Netgear DM111PSP-100NAS DM111PSPv2 User Manual - Page 35

Inbound Rule Example: A Local Public Web Server, Service, Action, Send to LAN Server, WAN Users

Page 35 highlights

Broadband ADSL2+ Modem DM111PSPv2 Inbound Rule Example: A Local Public Web Server If you host a public web server on your local network, you can define a rule to allow inbound web (HTTP) requests from any outside IP address to the IP address of your web server at any time of day, as shown here and described following the figure: Figure 7. Allow inbound web requests Service. From this list, select the application or service you want to allow or block. The list already displays many common services, but you are not limited to these choices. Use the Services screen to add any additional services or applications that do not already appear. See Configure Services on page 38. Action. Choose how you want to handle this type of traffic. You can block or allow always, or you can block or allow according to the schedule you have defined in the Schedule screen, described in Schedule Firewall Services on page 40. Send to LAN Server. Enter the IP address of the computer or server on your LAN that receives the inbound traffic covered by this rule. WAN Users. These settings determine which packets are covered by the rule, based on their source (WAN) IP address: Any. All IP addresses are covered by this rule. Address range. When this option is selected, the Start and Finish fields are required. Single address. Enter the required address in the Start field. Log. You can select whether to log the traffic: Never. No log entries are made for this service. Always. Any traffic for this service type is logged. Match. Traffic of this type that matches the settings and action is logged. Not match. Traffic of this type that does not match the settings and action is logged. Security Settings 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82

Security Settings
35
Broadband ADSL2+ Modem DM111PSPv2
Inbound Rule Example: A Local Public Web Server
If you host a public web server on your local network, you can define a rule to allow inbound
web (HTTP) requests from any outside IP address to the IP address of your web server at
any time of day, as shown here and described following the figure:
Figure 7. Allow inbound web requests
Service
. From this list, select the application or service you want to allow or block. The list
already displays many common services, but you are not limited to these choices. Use the
Services screen to add any additional services or applications that do not already appear.
See
Configure Services
on page
38.
Action
. Choose how you want to handle this type of traffic. You can block or allow always, or
you can block or allow according to the schedule you have defined in the Schedule screen,
described in
Schedule Firewall Services
on page
40.
Send to LAN Server
. Enter the IP address of the computer or server on your LAN that
receives the inbound traffic covered by this rule.
WAN Users
. These settings determine which packets are covered by the rule, based on their
source (WAN) IP address:
Any
. All IP addresses are covered by this rule.
Address range
. When this option is selected, the Start and Finish fields are required.
Single address
. Enter the required address in the Start field.
Log
. You can select whether to log the traffic:
Never
. No log entries are made for this service.
Always
. Any traffic for this service type is logged.
Match
. Traffic of this type that matches the settings and action is logged.
Not match
. Traffic of this type that does not match the settings and action is logged.