Inverse masquerading

Simple masquerading has the effect, that all IP addresses in the local network are masked behind the IP address of the router. But when using simple masquerading if a certain computer on the LAN is supposed to be available for stations on the internet (e.g. FTP server) the IP address of the FTP server is not visible either. A connection to this FTP server from the internet in not possible.

To enable the access to such a server (’exposed host’) in the LAN, the IP address of the FTP server must be entered with all services that are also supposed to be available from outside the LAN. If a computer sends a packet from the Internet to, for example, an FTP server on the LAN , from the point of view of this computer the router appears to be the FTP server. The router reads the IP address of the FTP server in the LAN from the entry in the service table. The packet is forwarded to this computer. All packets that come from the FTP server in the LAN (answers from the server) are hidden behind the IP address of the router.





The only small difference is that:

On occasion it is desirable for the "exposed" host not to be contacted over this standard port, e.g. when security reasons demand the use of another port.

In this case not only the implementation of ports to an IP address is necessary, but as well the implementation to other ports (port mapping). Another example of use for this port implementation is the implementation of several ports of the WAN to a shared port in the LAN, which can be assigned to different IP addresses (N-IP-Mapping).

The configuration of port mapping involves the assignment of a port or port range (start port to end port) to an IP address from the LAN as the target and the port (map port) to be used in the LAN.





LANconfig: IP-Router / Masquerading / Port-Forwarding table

WEBconfig: LCOS-menu tree / Setup / IP-Router / 1-N-NAT / Service table