• NAPT: The NAPT address into which the original IP address is translated. The
drop-down list displays all of your available NAPT addresses/ranges, from which
you can select an entry. If you want to add a single address or a sub-range from
the given pool/range, select User Defined to add a new Network Object
representing the new host (see 'Configuring Network Objects' on page 580).
Enter a single port or select Range to enter a range of ports.
7. Select the 'Log Packets Matched by This Rule' check box to log the first packet from a
connection that was matched by this rule.
41.4 Configuring the Access List
The Access list is designed to allow comprehensive control over the firewall's behavior.
You can define specific set of rules for ingress (inbound) and egress (outbound) traffic and
control the order of logically similar sets of rules. These rules can later be assigned to the
device's LAN and/or WAN interfaces (see 'Configuring Advanced Filtering').
Notes:
• Only one Access List group can be assigned to an interface. Therefore,
ensure that your Access List group includes all the required rules that
you want to later assign to a specific interface.
• You can enable the reporting (through Syslog messages) of Access List
rules that are set to "log", whenever traffic matching the Access List is
encountered. This is enabled using the ini file parameter,
EnableSecSyslog.
 To configure Access List rules:
1. Open the Access Lists table (Configuration tab > Data menu > Firewall and ACL
submenu > Access List); the following appears:
Figure 41-10: Access Lists Table
2. Add a new Access List group name:
a. Click the New ACL link; the 'Access List Name page appears.
Figure 41-11: Defining Access List Name
b. In the 'Access List Name' field, enter a name for the Access List rule group, and
then click OK; the Access Lists table re-appears, displaying the newly added
Access List rule group.