NETGEAR FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall Reference Manual page 172

Dual wan gigabit firewall with ssl & ipsec vpn
Hide thumbs Also See for FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall:
Table of Contents

Advertisement

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Enable Stealth Mode. Prevents the VPN firewall from responding to incoming requests for
unsupported services.
As you define your firewall rules, you can further refine their application according to the
following criteria:
LAN Users. These settings determine which computers on your network are affected by this
rule. Select the desired IP Address in this field.
WAN Users. These settings determine which Internet locations are covered by the rule, based
on their IP address.
Any. The rule applies to all Internet IP address.
Single address. The rule applies to a single Internet IP address.
Address range. The rule is applied to a range of Internet IP addresses.
Destination Address. These settings determine the destination IP address for this rule which
will be applicable to incoming traffic This rule will be applied only when the destination IP
address of the incoming packet matches the IP address of the selected WAN interface
Selecting ANY enables the rule for any LAN IP destination. WAN1 and WAN2 corresponds to
the respective WAN interface governed by this rule.
Services. You can specify the desired services or applications to be covered a rule. If the
desired service or application does not appear in the Custom Services Table, you must define
it using the Services screen (see
Schedule. If you have set firewall rules on the LAN WAN Rules screen, you can configure
three different schedules (for example, schedule 1, schedule 2, and schedule 3) for when a rule
is to be applied. Once a schedule is configured, it affects all rules that use this schedule. You
specify the days of the week and time of day for each schedule. (See
Block or Allow Specific Traffic" on page 4-24
Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the VPN firewall. Using this feature requires that you know the port numbers used by
the application.
Once configured, port triggering operates as follows:
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
The VPN firewall records this connection, opens the additional incoming port or ports
associated with this entry in the Port Triggering table, and associates them with the PC.
8-6
"Adding Customized Services" on page
for the procedure on how to use this feature.)
VPN Firewall and Network Management
v1.0, January 2010
4-19).
"Setting a Schedule to

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe fvs336g

Table of Contents