ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual

LAN WAN Inbound Rule: Allowing Videoconference from Restricted Addresses

If you want to allow incoming videoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch office, you can create an inbound rule.

Figure 4-9

In the example, CU-SeeMe connections are allowed only from a specified range of external IP addresses.

LAN WAN or DMZ WAN Inbound Rule: Setting Up One-to-One NAT Mapping

If you arrange with your ISP to have more than one public IP address for your use, you can use the additional public IP addresses to map to servers on your LAN or DMZ. One of these public IP addresses will be used as the primary IP address of the VPN firewall. This address will be used to provide Internet access to your LAN PCs through NAT. The other addresses are available to map to your servers.

In the example shown in Figure 4-10 on page 4-17, we have configured multi-NAT to support multiple public IP addresses on one WAN interface. The inbound rule instructs the VPN firewall to host an additional public IP address (10.1.0.5) and to associate this address with the Web server on the LAN (at 192.168.1.1). We also instruct the VPN firewall to translate the incoming HTTP port number (port 80) to a different port number (port 8080).

4-16

Firewall Protection and Content Filtering

v1.1, August 2010

Page 72
Image 72
NETGEAR manual ProSafe Gigabit 8 Port VPN Firewall FVS318G Reference Manual