NETGEAR UTM5EW-100NAS Appliance Reference Manual page 308

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Table 8-10.
Add Policy
Item
Description (or Subfield and Description)
Apply
IP Network
Policy For
(continued)
All
Addresses
8-36
Settings (continued)
Policy Name A descriptive name of the SSL VPN policy for identification
and management purposes.
IP Address
The network IP address to which the SSL VPN policy is
applied.
Subnet Mask The network subnet mask to which the SSL VPN policy is
applied.
Port Range /
A port (enter in the Begin field) or a range of ports (enter in
Port Number
the Begin and End fields) to which the SSL VPN policy is
applied. Ports can be 0 through 65535. The policy is applied
to all TCP and UDP traffic that passes on those ports. Leave
the fields blank to apply the policy to all traffic.
Service
From the pull-down menu, select the service to which the
SSL VPN policy is applied:
• VPN Tunnel. The policy is applied only to a VPN tunnel.
• Port Forwarding. The policy is applied only to port
forwarding.
• All. The policy is applied both to a VPN tunnel and to port
forwarding.
Permission
From the pull-down menu, select whether the policy permits
(PERMIT) or denies (DENY) access.
Policy Name A descriptive name of the SSL VPN policy for identification
and management purposes.
Port Range /
A port (enter in the Begin field) or a range of ports (enter in
Port Number
the Begin and End fields) to which the SSL VPN policy is
applied. Ports can be 0 through 65535. The policy is applied
to all TCP and UDP traffic that passes on those ports. Leave
the fields blank to apply the policy to all traffic.
Service
From the pull-down menu, select the service to which the
SSL VPN policy is applied:
• VPN Tunnel. The policy is applied only to a VPN tunnel.
• Port Forwarding. The policy is applied only to port
forwarding.
• All. The policy is applied both to a VPN tunnel and to port
forwarding.
Permission
From the pull-down menu, select whether the policy permits
(PERMIT) or denies (DENY) access.
Virtual Private Networking Using SSL Connections
v1.0, January 2010

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents