35. Firewall
35.4.2. Virtual Private Networking to a DMZ
If the firewall is to pass the VPN traffic through to another device (e.g. a VPN device in a DMZ) then
establish a DMZ zone and install the following rules.
Action
ACCEPT
ACCEPT
ACCEPT
ACCEPT
ACCEPT
ACCEPT
Table 35.13.
35.5. Firewall Configuration
All firewall fields accept only alphanumeric characters, excluding spaces. Do not use
punctuation or other special characters in these fields.
Figure 35.1. Security Menu
The Security menu is a top-level menu that is accessible from the main menu. Items used to configure
network security can be accessed from this menu.
Figure 35.2. Firewall Description table
Name
Synopsis: string
Description
Synopsis: string
An optional description string
Figure 35.3. Firewall Description form
ROX™ v2.2 User Guide
Source-Zone
Destination-Zone
net
dmz
net
dmz
net
dmz
dmz
net
dmz
net
dmz
net
Protocol
ah
esp
udp
ah
esp
udp
377
Dest-Port
500
500
RuggedBackbone™ RX5000
Need help?
Do you have a question about the RuggedBackbone RX5000 and is the answer not in the manual?
Questions and answers