Firewall Protection
126
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
the incoming packet is in response to an outgoing request, but true stateful packet inspection
goes far beyond NAT.
For IPv6, which in itself provides stronger security than IPv4, a firewall in particular controls
the exchange of traffic between the Internet, DMZ, and LAN.

Administrator Tips

Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites
from a central location (see Configure Authentication Domains, Groups, and Users on
page 289 and Configure Remote Management Access on page 322).
2. Although rules are the basic way of managing the traffic through your system (see Overview
of Rules to Block or Allow Specific Kinds of Traffic on page 126), you can further refine your
control using the following features and capabilities of the wireless VPN firewall:
-Groups and hosts (see Manage IPv4 Groups and Hosts (IPv4 LAN Groups) on
page 64)
-Services (see Outbound Rules (Service Blocking) on page 127 and Inbound Rules
(Port Forwarding) on page 130)
-Schedules (see Set a Schedule to Block or Allow Specific Traffic on page 178)
-Allowing or blocking sites (see Configure Content Filtering on page 174)
-Source MAC filtering (see Enable Source MAC Filtering on page 179)
-Port triggering (see Configure Port Triggering on page 185)
3. Some firewall settings might affect the performance of the wireless VPN firewall. For more
information, see Performance Management on page 314.
4. The firewall logs can be configured to log and then email denial of access, general attack,
and other information to a specified email address. For information about how to configure
logging and notifications, see Configure Logging, Alerts, and Event Notifications on
page 338.
Overview of Rules to Block or Allow Specific Kinds of Traffic
Firewall rules are used to block or allow specific traffic passing through from one side to the
other. You can configure up to 800 firewall rules on the wireless VPN firewall (see the
following table). Inbound rules (WAN to LAN) restrict access by outsiders to private
resources, selectively allowing only specific outside users to access specific resources.
Outbound rules (LAN to WAN) determine what outside resources local users can have
access to.