FVS124G ProSafe VPN Firewall 25 Reference Manual
1-2
v1.0, January 2007
• Flash memory for firmware upgrade.
Dual WAN Ports for Increased Reliability or Outbound Load
Balancing
The VPN Firewall has two broadband WAN ports, WAN1 and WAN2, each capable of operating
independently at speeds of either 10 Mbps or 100 Mbps. The two WAN ports let you connect a
second broadband Internet line that can be configured on a mutually-exclusive basis to:
• Provide backup and rollover if one line is inoperable, ensuring you are never disconnected.
• Load balance, or use both Internet lines simultaneously for the outgoing traffic. The firewall
balances users between the two lines for maximum bandwidth efficiency.
See “Dual WAN Port Network Planning” on page B-1 for the planning factors to consider when
implementing the following capabilities with dual WAN port gateways:
• Inbound traffic (e.g., port forwarding, port triggering).
• Virtual Private Networks (VPNs).
A Powerful, True Firewall with Content Filtering
Unlike simple Internet sharing NAT routers, the FVS124G is a true firewall, using stateful packet
inspection to defend against hacker attacks. Its firewall features include:
• DoS protection. Automatically detects and thwarts DoS attacks such as Ping of Death, SYN
Flood, LAND Attack, and IP Spoofing.
• Blocks unwanted traffic from the Internet to your LAN.
• Blocks access from your LAN to Internet locations or services that you specify as off-limits.
• Logs security incidents.
• The FVS124G will log security events such as blocked incoming traffic, port scans, attacks,
and administrator logins. You can configure the firewall to email the log to you at specified
intervals. You can also configure the firewall to send immediate alert messages to your email
address or email pager whenever a significant event occurs.
• With its URL keyword filtering feature, the FVS124G prevents objectionable content from
reaching your PCs. The firewall allows you to control access to Internet content by screening
for keywords within Web addresses. You can configure the firewall to log and report attempts
to access objectionable Internet sites.