Netgear VPN Firewall 200 FVX538 Manual Do Utilizador
ProSafe VPN Firewall 200 FVX538 Reference Manual
Router and Network Management
6-7
v1.0, August 2006
•
The remote system receives the PCs request and responds using the different port numbers that
you have now opened.
you have now opened.
•
This Router matches the response to the previous request and forwards the response to the PC.
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
Without Port Triggering, this response would be treated as a new connection request rather
than a response. As such, it would be handled in accordance with the Port Forwarding rules.
–
Only one PC can use a Port Triggering application at any time.
–
After a PC has finished using a Port Triggering application, there is a time-out period
before the application can be used by another PC. This is required because the firewall
cannot be sure when the application has terminated.
before the application can be used by another PC. This is required because the firewall
cannot be sure when the application has terminated.
See
for the procedure on how to use this feature.
DMZ Port
The DMZ Port allows you to set up the DMZ port. Specifying a Default DMZ Server allows you to
set up a computer or server that is available to anyone on the Internet for services that you haven't
defined.
set up a computer or server that is available to anyone on the Internet for services that you haven't
defined.
The default setting of the rules is that the DMZ port and both inbound and outbound traffic is
disabled. Enabling the DMZ port increases the traffic through the WAN ports.
disabled. Enabling the DMZ port increases the traffic through the WAN ports.
The VPN firewall makes LAN port 8 a dedicated hardware DMZ port when DMZ is enabled (see
See
for the procedure on how to use this feature.
VPN Tunnels
The VPN firewall permits up to 200 VPN tunnels at a time. Each tunnel requires extensive
processing for encryption and authentication.
processing for encryption and authentication.
See
” for the procedure on how to use this feature.
Using QoS to Shift the Traffic Mix
The QoS priority settings determine the priority and, in turn, the quality of service for the traffic
passing through the firewall. The QoS is set individually for each service.
passing through the firewall. The QoS is set individually for each service.
•
You can accept the default priority defined by the service itself by not changing its QoS
setting.
setting.
•
You can change the priority to a higher or lower value than its default setting to give the
service higher or lower priority than it otherwise would have.
service higher or lower priority than it otherwise would have.