Netgear FVX538v1 FVX538 Reference Manual - Page 81

Security, Firewall Rules, LAN WAN Rules., Inbound Services, Add LAN WAN Inbound Service

Page 81 highlights

ProSafe VPN Firewall 200 FVX538 Reference Manual In the example, CU-SeeMe connections are allowed only from a specified range of external IP addresses. LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping In this example, we will configure multi-NAT to support multiple public IP addresses on one WAN interface. By creating an inbound rule, we will configure the firewall to host an additional public IP address and associate this address with a Web server on the LAN. If you arrange with your ISP to have more than one public IP address for your use, you can use the additional public IP addresses to map to servers on your LAN or DMZ. One of these public IP addresses will be used as the primary IP address of the router. This address will be used to provide Internet access to your LAN PCs through NAT. The other addresses are available to map to your servers. The following addressing scheme is used to illustrate this procedure: • Netgear FVX538 ProSafe VPN Firewall - WAN1 IP address: 10.1.0.118 - LAN IP address subnet: 192.168.1.1; subnet 255.255.255.0 - DMZ IP address subnet: 192.168.10.1; subnet 255.255.255.0 • Web server PC on the firewall's LAN - LAN IP address: 192.168.1.2 - DMZ IP Address: 192.168.10.2 - Access to Web server is (simulated) public IP address: 10.1.0.52 Tip: If you arrange with your ISP to have more than one public IP address for your use, you can use the additional public IP addresses to map to servers on your LAN or DMZ. One of these public IP addresses will be used as the primary IP address of the router which will be used to provide Internet access to your LAN PCs through NAT. The other addresses are available to map to your servers. To configure the FVX538 for additional IP addresses: 1. Select Security from the main menu and Firewall Rules from the submenu. 2. If your server is to be on your LAN, select LAN WAN Rules. If your server is to be on your DMZ, select DMZ WAN Rules. 3. Click Add under the Inbound Services table. The Add LAN WAN Inbound Service screen will display. Firewall Protection and Content Filtering v1.0, March 2009 4-21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering
4-21
v1.0, March 2009
In the example, CU-SeeMe connections are allowed only from a specified range of external IP
addresses.
LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping
In this example, we will configure multi-NAT to support multiple public IP addresses on one WAN
interface.
By creating an inbound rule, we will configure the firewall to host an additional public
IP address and associate this address with a Web server on the LAN.
If you arrange with your ISP to have more than one public IP address for your use, you can use the
additional public IP addresses to map to servers on your LAN or DMZ. One of these public IP
addresses will be used as the primary IP address of the router. This address will be used to provide
Internet access to your LAN PCs through NAT. The other addresses are available to map to your
servers.
The following addressing scheme is used to illustrate this procedure:
Netgear FVX538 ProSafe VPN Firewall
WAN1 IP address: 10.1.0.118
LAN IP address subnet: 192.168.1.1; subnet 255.255.255.0
DMZ IP address subnet: 192.168.10.1; subnet 255.255.255.0
Web server PC on the firewall’s LAN
LAN IP address: 192.168.1.2
DMZ IP Address: 192.168.10.2
Access to Web server is (simulated) public IP address: 10.1.0.52
To configure the FVX538 for additional IP addresses:
1.
Select
Security
from the main menu and
Firewall Rules
from the submenu.
2.
If your server is to be on your LAN, select
LAN WAN Rules.
If your server is to be on your DMZ, select
DMZ WAN Rules
.
3.
Click
Add
under the
Inbound Services
table. The
Add LAN WAN Inbound Service
screen
will display.
Tip:
If you arrange with your ISP to have more than one public IP address for your
use, you can use the additional public IP addresses to map to servers on your
LAN or DMZ. One of these public IP addresses will be used as the primary IP
address of the router which will be used to provide Internet access to your LAN
PCs through NAT. The other addresses are available to map to your servers.