Netgear FVS338 참조 가이드

다운로드
페이지 178
FVS338 ProSafe VPN Firewall 50 Reference Manual 
1-2
Introduction
v1.0, September 2006
Full Routing on Both the Broadband and Serial WAN Ports
You can install, configure, and operate the FVS338 to take full advantage of a variety of routing 
options on both the serial and broadband WAN ports, including:
Internet access via either the serial or broadband port.
Auto rollover connectivity (fail-over) through an analog modem connected to the serial port
If the broadband Internet connection fails, after waiting for an pre-specified amount of time 
the FVS338 can automatically establish a backup dial-up Internet connection via the serial 
port on the firewall.
A Powerful, True Firewall with Content Filtering
Unlike simple Internet sharing NAT routers, the FVS338 is a true firewall, using stateful packet 
inspection to defend against hacker attacks. Its firewall features include:
DoS protection. Automatically detects and thwarts DoS attacks such as Ping of Death, SYN 
Flood, LAND Attack, and IP Spoofing.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Logs security incidents. The FVS338 will log security events such as blocked incoming traffic, 
port scans, attacks, and administrator logins. You can configure the firewall to email the log to 
you at specified intervals. You can also configure the firewall to send immediate alert 
messages to your email address or email pager whenever a significant event occurs.
With its URL keyword filtering feature, the FVS338 prevents objectionable content from 
reaching your PCs. The firewall allows you to control access to Internet content by screening 
for keywords within Web addresses. You can configure the firewall to log and report attempts 
to access objectionable Internet sites.
Security
The VPN firewall is equipped with several features designed to maintain security, as described in 
this section.
PCs Hidden by NAT. NAT opens a temporary path to the Internet for requests originating 
from the local network. Requests originating from outside the LAN are discarded, preventing 
users outside the LAN from finding and directly accessing the PCs on the LAN.