Netgear FVS318N 사용자 설명서
Network and System Management
326
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
rules, see
When you define inbound firewall rules, you can further refine their application according to
the following criteria:
the following criteria:
•
Services. You can specify the services or applications to be covered by an inbound rule.
If the desired service or application does not display in the list, you need to define it using
the Services screen (see
If the desired service or application does not display in the list, you need to define it using
the Services screen (see
on page 133 and
•
WAN destination IP address. You can specify the destination IP address for incoming
traffic. Traffic is directed to the specified address only when the destination IP address of
the incoming packet matches the IP address of the selected WAN interface.
traffic. Traffic is directed to the specified address only when the destination IP address of
the incoming packet matches the IP address of the selected WAN interface.
•
LAN users (or DMZ users). Only when the IPv4 routing mode is Classical Routing, you
can specify which computers on your network are affected by an inbound rule. When
Classical Routing is enabled, there are several options:
can specify which computers on your network are affected by an inbound rule. When
Classical Routing is enabled, there are several options:
-
Any. The rule applies to all computers and devices on your LAN.
-
Single address. The rule applies to the address of a particular computer.
-
Address range. The rule applies to a range of addresses.
-
Groups. The rule is applied to a group of computers. (You can configure groups for
LAN WAN outbound rules but not for DMZ WAN outbound rules.) The Known PCs
and Devices table is an automatically maintained list of all known computers and
network devices and is generally referred to as the network database, which is
described in
LAN WAN outbound rules but not for DMZ WAN outbound rules.) The Known PCs
and Devices table is an automatically maintained list of all known computers and
network devices and is generally referred to as the network database, which is
described in
on page 68. Computers and network
devices are entered into the network database by various methods, which are
described in
described in
•
WAN users. You can specify which Internet locations are covered by an inbound rule,
based on their IP address:
based on their IP address:
-
Any. The rule applies to all Internet IP address.
-
Single address. The rule applies to a single Internet IP address.
-
Address range. The rule applies to a range of Internet IP addresses.
•
Schedule. You can configure three different schedules to specify when a rule is applied.
Once a schedule is configured, it affects all rules that use this schedule. You specify the
days of the week and time of day for each schedule. For more information, see
Once a schedule is configured, it affects all rules that use this schedule. You specify the
days of the week and time of day for each schedule. For more information, see
•
Bandwidth profile. You can define bandwidth profiles and then apply them to inbound
LAN WAN rules to limit traffic. (You cannot apply bandwidth profiles to DMZ WAN rules.)
For information about how to define bandwidth profiles, see
LAN WAN rules to limit traffic. (You cannot apply bandwidth profiles to DMZ WAN rules.)
For information about how to define bandwidth profiles, see