ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
4-2 Firewall Protection
v1.0, April 2010
Administrator Tips
Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites from a
central location (see “Configuring VPN Authentication Domains, Groups, and Users” on
page 7-1 and “Configuring Remote Management Access” on page 8-10).
2. Although using rules (see “Using Rules to Block or Allow Specific Kinds of Traffic” on
page 4-2) is the basic way of managing the traffic through your system, you can further refine
your control using the following features and capabilities of the VPN firewall:
– Groups and hosts (see “Managing Groups and Hosts (LAN Groups)” on page 3-14)
– Services (see “Services-Based Rules” on page 4-3)
– Schedules (see “Setting a Schedule to Block or Allow Specific Traffic” on page 4-40)
– Source MAC filtering (see “Enabling Source MAC Filtering” on page 4-44)
– Port triggering (see “Configuring Port Triggering” on page 4-48)
3. Some firewall settings might affect the performance of the VPN firewall. For more
information, see “Performance Management” on page 8-1.
4. The firewall logs can be configured to log and then email dropped packet information and
other information to a specified email address. For information about how to configure
logging and notifications, see “Activating Notification of Events, Alerts, and Syslogs” on
page 9-5.
Using Rules to Block or Allow Specific Kinds of Traffic
Firewall rules are used to block or allow specific traffic passing through from one side to the other.
You can configure up to 600 rules on the VPN firewall. Inbound rules (WAN to LAN) restrict
access by outsiders to private resources, selectively allowing only specific outside users to access
specific resources. Outbound rules (LAN to WAN) determine what outside resources local users
can have access to.
A firewall has two default rules, one for inbound traffic and one for outbound. The default rules of
the VPN firewall are:
• Inbound. Block all access from outside except responses to requests from the LAN side.
• Outbound. Allow all access from the LAN side to the outside.