FVS338 ProSafe VPN Firewall 50 Re ference Manual
1-2 Introduction
v1.0, March 2008
Flash memory for firmware upgrade.

Full Routing on Both the Broadband and Serial WAN Ports

You can install, configure, and operate the FVS338 to take full advantage of a variety of routing
options on both the serial and broadband WAN ports, including:
Internet access via either the serial or broadband port.
Auto rollover connectivity (fail-over) through an analog modem connected to the serial port
If the broadband Internet connection fails, after waiting for an pre-specified amount of time
the FVS338 can automatically establish a backup dial-up Internet connection via the serial
port on the firewall.

A Powerful, True Firewall with Content Filtering

Unlike simple Internet sharing NAT routers, the FVS338 is a true firewall, using stateful packet
inspection to defend against hacker attacks. Its firewall features include:
DoS protection. Automatically detects and thwarts DoS attacks such as Ping of Death, SYN
Flood, LAND Attack, and IP Spoofing.
Blocks unwanted traffic from the Internet to your LAN.
Blocks access from your LAN to Internet locations or services that you specify as off-limits.
Logs security incidents. The FVS338 will log security events such as blocked incoming traffic,
port scans, attacks, and administrator logins. You can configure the firewall to email the log to
you at specified interva ls . You can also configure the firewall to send immediate alert
messages to your email address or email pager whenever a significant event occurs.
With its URL keyword filtering feature, the FVS338 prevents objectionable content from
reaching your PCs. The firewall allows you to control access to Internet content by screening
for keywords within Web addresses. You can configure the firewall to log and report attempts
to access objectionable Internet sites.

Security

The VPN firewall is equipped with several features designed to maintain security, as described in
this section.
PCs Hidden by NAT. NAT opens a temporary path to the Internet for requests originating
from the local network. Requests originating from outside the LAN are discarded, preventing
users outside the LAN from finding and directly accessing the PCs on the LA N.