Netgear FVS336G-300NAS Specifications Page 536

  • Download
  • Add to my manuals
  • Print
  • Page
    / 693
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 535
Optimize Performance and Manage Your System
536
ProSAFE Dual WAN Gigabit WAN SSL VPN Firewall FVS336Gv3
Port Triggering
Port triggering allows some applications running on a LAN network to be available to external
applications that would otherwise be partially blocked by the firewall. Using the port triggering
feature requires that you know the port numbers used by the application. Without port
triggering, the response from the external application would be treated as a new connection
request rather than a response to a request from the LAN network. As such, it would be
handled in accordance with the inbound port forwarding rules and most likely would be
blocked.
For information about how to configure port triggering, see Manage Port Triggering on
page 327.
DMZ Port
The demilitarized zone (DMZ) is a network that, by default, has fewer firewall restrictions
when compared to the LAN. The DMZ can be used to host servers (such as a web server,
FTP server, or email server) and provide public access to them. The fourth LAN port on the
VPN firewall (the rightmost LAN port) can be dedicated as a hardware DMZ port to safely
provide services to the Internet without compromising security on your LAN. By default, the
DMZ port and both inbound and outbound DMZ traffic are disabled. Enabling the DMZ port
and allowing traffic to and from the DMZ increases the traffic through the WAN ports.
For information about how to enable the DMZ port, see Manage the DMZ Port for IPv4 Traffic
on page 141. For information about how to configure DMZ traffic rules, see Add DMZ WAN
Rules on page 235.
Exposed Hosts
Specifying an exposed host allows you to set up a computer or server that is available to
anyone on the Internet for services that you have not yet defined.
WARNING:
For security, NETGEAR strongly recommends that you do not set
up an exposed host. When a computer is designated as the
exposed host, it loses much of the protection of the firewall and is
exposed to many exploits from the Internet. If compromised, the
computer can be used to attack your network.
VPN, L2TP, and PPTP Tunnels
The VPN firewall supports site-to-site IPSec VPN tunnels, dedicated SSL VPN tunnels, L2TP
tunnels, and PPTP tunnels. Each tunnel requires extensive processing for encryption and
authentication, thereby increasing traffic through the WAN ports.
For information about IPSec VPN, L2TP, and PPTP tunnels, see Chapter 8, Set Up Virtual
Private Networking With IPSec Connections. For information about SSL VPN tunnels, see
Chapter 9, Set Up Virtual Private Networking with SSL Connections.
Page view 535
1 2 ... 531 532 533 534 535 536 537 538 539 540 541 ... 692 693

Comments to this Manuals

No comments