Specifications
Firewall Protection
87
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308
screen to keep the PC’s IP address constant (see Set Up Address Reservation on
page 72).
• Local PCs need to access the local server using the PCs’ local LAN address. Attempts by
local PCs to access the server using the external WAN IP address will fail.
Note: See Configure Port Triggering on page 130 for yet another way to
allow certain types of inbound traffic that would otherwise be
blocked by the firewall.
Note: The VPN firewall always blocks denial of service (DoS) attacks. A
DoS attack does not attempt to steal data or damage your PCs, but
overloads your Internet connection so you cannot use it (that is, the
service becomes unavailable).
Note: When the Block TCP Flood and Block UDP Flood check boxes are
selected on the Attack Checks screen (see Attack Checks on
page 106), multiple concurrent connections of the same application
from one host or IP address (such as multiple DNS queries from one
PC) trigger the VPN firewall’s DoS protection.
The following table describes the fields that define the rules for inbound traffic and that are
common to most Inbound Service screens (see Figure 44 on page 94, Figure 47 on page 97,
and Figure 50 on page 100).
The steps to configure inbound rules are described in the following sections:
• Set LAN WAN Rules
• Set DMZ WAN Rules
• Set LAN DMZ Rules