Quick Reference Guide
ProSafe VPN Firewall 50 FVS338 Reference Manual
LAN Configuration 3-13
v1.0, January 2010
7. Interface. From the pull-down menu, select the physical network interface (Broadband-
Virtual, Broadband-Ethernet, Dialup, or LAN) through which this route is accessible.
8. Gateway IP Address. Enter the IP address of the gateway through which the destination host
or network can be reached. (This must be a device on the same LAN segment as the VPN
firewall.)
9. Metric. Enter the metric value that determines the priority of the route. If multiple routes to
the same destination exist, the route with the lowest metric is chosen. Usually, a setting of 2 or
3 works, but if this is a direct connection, set it to 1.
10. Click Apply to save the static route to the Static Routes table.
Static Route Example
For example, a static route is needed if:
• Your primary Internet access is through a cable modem to an ISP.
• You have an ISDN firewall on your home network for connecting to the company where you
are employed. This firewall’s address on your LAN is 192.168.1.100.
• Your company’s network is 134.177.0.0.
When you first configured your VPN firewall, two implicit static routes were created. A default
route was created with your ISP as the gateway, and a second static route was created to your local
network for all 192.168.1.x addresses. With this configuration, if you attempt to access a device on
the 134.177.0.0 network, your VPN firewall will forward your request to the ISP. The ISP
forwards your request to the company where you are employed, and the request will likely be
denied by the company’s firewall.
In this case you must define a static route, telling your VPN firewall that 134.177.0.0 should be
accessed through the ISDN firewall at 192.168.1.100.
In this example:
• The destination IP address and IP subnet mask fields specify that this static route applies to all
134.177.x.x addresses.
• The gateway IP address fields specifies that all traffic for these addresses should be forwarded
to the ISDN firewall at 192.168.1.100.
• A metric value of 1 will work since the ISDN firewall is on the LAN.
• Private is selected only as a precautionary security measure in case RIP is activated.