32 | Configuring NAT Mode GatewayConfiguring NAT Mode GatewayThis section provides an overview of a Dell SonicWALLSuperMassive 9600 appliance operating as a single networkgateway in NAT mode, which is the default mode for a newlyconfigured SuperMassive 9600. This section is relevant toadministrators following deployment Scenario A.Note: No additional configuration is necessary to deploy yourappliance as a single network gateway in Many-to-OneNAT mode.Overview of NAT ModeNetwork Address Translation (NAT) allows private IP addresseson internal networks to be mapped to at least one public IPaddress on the WAN interface of the Dell SonicWALL securityappliance. Outbound traffic from the internal network usesmany-to-one NAT address mappings for their LANs, WLANs,and other internal networks.All traffic in SonicOS must go through both an access rule and aNAT policy, a fundamental part of the NAT Mode architecture.The NAT policy is even used for traffic that needs no IP addresstranslation, such as traffic traveling between two different LANinterfaces, traffic on the simplest types of VPNs, or throughLayer 2 Bridge Mode / Transparent Mode configurations.The Dell SonicWALL SuperMassive 9600 ships with the internalDHCP server active on the LAN port. However, if a DHCPserver is already active on your LAN, the Dell SonicWALLappliance will disable its own DHCP server to prevent conflicts.As shown in the illustration on this page, ports X1 and X0 arepreconfigured as WAN and LAN, respectively. The remainingports (X2-X17) can be configured to meet the needs of yournetwork. In the example diagram, certain interfaces areconfigured for specific zones:• X1—WAN• X0—LAN• X8—Wireless LAN• X16—DMZSonicWALL SuperMassive 9600 CONSOLESDHCMGMT X19 X17X16 X14 X12 X10 X8 X6 X4 1GE1GE10GEBYPASSSTATUSX2 X0X1X3X5X7X9X11X13X15X18M0ALARMTESTPWR 1 PWR 2SonicPointX1X0X8X16InternetWAN ZoneDell SonicWALL SuperMassiveDMZ Zone WLAN Zone LAN Zone