Netgear SRX5308 SRX5308 Reference Manual - Page 95

Table 4-2., Outbound Rules Overview continued, Firewall Protection - qos settings

Page 95 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual Table 4-2. Outbound Rules Overview (continued) Setting Select Schedule LAN Users WAN Users DMZ Users QoS Profile Description (or Subfield and Description) The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this rule. • This drop-down list is activated only when "BLOCK by schedule, otherwise allow" or "ALLOW by schedule, otherwise block" is selected as the Action. • Use the schedule screen to configure the time schedules (see "Setting a Schedule to Block or Allow Specific Traffic" on page 4-40). The settings that determine which computers on your network are affected by this rule. The options are: • Any. All PCs and devices on your LAN. • Single address. Enter the required address to apply the rule to a single device on your LAN. • Address range. Enter the required addresses in the Start and End fields to apply the rule to a range of devices. • Groups. Select the group to which the rule applies. Use the LAN Groups screen (under Network Configuration) to assign PCs to groups. See "Managing Groups and Hosts (LAN Groups)" on page 3-14. The settings that determine which Internet locations are covered by the rule, based on their IP address. The options are: • Any. All Internet IP address are covered by this rule. • Single address. Enter the required address in the Start field. • Address range. Fill in the Start and End fields. The settings that determine which DMZ computers on the DMZ network are affected by this rule. The options are: • Any. All PCs and devices on your DMZ network. • Single address. Enter the required address to apply the rule to a single PC on the DMZ network. • Address range. Enter the required addresses in the Start and End fields to apply the rule to a range of DMZ computers. The priority assigned to IP packets of this service. The priorities are defined by "Type of Service (ToS) in the Internet Protocol Suite" standards, RFC 1349. The QoS profile determines the priority of a service, which, in turn, determines the quality of that service for the traffic passing through the firewall. The VPN firewall marks the Type of Service (ToS) field as defined in the QoS profiles that you create. For more information, see "Creating Quality of Service (QoS) Profiles" on page 4-34. Note: There is no default QoS profile on the VPN firewall. After you have created a QoS profile, it can become active only when you apply it to a non-blocking inbound or outbound firewall rule. Note: This field is not applicable to LAN DMZ rules. Firewall Protection 4-5 v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
Firewall Protection
4-5
v1.0, April 2010
Select Schedule
The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this
rule.
This drop-down list is activated only when “BLOCK by schedule, otherwise allow”
or “ALLOW by schedule, otherwise block” is selected as the Action.
Use the schedule screen to configure the time schedules (see
“Setting a Schedule
to Block or Allow Specific Traffic” on page 4-40
).
LAN Users
The settings that determine which computers on your network are affected by this
rule. The options are:
Any
. All PCs and devices on your LAN.
Single address
. Enter the required address to apply the rule to a single device on
your LAN.
Address range
. Enter the required addresses in the
Start
and
End
fields to apply
the rule to a range of devices.
Groups
. Select the group to which the rule applies. Use the LAN Groups screen
(under Network Configuration) to assign PCs to groups. See
“Managing Groups
and Hosts (LAN Groups)” on page 3-14
.
WAN Users
The settings that determine which Internet locations are covered by the rule, based
on their IP address. The options are:
Any
. All Internet IP address are covered by this rule.
Single address
. Enter the required address in the
Start
field.
Address range
. Fill in the
Start
and
End
fields.
DMZ Users
The settings that determine which DMZ computers on the DMZ network are affected
by this rule. The options are:
Any
. All PCs and devices on your DMZ network.
Single address
. Enter the required address to apply the rule to a single PC on the
DMZ network.
Address range
. Enter the required addresses in the
Start
and
End
fields to apply
the rule to a range of DMZ computers.
QoS Profile
The priority assigned to IP packets of this service. The priorities are defined by “Type
of Service (ToS) in the Internet Protocol Suite” standards, RFC 1349. The QoS
profile determines the priority of a service, which, in turn, determines the quality of
that service for the traffic passing through the firewall.
The VPN firewall marks the Type of Service (ToS) field as defined in the QoS profiles
that you create. For more information, see
“Creating Quality of Service (QoS)
Profiles” on page 4-34
.
Note
: There is no default QoS profile on the VPN firewall. After you have created a
QoS profile, it can become active only when you apply it to a non-blocking inbound or
outbound firewall rule.
Note
: This field is not applicable to LAN DMZ rules.
Table 4-2.
Outbound Rules Overview (continued)
Setting
Description (or Subfield and Description)