NETGEAR ProSafe FVS114 Reference Manual page 43

Vpn firewall
Hide thumbs Also See for ProSafe FVS114:
Table of Contents

Advertisement

An example of the menu for defining or editing a rule is shown in
Service. From this list, select the application or service to be allowed or blocked. The list
already displays many common services, but you are not limited to these choices. Use the
Services menu to add any additional services or applications that do not already appear.
Action. Choose how you would like this type of traffic to be handled. You can block or allow
always, or you can choose to block or allow according to the schedule you have defined in the
Schedule menu.
Source Address. Specify traffic originating on the LAN (outbound) or the WAN (inbound),
and choose whether you would like the traffic to be restricted by source IP address. You can
select Any, a Single address, or a Range. If you select a range of addresses, enter the range in
the start and finish boxes. If you select a single address, enter it in the start box.
Destination Address.The Destination Address will be assumed to be from the opposite (LAN
or WAN) of the Source Address. As with the Source Address, you can select Any, a Single
address, or a Range unless NAT is enabled and the destination is the LAN. In that case, you
must enter a Single LAN address in the start box.
Log. You can select whether the traffic will be logged. The choices are:
Never — no log entries will be made for this service.
Match — traffic of this type that matches the parameters and action will be logged.
Options. These options determine how certain types of packets are handled by the Router.
Enable or disable each option as required.
Enable VPN Passthrough (IPSec, PPTP, L2TP) — The IPSec, PPTP, and L2TP protocols
are used to establish a secure connection, and are widely used by VPN (Virtual Private
Networking) programs. If this setting is disbled, PCs only your LAN will not be able to
use thes VPN programs.
Drop fragmented IP packets — If enabled, fragmented IP packets are discarded, forcing
re-transmission of these packets. In some situations, this could prevent successful
commnunication.
Block TCP flood — A TCP flood is excessively large number of TCP connection
requests. This is usually a DoS (Denial of Service) attack. This setting should be normally
be enabled.
Block UDP flood — A UDP flood is excessively large number of UDP packets. This is
usually a DoS (Denial of Service) attack. This setting should be normally be enabled.
Firewall Protection and Content Filtering
Reference Manual for the ProSafe VPN Firewall FVS114
202-10098-01, April 2005
Figure
4-3. The parameters are:
4-5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Fvs114na

Table of Contents