Firewall Protection
129
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
incoming packet is in response to an outgoing request, but true stateful packet inspection
goes far beyond NAT.
For IPv6, which in itself provides stronger security than IPv4, a firewall in particular controls
the exchange of traffic between the Internet, DMZ, and LAN.

Administrator Tips

Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites
from a central location (see Configure Authentication Domains, Groups, and Users on
page 296 and Configure Remote Management Access on page 331).
2. Although rules are the basic way of managing the traffic through your system (see Overview
of Rules to Block or Allow Specific Kinds of Traffic on page 129), you can further refine your
control using the following features and capabilities of the wireless VPN firewall:
-Groups and hosts (see Manage IPv4 Groups and Hosts (IPv4 LAN Groups) on
page 67)
-Services (see Outbound Rules (Service Blocking) on page 130 and Inbound Rules
(Port Forwarding) on page 133)
-Schedules (see Set a Schedule to Block or Allow Specific Traffic on page 182)
-Allowing or blocking sites (see Configure Content Filtering on page 178)
-Source MAC filtering (see Enable Source MAC Filtering on page 183)
-Port triggering (see Configure Port Triggering on page 190)
3. Some firewall settings might affect the performance of the wireless VPN firewall. For more
information, see Performance Management on page 322.
4. The firewall logs can be configured to log and then email denial of access, general attack,
and other information to a specified email address. For information about how to configure
logging and notifications, see Configure Logging, Alerts, and Event Notifications on
page 349.
Overview of Rules to Block or Allow Specific Kinds of Traffic
Outbound Rules (Service Blocking)
Inbound Rules (Port Forwarding)
Order of Precedence for Rules
Firewall rules are used to block or allow specific traffic passing through from one side to the
other. You can configure up to 800 firewall rules on the wireless VPN firewall (see the
following table). Inbound rules (WAN to LAN) restrict access by outsiders to private
resources, selectively allowing only specific outside users to access specific resources.
Outbound rules (LAN to WAN) determine what outside resources local users can have
access to.