Netgear SRXN3205 SRXN3205 Reference Manual - Page 85
Inbound Rules Examples, LAN WAN Inbound Rule: Hosting A Local Public Web Server
UPC - 606449057461
View all Netgear SRXN3205 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 85 highlights
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual For example, if a VPN Client or Gateway on the LAN side of this firewall wants to connect to another VPN endpoint on the WAN (placing this firewall between two VPN end points), encrypted packets are sent to this firewall. Since this firewall filters the encrypted packets through NAT, the packets become invalid unless VPN pass through is enabled. When VPN pass through is enabled, the VPN tunnel will pass the VPN traffic without any filtering. Tunnels can be: IPsec; PPTP; or L2TP To enable the appropriate Attack Checks for your environment: 1. Select Security > Firewall from the main/submenu. 2. Click the Attack Checks tab and the Attack Checks screen displays.. Figure 5-4 3. Select the Attack Checks you wish to initiate, and click Apply to save your settings Inbound Rules Examples LAN WAN Inbound Rule: Hosting A Local Public Web Server If you host a public Web server on your local network, you can define a rule to allow inbound Web (HTTP) requests from any outside IP address to the IP address of your Web server at any time of day. In the example shown in Figure 5-5, unrestricted access is provided from the Internet to the local Web server at LAN IP address 192.168.0.99. Firewall Security and Content Filtering v1.0, October 2008 5-11