CLI Guide - WatchGuard Technologies

CLI Guide - WatchGuard Technologies CLI Guide - WatchGuard Technologies

watchguard.com
from watchguard.com More from this publisher
25.06.2013 Views

CHAPTER 3: Configuration Mode Commands NOTE Note that dynamic NAT is already present in the WatchGuard database by default, and is ready for use in security policies. You can specify “dynamic_nat” as the NAT action when you create the appropriate policies Examples WG(config)#nat load_balancing –vip wround –server \ {10.10.0.100 80 1} {10.10.0.101 80 2} \ {10.10.0.102 80 3} WG(config)#nat natS -stat -ext pub1 -int \ web_server1 Record dynamic security policy IP NAT action WG#config WG(config)#nat [-dynamic_nat ] Effect Records a new dynamic IP NAT action for use in security policies. You can create one of two possible DNAT options, choosing from the default IP address for interface 1 or a user-designated IP address Arguments If this is to be a user-designated IP address DNAT action, enter the IP address of your choice as the command argument. If you are using the default interface 1 IP address, enter that in the argument. no command WG#config WG(config)#no high_availability disable high availability 56 WatchGuard Vclass 5.1

Top-level configuration mode commands Effect Disables the high availability feature. Arguments None Example WG#config WG(config)#no high_availability policy command WG#config WG(config)#policy policy [ ] [-position ] [-firewall ] [

Top-level configuration mode commands<br />

Effect<br />

Disables the high availability feature.<br />

Arguments<br />

None<br />

Example<br />

WG#config<br />

WG(config)#no high_availability<br />

policy command<br />

WG#config<br />

WG(config)#policy<br />

policy [ ]<br />

[-position ]<br />

[-firewall ]<br />

[

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!