Kerio Tech Firewall6 manual Firewall Traffic

Models: Firewall6

1 398
Download 398 pages 11.9 Kb
Page 95
Image 95

6.1 Network Rules Wizard

This implies that, by default, the rule allows traffic between the local network (fire- wall), remote networks connected via VPN tunnels and VPN clients connecting to the WinRoute’s VPN server.

Note: Access to the WinRoute host is not limited as the Wizard supposes that this host belongs to the local network. Limitations can be done by modification of an appropriate rule or by creating a new one. An inconvenient rule limiting access to the WinRoute host might block remote administration or it might cause some Internet services to be unavailable (all traffic directed to the Internet passes through this host).

Firewall Traffic

This rule enables access to certain services from the WinRoute host. It is similar to the NAT rule except from the fact that this rule does not perform IP translation (this host connects to the Internet directly).

FTP Service and HTTP Service

These rules map all HTTP and HTTPS services running at the host with the 192.168.1.10 IP address (step 6). These services will be available on IP addresses of the external interface (step 3).

Kerio VPN Service and HTTPS Service

The Kerio VPN service rule enables connection to the WinRoute’s VPN server from the Internet (establishment of control connection between a VPN client and the server or creation of a VPN tunnel — for details, see chapter 21).

The HTTPS Service rule allows connection from the Internet via the Clientless SSL- VPN interface (access to shared network items via a web browser — for details, see chapter 22).

These rules are not created unless the option allowing access to a particular service is enabled in step 5.

Default rule

This rule denies all communication that is not allowed by other rules. The default rule is always listed at the end of the rule list and it cannot be removed.

The default rule allows the administrator to select what action will be taken with undesirable traffic attempts (Deny or Drop) and to decide whether packets or/and connections will be logged.

Note: To see detailed descriptions of traffic rules refer to chapter 6.3..

95

Page 95
Image 95
Kerio Tech Firewall6 manual Firewall Traffic