User's Manual

Table Of Contents
Security Mode Configuration Commands
95
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
security firewall ipv4 edit_rule dmz_wan outbound <row id>
This command configures an existing IPv4 DMZ WAN outbound firewall rule. After you have
issued the security firewall ipv4 edit_rule dmz_wan outbound command to
specify the row to be edited (for row information, see the output of the
show security firewall
ipv4 setup dmz_wan
command), you enter the security-config
[firewall-ipv4-dmz-wan-outbound] mode. You can then edit one keyword and associated
parameter or associated keyword at a time in the order that you prefer. However, note that
the setting of the action keyword determines which other keywords and parameters you
can apply to a rule.
Step 1 Format security firewall ipv4 edit_rule dmz_wan outbound <row id>
Mode security
Step 2 Format service_name {default_services <default service name> |
{custom_services <custom service name>}
action {ALWAYS_BLOCK | ALWAYS_ALLOW |
BLOCK_BY_SCHEDULE_ELSE_ALLOW {schedule {Schedule1 |
Schedule2 | Schedule3}} | ALLOW_BY_SCHEDULE_ELSE_BLOCK
{schedule {Schedule1 | Schedule2 | Schedule3}}}
dmz_users {ANY | SINGLE_ADDRESS {dmz_user_start_ip <ipaddress>}
| ADDRESS_RANGE {dmz_user_start_ip <ipaddress>}
{dmz_user_end_ip <ipaddress>}}
wan_users {ANY | SINGLE_ADDRESS {wan_user_start_ip <ipaddress>}
| ADDRESS_RANGE {wan_user_start_ip <ipaddress>}
{wan_user_end_ip <ipaddress>}}
qos_priority {Normal-Service | Minimize-Cost |
Maximize-Reliability | Maximize-Throughput | Minimize-Delay}
log {NEVER | ALWAY
S}
nat_ip type {WAN_INTERFACE_ADDRESS | SINGLE_ADDRESS
{address <ipaddress>}}
Mode security-config [firewall-ipv4-dmz-wan-outbound]