ProSecure Unified Threat Management (UTM) Appliance

Local computers need to access the local server using the computers’ local LAN address. Attempts by local computers to access the server using the external WAN IP address will fail.

Note: See Configure Port Triggering on page 183 for yet another way to allow certain types of inbound traffic that would otherwise be blocked by the firewall.

Note: The UTM always blocks denial of service (DoS) attacks. A DoS attack does not attempt to steal data or damage your computers, but overloads your Internet connection so you cannot use it (that is, the service becomes unavailable).

Note: When the Block TCP Flood and Block UDP Flood check boxes are selected on the Attack Checks screen (see Attack Checks, VPN

Pass-through, and Multicast Pass-throughon page 157), multiple

concurrent connections of the same application from one host or IP address (such as multiple DNS queries from one computer) trigger the UTM’s DoS protection.

Note: For more information about protecting the UTM from incoming

threats, see Enable and Configure the Intrusion Prevention System

on page 187.

The following table describes the fields that define the rules for inbound traffic and that are common to most Inbound Service screens (see Figure 69 on page 142, Figure 72 on page 145, and Figure 75 on page 148).

The steps to configure inbound rules are described in the following sections:

Configure LAN WAN Rules

Configure DMZ WAN Rules

Configure LAN DMZ Rules

Firewall Protection

134

Page 134
Image 134
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual ProSecure Unified Threat Management UTM Appliance, 134