Netgear SRX5308 User Manual Page 136

  • Download
  • Add to my manuals
  • Print
  • Page
    / 460
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 135
Firewall Protection
136
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
Whether or not DHCP is enabled, how the computer accesses the servers LAN address
impacts the inbound rules. For example:
If your external IP addre
ss is assigned dynamically by your ISP (DHCP enabled), the IP
address might change periodically as the DHCP lease expires. Consider using Dynamic
DNS so that external users can always find your network (see Configure Dynamic DNS
on page 48).
If the
IP address of the local server computer is assigned by DHCP, it might change when
the computer is rebooted. To avoid this, use the Reserved (DHCP Client) feature in the
LAN Groups screen to keep the computers IP address constant (see Set Up DHCP
Address Reservation o
n page 96).
Local comp
uters need to access the local server using the computers’ local LAN address.
Attempts by local computers to access the server using the external WAN IP address will
fail.
Note: See Configure Port Triggering on page 192 for yet another way to
allow certain types of inbound traffic that would otherwise be blocked
by the firewall.
Note: The VPN firewall always blocks denial of service (DoS) attacks. A
DoS attack does not attempt to steal data or damage your
computers, but overloads your Internet connection so you cannot
use it (that is, the service becomes unavailable).
Note: When the Block TCP Flood and Block UDP Flood check boxes are
selected on the Attack Checks screen (which they are by default;
see
Attack Checks on page 166), multiple concurrent connections of
the same application from one host or IP address (such as multiple
DNS q
ueries from one computer) trigger the VPN firewall’s DoS
protection.
The following table describes the fields that define the rules for inbound traffic and that are
common to most Inbound Service screens (see Figure 76 on
page 145, Figure 82 on
page 152, and Figure 88 on
page 158).
The steps to configure inbound rules are described in the following sections:
Config
ure LAN WAN Rules
Configure DMZ WAN Rules
Configure LAN DMZ Rules
Page view 135
1 2 ... 131 132 133 134 135 136 137 138 139 140 141 ... 459 460

Comments to this Manuals

No comments