Installation guide

Overview
1-28
Site-Site VPN — For example, a company branching office traffic to another branch office traffic with
an unsecured link between the two locations.
Remote VPN — Provides remote user ability to access company resources from outside the company
premises.
The switch supports:
IPSec termination for site to site
IPSec termination for remote access
IPSec traversal of firewall filtering
IPSec traversal of NAT
IPSec/L2TP (client to switch)
1.2.5.13 NAT
NAT (Network Address Translation) is supported for non-IPSec packets routed by the switch. The following
types of NAT are supported:
Port NAT – Port NAT (also known as NAPT) entails multiple local addresses are mapped to single
global address and a dynamic port number. The user is not required to configure any NAT IP address.
Instead, an IP address for the switch’s public interface is used to NAT packets going out from private
network and vice versa for packets entering private network.
Static NAT – Static NAT is similar to Port NAT with the only difference that it allows the user to
configure a source NAT IP address and/or destination NAT IP address to which all the packets will be
NATted to. The source NAT IP address is used when hosts on a private network are trying to access
a host on a public network. Destination NAT IP address can be used for public hosts to talk to a host
on the private network.
1.2.5.14 Firewall
A firewall protects your network from unauthorized Internet traffic. The primary function of a firewall is to let
authorized traffic pass through while unauthorized traffic gets blocked. Firewalls can be implemented in both
hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized
Internet users from accessing private networks connected to the Internet, especially Intranets. All messages
entering or leaving the Intranet pass through the firewall, which examines each message and blocks those that
do not meet the specified security criteria.
Motorola’s RFS7000 offers a hardware assisted stateful firewall that can route traffic at line rate (4 Gbps, full
duplex). Some common attacks checked by a RFS7000 supported firewall include:
LAND attack
IP Fragments overlap
TCP XMAS Scan
TCP NULL Scan
TCP FIN Scan
IP TTL zero
Misuse of TCP URG offset
Disallowing IP source route option
TCP short header