Products
SOFTWARE
Overview
Business Server
Security Gateway
Network Security
License Agreement
HARDWARE
System Requirements
REFERENCES
Customer Testimonials
Press Reviews
Download
Software
Pricelist
Support
Overview
Request Support
Documentation
System Requirements
Blacklist Monitor
Training
Remote Assistance
Partners
Partner Search
Become a Partner
Reseller Registration
Presentation
Partnerweb
Company
Overview
Press
Career
Contact
DE
/
EN
Part 5. Firewall
Prev
Next
Part 5. Firewall
Table of Contents
38. Selecting Firewall Rulesets
38.1. Rulesets on LAN
38.2. Rulesets for the Internet
38.3. Packet Routes Through the Firewall
38.3.1. Packet Routes on the LAN and Internet
38.3.2. Packet Routes for VPN Connections
39. Firewall Profile
39.1. General Basic LAN Rules
39.2. Client Profiles
39.3. Provider profile
40. Full Rulesets
40.1. Components
40.1.1. Services
40.1.2. Netgroups
40.1.3. Automatic Objects
40.2. Rulesets
40.2.1. Default Settings
40.2.2. Passing Through the Ruleset
40.2.3. Linking Rule Criteria
40.2.4. The Actions
40.2.5. Extra Options
40.2.6. Special Features of Provider Rulesets
41. Additional Functions
41.1. Checking MAC Addresses
41.2. Preventing LAN spoofing
41.3. Blocking IPs After Too Many Login Errors
41.4. Firewall Emergency Mode
42. Case Studies and Examples
42.1. Example 1: Extending a Simple Client Profile
42.1.1. Sample Solution
42.2. Example 2: Port Forwarding Only Accessible from an External IP
42.3. Example 3: Separate Guest Network
42.3.1. Sample Solution
42.4. Example 4: Restricted Access from the VPN
42.5. Example 5: Web Server in the DMZ
42.5.1. Sample Solution