Netgear FVG318v1 FVG318 Reference Manual - Page 70

Default DMZ Server, DMZ WAN Rules, Service, Send to DMZ Service, WAN Users, Apply

Page 70 highlights

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual Default DMZ Server Incoming traffic from the Internet is normally discarded by the firewall unless the traffic is a response to one of your local computers or a service for which you have configured an inbound rule. Instead of discarding this traffic, you can have it forwarded to one computer on your network. This computer is called the Default DMZ Server. The Default DMZ Server feature is helpful when using some online games and video conferencing applications that are incompatible with NAT. The firewall is programmed to recognize some of these applications and to work properly with them, but there are other applications that may not function well. In some cases, one local PC can run the application properly if that PC's IP address is entered as the Default DMZ Server for a particular service. The DMZ Server screen is used for setting up a firewall rule for traffic coming from the WAN to the DMZ. Inbound traffic for a service can be configured to be blocked or allowed, by default, or set per a schedule (defined on the Schedule page under the Security menu). To assign a computer or server to be a Default DMZ server: 1. Click the DMZ WAN Rules tab. 2. When the DMZ WAN Rules screen displays, click Add. 3. From the Service pull-down menu, select the service to allow or block. This is a unique name assigned to the service. The name usually indicates the type of traffic the rule covers such as ftp, ssh, telnet, ping, etc. Services not already in the list can be added from the Security < Services screen. 4. Enter the Send to DMZ Service address of the device on the DMZ which is hosting the server. Select the port number checkbox and enter a port number ONLY if the server is listening on a port other than the default. For example, if a machine on the DMZ side is running a telnet server on port 2000, then select the Translate to Port Number checkbox and type 2000 in the Port field. if it is listening on the default port 23, then the box can be left unchecked. 5. From the WAN Users pull-down menu, select the specific IP addresses on the WAN that will be affected by the rule. This rule will affect packets for the selected service to the defined IP address or range of IP addresses on the WAN side. • Any: All IP addresses on the WAN will be affected by the rule. • Single Address: A single WAN IP address will be affected by the rule. • Address Range: A range of IP addresses on the DMZ network will be affected by the rule. 6. Click Apply to save your settings. 4-10 Firewall Protection and Content Filtering v1.0, September 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
4-10
Firewall Protection and Content Filtering
v1.0, September 2007
Default DMZ Server
Incoming traffic from the Internet is normally discarded by the firewall unless the traffic is a
response to one of your local computers or a service for which you have configured an inbound
rule. Instead of discarding this traffic, you can have it forwarded to one computer on your network.
This computer is called the Default DMZ Server.
The Default DMZ Server feature is helpful when using some online games and video conferencing
applications that are incompatible with NAT. The firewall is programmed to recognize some of
these applications and to work properly with them, but there are other applications that may not
function well. In some cases, one local PC can run the application properly if that PC’s IP address
is entered as the Default DMZ Server for a particular service.
The DMZ Server screen is used for setting up a firewall rule for traffic coming from the WAN to
the DMZ. Inbound traffic for a service can be configured to be blocked or allowed, by default, or
set per a schedule (defined on the Schedule page under the Security menu).
To assign a computer or server to be a Default DMZ server:
1.
Click the
DMZ WAN Rules
tab.
2.
When the DMZ WAN Rules screen displays, click
Add.
3.
From the
Service
pull-down menu, select the service to allow or block.
This is a unique name assigned to the service. The name usually indicates the type of traffic
the rule covers such as ftp, ssh, telnet, ping, etc. Services not already in the list can be added
from the Security < Services screen.
4.
Enter the
Send to DMZ Service
address of the device on the DMZ which is hosting the server.
Select the port number checkbox and enter a port number ONLY if the server is listening on a
port other than the default. For example, if a machine on the DMZ side is running a telnet
server on port 2000, then select the Translate to Port Number checkbox and type 2000 in the
Port field. if it is listening on the default port 23, then the box can be left unchecked.
5.
From the
WAN Users
pull-down menu, select the specific IP addresses on the WAN that will
be affected by the rule. This rule will affect packets for the selected service to the defined IP
address or range of IP addresses on the WAN side.
Any: All IP addresses on the WAN will be affected by the rule.
Single Address: A single WAN IP address will be affected by the rule.
Address Range: A range of IP addresses on the DMZ network will be affected by the rule.
6.
Click
Apply
to save your settings.