136
|
Chapter 8:
VPN Firewall and Network Management
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
•
Destination Address
. These settings determine the destination IP address for this rule
which will be applicable to incoming traffic This rule will be applied only when the
destination IP address of the incoming packet matches the IP address of the selected
WAN interface Selecting ANY enables the rule for any LAN IP destination. WAN1 and
WAN2 corresponds to the respective WAN interface governed by this rule.
•
Services
. You can specify the desired services or applications to be covered a rule. If the
desired service or application does not appear in the
Custom Services Table
, you must
define it using the Services screen (see
“Adding Customized Services”
on page 57).
•
Schedule
. If you have set firewall rules on the LAN WAN Rules screen, you can configure
three different schedules (for example, schedule 1, schedule 2, and schedule 3) for when
a rule is to be applied. Once a schedule is configured, it affects all rules that use this
schedule. You specify the days of the week and time of day for each schedule. (See
“Using Rules to Block or Allow Specific Kinds of Traffic”
on page 43 for the procedure on
how to use this feature.)
Port Triggering
Port triggering allows some applications to function correctly that would otherwise be partially
blocked by the VPN firewall. Using this feature requires that you know the port numbers used
by the application.
Once configured, port triggering operates as follows:
•
A PC makes an outgoing connection using a port number defined in the
Port Triggering
table.
•
The VPN firewall records this connection, opens the additional incoming port or ports
associated with this entry in the
Port Triggering
table, and associates them with the PC.
•
The remote system receives the PCs request and responds using the different port
numbers that you have now opened.
•
The VPN firewall matches the response to the previous request and forwards the
response to the PC. Without port triggering, this response would be treated as a new
connection request rather than a response. As such, it would be handled in accordance
with the Port Forwarding rules.
-
Only one PC can use a port triggering application at any time.
-
After a PC has finished using a port triggering application, there is a time-out period
before the application can be used by another PC. This is required because the VPN
firewall cannot be sure when the application has terminated.
See
“Configuring Port Triggering”
on page 66 for the procedure on how to use this feature.
VPN Tunnels
The VPN firewall permits up to 25 IPsec VPN tunnels and 10 SSL VPN tunnels at a time.
Each tunnel requires extensive processing for encryption and authentication.
See Chapter 5,
“Virtual Private Networking Using IPsec"
for the procedure on how to use
IPsec VPN, and Chapter 6,
“Virtual Private Networking Using SSL"
for the procedure on how
to use SSL VPN.