5. Firewall Protection

5

 

 

 

 

This chapter describes how to use the firewall features of the UTM to protect your network. This chapter contains the following sections:

About Firewall Protection

Overview of Rules to Block or Allow Specific Kinds of Traffic

Configure LAN WAN Rules

Configure DMZ WAN Rules

Configure LAN DMZ Rules

Examples of Firewall Rules

Configure Other Firewall Features

Create Services, QoS Profiles, Bandwidth Profiles, and Traffic Meter Profiles

Set a Schedule to Block or Allow Specific Traffic

Enable Source MAC Filtering

Set Up IP/MAC Bindings

Configure Port Triggering

Configure Universal Plug and Play

Enable and Configure the Intrusion Prevention System

About Firewall Protection

A firewall protects one network (the trusted network, such as your LAN) from another (the untrusted network, such as the Internet), while allowing communication between the two. You can further segment keyword blocking to certain known groups. For information about how to set up LAN groups, see Manage Groups and Hosts (LAN Groups) on page 111.

A firewall incorporates the functions of a Network Address Translation (NAT) router, protects the trusted network from hacker intrusions or attacks, and controls the types of traffic that can flow between the two networks. Unlike simple NAT routers, a firewall uses a process called stateful packet inspection to protect your network from attacks and intrusions. NAT performs a very limited stateful inspection in that it considers whether the incoming packet is in response to an outgoing request, but true stateful packet inspection goes far beyond NAT.

127

Page 127
Image 127
NETGEAR STM150EW-100NAS, UTM5EW-100NAS manual About Firewall Protection, 127