Netgear FVS336G-100NAS Reference Manual - Page 161
Port Triggering, VPN Tunnels
View all Netgear FVS336G-100NAS manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 161 highlights
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual • Schedule. You can specify whether the rule is to be applied on the Schedule 1, Schedule 2, or Schedule 3 time schedule (see "Setting a Schedule to Block or Allow Specific Traffic" on page 4-18). See "Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-2 for the procedure on how to use this feature. Port Triggering Port triggering allows some applications to function correctly that would otherwise be partially blocked by the firewall. Using this feature requires that you know the port numbers used by the application. Once configured, port triggering operates as follows: • A PC makes an outgoing connection using a port number defined in the Port Triggering table. • This VPN firewall records this connection, opens the additional INCOMING port or ports associated with this entry in the Port Triggering table, and associates them with the PC. • The remote system receives the PCs request and responds using the different port numbers that you have now opened. • This VPN firewall matches the response to the previous request and forwards the response to the PC. Without port triggering, this response would be treated as a new connection request rather than a response. As such, it would be handled in accordance with the Port Forwarding rules. - Only one PC can use a port triggering application at any time. - After a PC has finished using a port triggering application, there is a time-out period before the application can be used by another PC. This is required because the firewall cannot be sure when the application has terminated. See "Port Triggering" on page 4-23 for the procedure on how to use this feature. VPN Tunnels The VPN firewall permits up to 25 IPsec VPN tunnels and 10 SSL VPN tunnels at a time. Each tunnel requires extensive processing for encryption and authentication. See Chapter 5, "Virtual Private Networking Using IPsec" for the procedure on how to use IPsec VPN, and Chapter 6, "Virtual Private Networking Using SSL Connections for the procedure on how to use SSL VPN. Router and Network Management 8-7 v1.0, October 2007