Netgear SRX5308 Specifications Page 86

  • Download
  • Add to my manuals
  • Print
  • Page
    / 357
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 85
Firewall Protection
86
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
Inbound Rules (Port Forwarding)
If you have enabled Network Address Translation (NAT), your network presents only one IP
address to the Internet, and outside users cannot directly access any of your local computers.
However, by defining an inbound rule you can make a local server (for example, a web server
or game server) visible and available to the Internet. The rule informs the firewall to direct
inbound traffic for a particular service to one local server based on the destination port
number. This process is also known as port forwarding.
Whether or not DHCP is enabled, how a PC accesses the server’s LAN address impacts the
inbound rules. For example:
If your external IP address is assigned dynamically by your ISP (DHCP enabled), the IP
address might change periodically as the DHCP lease expires. Consider using Dyamic
DNS so that external users can always find your network (see Configure Dynamic DNS
on page 42).
If the IP address of the local server PC is assigned by DHCP, it might change when the
PC is rebooted. To avoid this, use the Reserved (DHCP Client) feature in the LAN Groups
Bandwidth Profile Bandwidth limiting determines the way in which the data is sent to and from your host.
The purpose of bandwidth limiting is to provide a solution for limiting the outgoing and
incoming traffic, thus preventing the LAN users from consuming all the bandwidth of the
Internet link. For more information, see Create Bandwidth Profiles on page 118.
Bandwidth limiting occurs in the following ways:
• For outbound traffic. On the available WAN interface in the single WAN port mode and
auto-rollover mode, and on the selected interface in load balancing mode.
• For inbound traffic. On the LAN interface for all WAN modes.
Note: Bandwidth limiting does not apply to the DMZ interface.
Log The setting that determines whether packets covered by this rule are logged. The
options are:
Always. Always log traffic considered by this rule, whether it matches or not. This is
useful when you are debugging your rules.
Never. Never log traffic considered by this rule, whether it matches or not.
NAT IP The setting that specifies whether the source address of the outgoing packets on the
WAN should be auto-detected, should be assigned the address of a WAN interface, or
should be assigned the address of a different interface. The options are:
Auto. The source address of the outgoing packets is auto-detected via the configured
routing and load balancing rules.
WAN Interface Address. All the outgoing packets on the WAN are assigned to the
address of the specified WAN interface.
Single Address. All the outgoing packets on the WAN are assigned to the specified IP
address, for example, a secondary WAN address that you have configured.
Note: The NAT IP option is available only when the WAN mode is NAT. The IP address
specified should fall under the WAN subnet.
Table 18. Outbound rules overview (continued)
Setting Description
Page view 85
1 2 ... 81 82 83 84 85 86 87 88 89 90 91 ... 356 357

Comments to this Manuals

No comments