Port Forwarding; Port Triggering; Dmz Port - NETGEAR ProSafe Quad WAN FR538G Reference Manual

Gigabit firewall
Table of Contents

Advertisement

Port forwarding

Port triggering

DMZ port

Exposed hosts
Port Forwarding
The firewall always blocks DoS (Denial of Service) attacks. A DoS attack does not attempt to steal
data or damage your PCs, but overloads your Internet connection so you can not use it (i.e., the
service is unavailable). You can also create additional firewall rules that are customized to block or
allow specific traffic.
Warning: This feature is for Advanced Administrators only! Incorrect configuration
will cause serious problems.
You can control specific inbound traffic (i.e., from WAN to LAN and from WAN to DMZ).
Inbound Services lists all existing rules for inbound traffic. If you have not defined any rules, only
the default rule will be listed. The default rule blocks all inbound traffic.
Each rule lets you specify the desired action for the connections covered by the rule:
BLOCK always
BLOCK by schedule, otherwise Allow
ALLOW always
ALLOW by schedule, otherwise Block
You can also enable a check on special rules:
Drop fragmented IP packets – Enable this to drop the fragmented IP packets.
UDP Flooding – Enable this to limit the number of UDP sessions created from one LAN
machine.
TCP Flooding – Enable this to protect the router from Syn flood attack.
Enable DNS Proxy – Enable this to allow incoming DNS queries.
As you define your firewall rules, you can further refine their application according to the
following criteria:
LAN Users – These settings determine which computers on your network are affected by this
rule. Select the desired IP Address in this field.
Router and Network Management
ProSafe Quad WAN Gigabit Firewall FR538G Reference Manual
v1.0, November 2007
5-5

Advertisement

Table of Contents
loading

Table of Contents