Netgear SRX5308 SRX5308 Reference Manual - Page 98

Setting LAN DMZ Rules on Table 4-3., Inbound Rules Overview

Page 98 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual • "Setting LAN DMZ Rules" on page 4-18. Table 4-3. Inbound Rules Overview Setting Description (or Subfield and Description) Service The service or application to be covered by this rule. If the service or application does not appear in the list, you must define it using the Services screen (see "Adding Customized Services" on page 4-31). Action The action for outgoing connections covered by this rule: • BLOCK always. • BLOCK by schedule, otherwise allow. • ALLOW always. • ALLOW by schedule, otherwise block. Note: Any inbound traffic that is not blocked by rules you create is allowed by the default rule. Select Schedule The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this rule. • This drop-down list is activated only when "BLOCK by schedule, otherwise allow" or "ALLOW by schedule, otherwise block" is selected as the Action. • Use the schedule screen to configure the time schedules (see "Setting a Schedule to Block or Allow Specific Traffic" on page 4-40). Send to LAN Server The LAN server address determines which computer on your network is hosting this service rule. (You can also translate this address to a port number.) Send to DMZ Server The DMZ server address determines which computer on your network is hosting this service rule. (You can also translate this address to a port number.) Translate to Port Number You can enable this setting and specify a port number if you want to assign the LAN server or DMZ server to a specific port. WAN Destination IP Address The setting that determines the destination IP address applicable to incoming traffic. This is the public IP address that maps to the internal LAN server. This address can be either the address of one of the WAN interfaces or another public IP address (when you have a secondary WAN address configured). LAN Users The settings that determine which computers on your network are affected by this rule. The options are: • Any. All PCs and devices on your LAN. • Single address. Enter the required address to apply the rule to a single device on your LAN. • Address range. Enter the required addresses in the Start and End fields to apply the rule to a range of devices. • Groups. Select the group to which the rule applies. Use the LAN Groups screen (under Network Configuration) to assign PCs to groups. See "Managing Groups and Hosts (LAN Groups)" on page 3-14. Note: This field is not applicable to inbound LAN WAN rules. 4-8 Firewall Protection v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
4-8
Firewall Protection
v1.0, April 2010
“Setting LAN DMZ Rules” on page 4-18
.
Table 4-3.
Inbound Rules Overview
Setting
Description (or Subfield and Description)
Service
The service or application to be covered by this rule. If the service or application does
not appear in the list, you must define it using the Services screen (see
“Adding
Customized Services” on page 4-31
).
Action
The action for outgoing connections covered by this rule:
BLOCK always
.
BLOCK by schedule, otherwise allow
.
ALLOW always
.
ALLOW by schedule, otherwise block
.
Note
: Any inbound traffic that is not blocked by rules you create is allowed by the
default rule.
Select Schedule
The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this
rule.
This drop-down list is activated only when “BLOCK by schedule, otherwise allow”
or “ALLOW by schedule, otherwise block” is selected as the Action.
Use the schedule screen to configure the time schedules (see
“Setting a Schedule
to Block or Allow Specific Traffic” on page 4-40
).
Send to LAN Server
The LAN server address determines which computer on your network is hosting this
service rule. (You can also translate this address to a port number.)
Send to DMZ Server
The DMZ server address determines which computer on your network is hosting this
service rule. (You can also translate this address to a port number.)
Translate to Port
Number
You can enable this setting and specify a port number if you want to assign the LAN
server or DMZ server to a specific port.
WAN Destination IP
Address
The setting that determines the destination IP address applicable to incoming traffic.
This is the public IP address that maps to the internal LAN server. This address can
be either the address of one of the WAN interfaces or another public IP address
(when you have a secondary WAN address configured)
.
LAN Users
The settings that determine which computers on your network are affected by this
rule. The options are:
Any
. All PCs and devices on your LAN.
Single address
. Enter the required address to apply the rule to a single device on
your LAN.
Address range
. Enter the required addresses in the
Start
and
End
fields to apply
the rule to a range of devices.
Groups
. Select the group to which the rule applies. Use the LAN Groups screen
(under Network Configuration) to assign PCs to groups. See
“Managing Groups
and Hosts (LAN Groups)” on page 3-14
.
Note
: This field is not applicable to inbound LAN WAN rules.