Inbound Rules Examples - NETGEAR SRXN3205 - ProSafe Wireless-N VPN Firewall Wireless Router Reference Manual

Wireless-n vpn firewall
Hide thumbs Also See for SRXN3205 - ProSafe Wireless-N VPN Firewall Wireless Router:
Table of Contents

Advertisement

For example, if a VPN Client or Gateway on the LAN side of this firewall wants to connect to
another VPN endpoint on the WAN (placing this firewall between two VPN end points),
encrypted packets are sent to this firewall. Since this firewall filters the encrypted packets
through NAT, the packets become invalid unless VPN pass through is enabled.
When VPN pass through is enabled, the VPN tunnel will pass the VPN traffic without any
filtering. Tunnels can be: IPsec; PPTP; or L2TP
To enable the appropriate Attack Checks for your environment:
1. Select Security > Firewall from the main/submenu.
2. Click the Attack Checks tab and the Attack Checks screen displays.
Figure 5-4
3. Select the Attack Checks you wish to initiate, and click Apply to save your settings

Inbound Rules Examples

LAN WAN Inbound Rule: Hosting A Local Public Web Server
If you host a public Web server on your local network, you can define a rule to allow inbound Web
(HTTP) requests from any outside IP address to the IP address of your Web server at any time of
day.
In the example shown in
Web server at LAN IP address 192.168.0.99.
Firewall Security and Content Filtering
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Figure
5-5, unrestricted access is provided from the Internet to the local
v1.0, October 2008
.
5-11

Advertisement

Table of Contents
loading

Table of Contents