You are on page 1of 2

How to Telnet from the SonicWALL UTM Appliance Using NAT Reflection

SONICOS ENHANCED
Problem:
You want to test SMTP (or other protocol) connectivity from the SonicWALL Unified Threat Management (UTM) appliance
to a server located on the internet, but you are testing remotely, and you do not have access to a host behind the
SonicWALL UTM appliance. The sample NAT configuration below will allow you to simulate a connection from your
remote-host using the SonicWALL UTM appliances WAN IP address as the source address for the connection to the
server. This is similar to running ping from the Diagnostics page on the SonicWALL UTM appliance, only it allows you to
define your own protocol for use.




Answer and Solution:
Create a new NAT policy and access rule to reflect the inbound traffic from the remote test-host off of the SonicWALL
UTM appliances WAN interface:
1. Add the NAT policy:
Source IP: 205.1.1.1
Translated source: 200.1.1.1
Destination IP: 200.1.1.1
Translated destination: 210.1.1.1
Service: TCP 25 (SMTP)
Inbound interface: WAN
Outbound interface: WAN

2. Add a WAN->WAN Allow access rule for SMTP (or relevant protocol) for the remote host from which you will
be connecting.

Testing:
From the remote test-host (205.1.1.1) telnet to TCP port 25 on the SonicWALL UTM appliance (200.1.1.1), such as using
telnet 200.1.1.1 25. The SonicWALL UTM appliance will then make a TCP port 25 (SMTP) connection to the Mail Server
at 210.1.1.1, using a translated source IP of 200.1.1.1. The mail server will see the connection as coming directly from the
SonicWALL UTM appliance.

You might also like