FTGate behind a NAT router/firewall

When running FTGate behind a NAT router or firewall and has an IP address that is either 192.168.x.x or 10.x.x.x, then NAT device will appear to FTGate to be part of the local network address space. This will cause it to be granted automatic authentication rights, and hence it will be able to relay through the server.

The solution to this problem is to simply go to the Global Security Policy and add the address of the router with only the PA flag set.

e.g. If the NAT router has a local address of 192.168.1.15 we would enter:

Address

192.168.1.15

Mask

255.255.255.255

Flags

PA

This will prevent relaying though your server.

See Also: