:
a. Click the Add button from within the Interfaces tab.
b. Use the Interface drop-down menu to select the VLAN used as the communication medium
between the switch managed network and its destination (within the insecure outside world).
c. Use the Type drop-down menu to specific the Inside or Outside designation as follows:
Inside - The set of switch-managed networks subject to translation. These are the internal
addresses you are trying to prevent from being exposed to the outside world.
Outside - All other addresses. Usually these are valid addresses located on the Internet. Outside
addresses pose no risk if exposed over a publicly accessible network.
d. Refer to the Status field for the current state of the requests made from applet. This field
displays error messages if something goes wrong in the transaction between the applet and
the switch.
e. Click OK to use the changes to the running configuration and close the dialog.
f. Click Cancel to close the dialog without committing updates to the running configuration.
Interface
Displays the particular VLAN used as the inside or outside NAT
type. All defined VLANs are available from the drop-down menu
for use as the interface.
Type
Displays the NAT type as either:
• Inside - The set of switch-managed networks subject to
translation. These are the internal addresses you are trying
to prevent from being exposed to the outside world.
• Outside - All other addresses. Usually these are valid
addresses located on the Internet. Outside addresses pose
no risk if exposed over a publicly accessible network.