NETGEAR ProSafe FVS318N Cli Reference Manual page 101

Wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for ProSafe FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Command example:
FVS318N> security firewall ipv4 add_rule dmz_wan inbound
security-config[firewall-ipv4-dmz-wan-inbound]> service_name custom_services Traceroute
security-config[firewall-ipv4-lan-wan-inbound]> action ALWAYS_ALLOW
security-config[firewall-ipv4-lan-wan-inbound]> send_to_dmz_server_ip 176.21.214.2
security-config[firewall-ipv4-lan-wan-inbound]> translate_to_port_number enable Y
security-config[firewall-ipv4-lan-wan-inbound]> translate_to_port_number port 4500
security-config[firewall-ipv4-lan-wan-inbound]> wan_destination_ip_address OTHERS
security-config[firewall-ipv4-lan-wan-inbound]> wan_destination_ip_address_start 10.115.97.174
security-config[firewall-ipv4-lan-wan-inbound]> wan_users ANY
security-config[firewall-ipv4-lan-wan-inbound]> log Always
security-config[firewall-ipv4-lan-wan-inbound]> save
Related show command:
security firewall ipv4 edit_rule dmz_wan inbound <row id>
This command configures an existing IPv4 DMZ WAN inbound firewall rule. After you have
issued the security firewall ipv4 edit_rule dmz_wan inbound command to
specify the row to be edited (for row information, see the output of the
command), you enter the security-config [firewall-ipv4-dmz-wan-inbound]
ipv4 setup dmz_wan
mode. You can then edit one keyword and associated parameter or associated keyword at a
time in the order that you prefer. However, note that the setting of the action keyword
determines which other keywords and parameters you can apply to a rule.
Step 1
Format
security firewall ipv4 edit_rule dmz_wan inbound <row id>
Mode
security
Step 2
Format
service_name {default_services <default service name> |
action {ALWAYS_BLOCK | ALWAYS_ALLOW |
send_to_dmz_server_ip <ipaddress>
translate_to_port_number enable {N | Y
wan_destination_ip_address {WAN | OTHERS
dmz_users {ANY | SINGLE_ADDRESS {dmz_user_start_ip <ipaddress>}
wan_users {ANY | SINGLE_ADDRESS {wan_user_start_ip <ipaddress>}
show security firewall ipv4 setup dmz_wan
{custom_services <custom service name>}
BLOCK_BY_SCHEDULE_ELSE_ALLOW {schedule {Schedule1 |
Schedule2 | Schedule3}} | ALLOW_BY_SCHEDULE_ELSE_BLOCK
{schedule {Schedule1 | Schedule2 | Schedule3}}}
{translate_to_port_number port <number>}}
{wan_destination_ip_address_start <ipaddress>}
| ADDRESS_RANGE {dmz_user_start_ip <ipaddress>}
{dmz_user_end_ip <ipaddress>}}
| ADDRESS_RANGE {wan_user_start_ip <ipaddress>}
{wan_user_end_ip <ipaddress>}}
Security Mode Configuration Commands
101
show security firewall

Advertisement

Table of Contents
loading

Table of Contents