Netgear FVS338 참조 매뉴얼
Reference Manual for the ProSafe VPN Firewall 50 FVS338
Router and Network Management
9-7
January 2005
–
After a PC has finished using a Port Triggering application, there is a time-out period
before the application can be used by another PC. This is required because the firewall
cannot be sure when the application has terminated.
before the application can be used by another PC. This is required because the firewall
cannot be sure when the application has terminated.
for the procedure on how to use this feature.
Exposed Hosts
The exposed host feature can only be used if your ISP has allocated you multiple fixed Internet IP
addresses.
addresses.
In this situation, you can define a separate DMZ server for each internet IP address.
•
All incoming traffic to that IP address will be sent to the selected PC.
•
Out-going traffic from the selected PC will use the IP address you entered, not the default
WAN IP address.
WAN IP address.
for the conditions when you can use exposed
hosts in dual WAN port networks.
for the procedure on how to use this feature.
VPN Tunnels
The VPN firewall permits up to 200 VPN tunnels at a time. Each tunnel requires extensive
processing for encryption and authentication.
processing for encryption and authentication.
” for the procedure on how to use this feature.
Using QoS to Shift the Traffic Mix
The QoS priority settings determine the priority and, in turn, the quality of service for the traffic
passing through the firewall. The QoS is set individually for each service.
passing through the firewall. The QoS is set individually for each service.
•
You can accept the default priority defined by the service itself by not changing its QoS
setting.
setting.
Note: Exposed hosts are sometimes referred to as DMZ hosts. Unlike hardware-based
DMZ ports, however, exposed hosts are implemented in software and do not enjoy the
same level of firewall protection that hardware-based DMZ ports do. Use the exposed
host feature at your own risk.
DMZ ports, however, exposed hosts are implemented in software and do not enjoy the
same level of firewall protection that hardware-based DMZ ports do. Use the exposed
host feature at your own risk.