Netgear FVS336G-100NAS Reference Manual - Page 160

Enable Stealth Mode., Enable DNS Proxy.

Page 160 highlights

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual Each rule lets you specify the desired action for the connections covered by the rule: • BLOCK always • BLOCK by schedule, otherwise Allow • ALLOW always • ALLOW by schedule, otherwise Block You can also enable a check on special rules: • VPN Passthrough. Passes the VPN traffic without any filtering, specially used when this firewall is between two VPN tunnel end points. • Drop fragmented IP packets. Drops any fragmented IP packets. • UDP Flooding. Limits the number of UDP sessions created from one LAN machine. • TCP Flooding. Protects the VPN firewall from SYN flood attack. • Enable DNS Proxy. Allows the VPN firewall to handle DNS queries from the LAN. • Enable Stealth Mode. Prevents the VPN firewall from responding to incoming requests for unsupported services. As you define your firewall rules, you can further refine their application according to the following criteria: • LAN Users. These settings determine which computers on your network are affected by this rule. Select the desired IP Address in this field. • WAN Users. These settings determine which Internet locations are covered by the rule, based on their IP address. - Any: The rule applies to all Internet IP address. - Single address: The rule applies to a single Internet IP address. - Address range: The rule is applied to a range of Internet IP addresses. • Destination Address. These settings determine the destination IP address for this rule which will be applicable to incoming traffic This rule will be applied only when the destination IP address of the incoming packet matches the IP address of the selected WAN interface Selecting ANY enables the rule for any LAN IP destination. WAN1 and WAN2 corresponds to the respective WAN interface governed by this rule. • Services. You can specify the desired Services or applications to be covered by this rule. If the desired service or application does not appear in the list, you must define it using the Services menu (see "Adding Customized Services" on page 4-16). 8-6 Router and Network Management v1.0, October 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
8-6
Router and Network Management
v1.0, October 2007
Each rule lets you specify the desired action for the connections covered by the rule:
BLOCK always
BLOCK by schedule, otherwise Allow
ALLOW always
ALLOW by schedule, otherwise Block
You can also enable a check on special rules:
VPN Passthrough.
Passes the VPN traffic without any filtering, specially used when this
firewall is between two VPN tunnel end points.
Drop fragmented IP packets.
Drops any fragmented IP packets.
UDP Flooding.
Limits the number of UDP sessions created from one LAN machine.
TCP Flooding.
Protects the VPN firewall from SYN flood attack.
Enable DNS Proxy.
Allows the VPN firewall to handle DNS queries from the LAN.
Enable Stealth Mode.
Prevents the VPN firewall from responding to incoming requests for
unsupported services.
As you define your firewall rules, you can further refine their application according to the
following criteria:
LAN Users.
These settings determine which computers on your network are affected by this
rule. Select the desired IP Address in this field.
WAN Users.
These settings determine which Internet locations are covered by the rule, based
on their IP address.
Any: The rule applies to all Internet IP address.
Single address: The rule applies to a single Internet IP address.
Address range: The rule is applied to a range of Internet IP addresses.
Destination Address.
These settings determine the destination IP address for this rule which
will be applicable to incoming traffic This rule will be applied only when the destination IP
address of the incoming packet matches the IP address of the selected WAN interface
Selecting ANY enables the rule for any LAN IP destination. WAN1 and WAN2 corresponds to
the respective WAN interface governed by this rule.
Services.
You can specify the desired Services or applications to be covered by this rule. If the
desired service or application does not appear in the list, you must define it using the Services
menu (see
“Adding Customized Services” on page 4-16
).