Netgear SRX5308 SRX5308 Reference Manual - Page 97

Setting LAN WAN Rules - set inbound rule dns

Page 97 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual • If your external IP address is assigned dynamically by your ISP (DHCP enabled), the IP address might change periodically as the DHCP lease expires. Consider using Dyamic DNS so that external users can always find your network (see "Configuring Dynamic DNS" on page 2-27). • If the IP address of the local server PC is assigned by DHCP, it might change when the PC is rebooted. To avoid this, use the Reserved (DHCP Client) feature in the LAN Groups screen to keep the PC's IP address constant (see "Setting Up Address Reservation" on page 3-19). • Local PCs must access the local server using the PCs' local LAN address. Attempts by local PCs to access the server using the external WAN IP address will fail. Note: See "Configuring Port Triggering" on page 4-48 for yet another way to allow certain types of inbound traffic that would otherwise be blocked by the firewall. Note: The VPN firewall always blocks denial of service (DoS) attacks. A DoS attack does not attempt to steal data or damage your PCs, but overloads your Internet connection so you cannot use it (that is, the service becomes unavailable). Note: When the Block TCP Flood and Block UDP Flood check boxes are selected on the Attack Checks screen (see "Attack Checks" on page 4-26), multiple concurrent connections of the same application from one host or IP address (such as multiple DNS queries from one PC) trigger the VPN firewall's DoS protection. Table 4-3 on page 4-8 describes the fields that define the rules for inbound traffic and that are common to most Inbound Service screens (see Figure 4-4 on page 4-14, Figure 4-7 on page 4-17, and Figure 4-10 on page 4-20). The steps to configure inbound rules are described in the following sections: • "Setting LAN WAN Rules" on page 4-11 • "Setting DMZ WAN Rules" on page 4-14 Firewall Protection 4-7 v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
Firewall Protection
4-7
v1.0, April 2010
If your external IP address is assigned dynamically by your ISP (DHCP enabled), the IP
address might change periodically as the DHCP lease expires. Consider using Dyamic DNS so
that external users can always find your network (see
“Configuring Dynamic DNS” on
page 2-27
).
If the IP address of the local server PC is assigned by DHCP, it might change when the PC is
rebooted. To avoid this, use the Reserved (DHCP Client) feature in the LAN Groups screen to
keep the PC’s IP address constant (see
“Setting Up Address Reservation” on page 3-19
).
Local PCs must access the local server using the PCs’ local LAN address. Attempts by local
PCs to access the server using the external WAN IP address will fail.
Table 4-3 on page 4-8
describes the fields that define the rules for inbound traffic and that are
common to most Inbound Service screens (see
Figure 4-4 on page 4-14
,
Figure 4-7 on page 4-17
,
and
Figure 4-10 on page 4-20
).
The steps to configure inbound rules are described in the following sections:
“Setting LAN WAN Rules” on page 4-11
“Setting DMZ WAN Rules” on page 4-14
Note:
See
“Configuring Port Triggering” on page 4-48
for yet another way to allow
certain types of inbound traffic that would otherwise be blocked by the firewall.
Note:
The VPN firewall always blocks denial of service (DoS) attacks. A DoS attack
does not attempt to steal data or damage your PCs, but overloads your Internet
connection so you cannot use it (that is, the service becomes unavailable).
Note:
When the Block TCP Flood and Block UDP Flood check boxes are selected on the
Attack Checks screen (see
“Attack Checks” on page 4-26
), multiple concurrent
connections of the same application from one host or IP address (such as multiple
DNS queries from one PC) trigger the VPN firewall’s DoS protection.