NETGEAR ProSafe FVS318N Cli Reference Manual page 81

Wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for ProSafe FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
security-config[firewall-ipv4-lan-wan-outbound]> action
security-config[firewall-ipv4-lan-wan-outbound]> lan_users address_wise ANY
security-config[firewall-ipv4-lan-wan-outbound]> wan_users ADDRESS_RANGE
security-config[firewall-ipv4-lan-wan-outbound]> wan_user_start_ip 10.120.114.217
security-config[firewall-ipv4-lan-wan-outbound]> wan_user_end_ip 10.120.114.245
security-config[firewall-ipv4-lan-wan-outbound]> qos_profile Normal-Service
security-config[firewall-ipv4-lan-wan-outbound]> log ALWAYS
security-config[firewall-ipv4-lan-wan-outbound]> save
Related show command:
security firewall ipv4 edit_rule lan_wan outbound <row id>
This command configures an existing IPv4 LAN WAN outbound firewall rule. After you have
issued the security firewall ipv4 edit_rule lan_wan outbound command to
specify the row to be edited (for row information, see the output of the
command), you enter the security-config [firewall-ipv4-lan-wan-outbound]
ipv4 setup lan_wan
mode. You can then edit one keyword and associated parameter or associated keyword at a
time in the order that you prefer. However, note that the setting of the action keyword
determines which other keywords and parameters you can apply to a rule.
Step 1
Format
security firewall ipv4 edit_rule lan_wan outbound <row id>
Mode
security
Step 2
Format
service_name {default_services <default service name> |
action {ALWAYS_BLOCK | ALWAYS_ALLOW |
lan_users {address_wise {ANY | SINGLE_ADDRESS {lan_user_start_ip
wan_users {ANY | SINGLE_ADDRESS {wan_user_start_ip <ipaddress>}
qos_priority {Normal-Service | Minimize-Cost |
log {NEVER | ALWAYS}
bandwidth_profile <profile name>
nat_ip type {WAN_INTERFACE_ADDRESS | SINGLE_ADDRESS
Mode
security-config [firewall-ipv4-lan-wan-outbound]
show security firewall ipv4 setup lan_wan
{custom_services <custom service name>}
BLOCK_BY_SCHEDULE_ELSE_ALLOW {schedule {Schedule1 |
Schedule2 | Schedule3}} | ALLOW_BY_SCHEDULE_ELSE_BLOCK
{schedule {Schedule1 | Schedule2 | Schedule3}}}
<ipaddress>} | ADDRESS_RANGE {lan_user_start_ip <ipaddress>}
{lan_user_end_ip <ipaddress>}} | group_wise <group name>}
| ADDRESS_RANGE {wan_user_start_ip <ipaddress>}
{wan_user_end_ip <ipaddress>}}
Maximize-Reliability | Maximize-Throughput | Minimize-Delay}
{address <ipaddress>}}
Security Mode Configuration Commands
81
ALWAYS_ALLOW
show security firewall

Advertisement

Table of Contents
loading

Table of Contents