Cisco Cisco Packet Data Gateway (PDG)

Página de 128
  Configuring the SaMOG Gateway 
Configuring the System to Perform as a SaMOG Gateway  ▀   
 
SaMOG Administration Guide, StarOS Release 18  ▄  
 
   
119 
        access-rule no-ruledef-matches downlink action permit nat-realm nat_realm_name 
        exit 
     rulebase rulebase_name 
        fw-and-nat default-policy policy_name 
        end 
Notes: 
 
The 
nat_realm_name
 is the IP pool used by the NAT service for dynamic NATting. This IP pool may have 
one-to-one or many-to-one users mapping to conserve IP addresses. 
Flow-based LBO Blacklist
 
  active-charging service acs_service_name 
     access-ruledef access_ruledef_name 
        ip dst-address = ipv4_destination_address[/mask ] 
        exit 
     fw-and-nat policy policy_name 
        access-rule priority priority access-ruledef access_ruledef_name permit nat-realm 
nat_realm_name 
        access-rule no-ruledef-matches uplink action permit bypass-nat 
        access-rule no-ruledef-matches downlink action permit bypass-nat 
        exit 
     rulebase rulebase_name 
        fw-and-nat default-policy policy_name 
        end 
Notes: 
 
The 
nat_realm_name
 is the IP pool used by the NAT service for dynamic NATting. This IP pool may have 
one-to-one or many-to-one users mapping to conserve IP addresses. 
Configuring Web-based Authorization 
Important:
  The Web Authorization feature is license dependent. Contact your local Cisco account representative 
for licensing requirements. 
Optionally, configure the SaMOG web-based authorization by applying the example configuration below.