Netgear SRX5308 SRX5308 Reference Manual - Page 261

For information about how to enable the DMZ port

Page 261 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual For information about how to enable the DMZ port, see "Configuring and Enabling the DMZ Port" on page 3-20. For the procedures on how to configure DMZ traffic rules, see "Setting DMZ WAN Rules" on page 4-14. Configuring Exposed Hosts Specifying an exposed host allows you to set up a computer or server that is available to anyone on the Internet for services that you have not yet defined. For an example of how to set up an exposed host, see "LAN WAN or DMZ WAN Inbound Rule: Specifying an Exposed Host" on page 4-24. Configuring VPN Tunnels The VPN firewall supports up to 125 site-to-site IPsec VPN tunnels and up to 50 dedicated SSL VPN tunnels. Each tunnel requires extensive processing for encryption and authentication, thereby increasing traffic through the WAN ports. For information about IPsec VPN tunnels, see Chapter 5, "Virtual Private Networking Using IPsec Connections." For information about SSL VPN tunnels, see Chapter 6, "Virtual Private Networking Using SSL Connections." Using QoS and Bandwidth Assignment to Shift the Traffic Mix By specifying QoS and bandwidth profiles and assigning these profiles to outbound and inbound firewall rules, you can shift the traffic mix to aim for optimum performance of the VPN firewall. Assigning QoS Profiles The QoS profile settings determine the priority and, in turn, the quality of service for the traffic passing through the VPN firewall. After you have created a QoS profile, you can assign the QoS profile to firewall rules. The QoS is set individually for each service. You can change the mix of traffic through the WAN ports by granting some services a higher priority than others: • You can accept the default priority defined by the service itself by not changing its QoS setting. • You can change the priority to a higher or lower value than its default setting to give the service higher or lower priority than it otherwise would have. For more information about QoS profiles, see "Creating Quality of Service (QoS) Profiles" on page 4-34. Network and System Management 8-7 v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
Network and System Management
8-7
v1.0, April 2010
For information about how to enable the DMZ port, see
“Configuring and Enabling the DMZ
Port” on page 3-20
. For the procedures on how to configure DMZ traffic rules, see
“Setting DMZ
WAN Rules” on page 4-14
.
Configuring Exposed Hosts
Specifying an exposed host allows you to set up a computer or server that is available to anyone on
the Internet for services that you have not yet defined. For an example of how to set up an exposed
host, see
“LAN WAN or DMZ WAN Inbound Rule: Specifying an Exposed Host” on page 4-24
.
Configuring VPN Tunnels
The VPN firewall supports up to 125 site-to-site IPsec VPN tunnels and up to 50 dedicated SSL
VPN tunnels. Each tunnel requires extensive processing for encryption and authentication, thereby
increasing traffic through the WAN ports.
For information about IPsec VPN tunnels, see
Chapter 5, “Virtual Private Networking Using IPsec
Connections
.” For information about SSL VPN tunnels, see
Chapter 6, “Virtual Private
Networking Using SSL Connections
.”
Using QoS and Bandwidth Assignment to Shift the Traffic Mix
By specifying QoS and bandwidth profiles and assigning these profiles to outbound and inbound
firewall rules, you can shift the traffic mix to aim for optimum performance of the VPN firewall.
Assigning QoS Profiles
The QoS profile settings determine the priority and, in turn, the quality of service for the traffic
passing through the VPN firewall. After you have created a QoS profile, you can assign the QoS
profile to firewall rules. The QoS is set individually for each service. You can change the mix of
traffic through the WAN ports by granting some services a higher priority than others:
You can accept the default priority defined by the service itself by not changing its QoS
setting.
You can change the priority to a higher or lower value than its default setting to give the
service higher or lower priority than it otherwise would have.
For more information about QoS profiles, see
“Creating Quality of Service (QoS) Profiles” on
page 4-34
.