Specifications

Firewall Protection
143
ProSAFE Gigabit Quad WAN SSL VPN Firewall SRX5308
WAN Users The settings that determine which Internet locations are covered
by the rule, based on their IP address. The options are:
Any. All Internet IP addresses are covered by this rule.
Single address. Enter the required address in the Start
field.
Address range. Enter the required addresses in the Start
and Finish fields.
IP Group. Select the IP group to which the rule applies. Use
the IP Groups screen to assign IP addresses to groups. See
Create IP Groups on page 179.
LAN WAN rules
DMZ W
AN rules
DMZ Users
The settings that determine which DMZ computers on the DMZ
network are affected by this rule. The options are:
Any.
All computers and devices on your DMZ network.
Single address
. Enter the required address in the Start field
to apply the rule to a single computer on the DMZ network.
Address range. Enter the required addresses in the Start
and Finish fields to apply the rule to a range of DMZ
computers.
Note: For IPv4 DMZ WAN inbound rules, this field does not
apply when the WAN mode is NAT because your network
presents only one IP address to the Internet.
DMZ W
AN rules
LAN DMZ rules
QoS Profile The priority assigned to IP packets of this service. The priorities
are defined by Type of Service in the Internet Protocol Suite
standards, RFC 1349. The QoS profile determines the priority of
a service, which, in turn, determines the quality of that service for
the traffic passing through the firewall.
The VPN firewall marks the Type of Service (ToS) field as
defined in the QoS profiles that you create. For more information,
see Create Quality of Service Profiles for IPv4 Firewall Rules on
page 184.
Note: There are no default QoS profiles on the VPN firewall.
After you have created a QoS profile, it can become active only
when you apply it to a nonblocking inbound or outbound firewall
rule.
Note: QoS profiles do not apply to LAN DMZ rules.
IPv4 LAN WAN rules
IPv4 DMZ WAN rules
Log The setting that determines whether packets covered by this rule
are logged. The options are:
Always.
Always log traf
fic that matches this rule. This is
useful when you are debugging your rules.
Never. Never log traf
fic that matches this rule.
All rules
Table 34. Inbound rules overview (continued)
Setting Description Inbound Rules