Firewall Protection
131
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
LAN Groups screen to keep the computer’s IP address constant (see
Set Up DHCP
Address Reservation
on page 69).
•
Local computers need to access the local server using the computers’ local LAN address.
Attempts by local computers to access the server using the external WAN IP address will
fail.
Note:
See
Configure Port Triggering
on page 185 for yet another way to
allow certain types of inbound traffic that would otherwise be
blocked by the firewall.
Note:
The wireless VPN firewall always blocks denial of service (DoS)
attacks. A DoS attack does not attempt to steal data or damage your
computers, but overloads your Internet connection so you cannot
use it (that is, the service becomes unavailable).
Note:
When the Block TCP Flood and Block UDP Flood check boxes are
selected on the Attack Checks screen (which they are by default;
see
Attack Checks
on page 162), multiple concurrent connections of
the same application from one host or IP address (such as multiple
DNS queries from one computer) trigger the wireless VPN firewall’s
DoS protection.
The following table describes the fields that define the rules for inbound traffic and that are
common to most Inbound Service screens (see
Figure 65
on page 140,
Figure 71
on
page 148, and
Figure 77
on page 154).
The steps to configure inbound rules are described in the following sections:
•
Configure LAN WAN Rules
•
Configure DMZ WAN Rules
•
Configure LAN DMZ Rules