Netgear FVX538v1 - ProSafe VPN Firewall Dual WAN Manual

Download Setup manual of NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Network Hardware, Network Router for Free or View it Online on All-Guides.com.

NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 1
1
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 2
2
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 3
3
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 4
4
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 5
5
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 6
6
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 7
7
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 8
8
NETGEAR FVX538v1 - ProSafe VPN Firewall Dual WAN Setup manual - Page 9
9
How to set up a DMZ LAN on FVX538?
This document describes how to set up a DMZ LAN on the FVX538 firmware version 3.0.3-17, and how
to use the Multi-NAT function on the DMZ. This article will cover the following features:
1. Enable & configure the FVX538 DMZ port
2. Inbound & Outbound rules for DMZ
Topology:
Internet
ProSafe VPN Firewall Router
MODE L
FVX538
Auto
Uplink
Fac tory
Defaults
CONS OLE
SpeedLink/Act
Gigabit
Acti ve
Link/Act 100
Acti ve
Link/Act 100
WAN1 WAN2
Power
T es t
Link/Act 100
LAN
8
4
5
1
FAST ETHERNET SWITCH FS116
100M 10M
1 2 3 4
Normal/ Uplink
Power
5 6 7 8 9 10 11 12 13 14 15 16
Blink=Act
Auto 10/100 Mbps
192.168.1.x
172.16.0.20
172.16.0.80
DMZ: 172.16.0.1
WAN: 10.180.38.80
LAN: 192.168.1.1
Multiple IPs from ISP: 10.180.38.80-10.180.38.85
FVX538
Firmware: 3.0.3-17
Note: There is a FS116 (16-port switch) connected to the FVX538 in this diagram so that multiple
servers can be a part of the DMZ
We have been given multiple static IP addresses from our ISP which range from 10.180.38.80-
10.180.38.85 (obviously imaginary). We would like our FTP server (local IP 172.16.0.20) to be accessed
from the public IP of 10.180.38.82, and our HTTP server (172.16.0.80) to be accessed from the public IP
of 10.180.38.80, which is also our router’s public address. We would like our local users (192.168.1.x) to
be able to access the FTP and HTTP service of those servers. LAN user-initiated access to the DMZ is
enabled by default (but DMZ-initiated access to the LAN is blocked by default), so we will not need to
add any LAN DMZ rules to allow Local User access. They can access the servers through their DMZ IPs of
172.16.0.x.