NETGEAR ProSafe FVS336G Reference Manual page 171

Dual wan gigabit firewall with ssl & ipsec vpn
Hide thumbs Also See for ProSafe FVS336G:
Table of Contents

Advertisement

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Services. You can specify the desired Services or applications to be covered by this rule. If the
desired service or application does not appear in the list, you must define it using the Services
menu (see
"Adding Customized Services" on page
Schedule. You can specify whether the rule is to be applied on the Schedule 1, Schedule 2, or
Schedule 3 time schedule (see
page
4-29).
See
"Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-2
how to use this feature.
Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the firewall. Using this feature requires that you know the port numbers used by the
application.
Once configured, port triggering operates as follows:
A PC makes an outgoing connection using a port number defined in the Port Triggering table.
This VPN firewall records this connection, opens the additional INCOMING port or ports
associated with this entry in the Port Triggering table, and associates them with the PC.
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
This VPN firewall matches the response to the previous request and forwards the response to
the PC. Without port triggering, this response would be treated as a new connection request
rather than a response. As such, it would be handled in accordance with the Port Forwarding
rules.
Only one PC can use a port triggering application at any time.
After a PC has finished using a port triggering application, there is a time-out period
before the application can be used by another PC. This is required because the firewall
cannot be sure when the application has terminated.
See
"Configuring Port Triggering" on page 4-27
VPN Tunnels
The VPN firewall permits up to 25 IPsec VPN tunnels and 10 SSL VPN tunnels at a time. Each
tunnel requires extensive processing for encryption and authentication.
Router and Network Management
4-15).
"Setting a Schedule to Block or Allow Specific Traffic" on
for the procedure on how to use this feature.
v1.2, June 2008
for the procedure on
8-7

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fvs336g-100nas

Table of Contents