38. Firewall
38.4.2. Virtual Private Networking to a DMZ
If the firewall is to pass the VPN traffic through to another device (e.g. a VPN device in a DMZ) then
establish a DMZ zone and install the following rules.
Action
ACCEPT
ACCEPT
ACCEPT
ACCEPT
ACCEPT
ACCEPT
Table 38.13.
38.5. Firewall Configuration
All firewall fields accept only alphanumeric characters, excluding spaces. Do not use
punctuation or other special characters in these fields.
Figure 38.1. Security Menu
The Security menu is a top-level menu that is accessible from the main menu. Items used to configure
network security can be accessed from this menu.
Figure 38.2. Firewall Description table
Name
Synopsis: string
Description
Synopsis: string
An optional description string
Figure 38.3. Firewall Description form
ROX™ v2.2 User Guide
Source-Zone
Destination-Zone
net
dmz
net
dmz
net
dmz
dmz
net
dmz
net
dmz
net
Protocol
ah
esp
udp
ah
esp
udp
444
Dest-Port
500
500
RuggedBackbone™ RX1500
Need help?
Do you have a question about the RuggedBackbone RX1500 and is the answer not in the manual?