2. Overview
• Termination of WAN and LAN in firewall.
• Mode of Operation.
• SAP Logon separation in Logon Screen.
• Mail Profile & Browser setting.
• Mode of Packet transfer for SAP.
• Advantages of DIA/VPN termination in Firewall.
• Security terms to be taken Care.
6. Mode of Operation
• By this Dual termination the firewall
decides utilization of DIA and VPN
which will make a better load balance.
• VPN and DIA request is separated by
firewall.
11. Mode of Packet transfer for SAP
• SAP logon request from VPN router
string hits through VPN and reaches
the destination.
• SAP Logon request from internet string
hits through DIA and reaches the
destination.
13. Advantages of terminating DIA/VPN in Firewall
•Utilization of VPN and DIA in a defined Load
balance.
•Reduces the bandwidth Occupancy.
•IP/Gateway/DNS changes not required at
user End for VPN/DIA change over.
•Separate Router device not required for VPN
which plays Cost reduction.
•By the easy switchover downtime is reduced
during failover of VPN or DIA.
14. Security terms to be taken Care
• As both the DIA and VPN are
terminated in firewall , the password of
firewall should be Changed
periodically to make better secure.
16. Overview
• IPv4 based Mac host filtering in firewall.
• User creation with MAC filter for
Selected IP node.
• Benefits of IPv4 based MAC filtering.
17. IPv4 based Mac host filtering
• MAC address filtering is a feature for IPv4
addresses that allows you to include or exclude
computers and devices based on their MAC
address.
• MAC Filtering refers to a security access control
method whereby the 48-bit address assigned to
each network card is used to determine access to
the network.
18. User creation with MAC filter for Selected IP node in Firewall Web
console Screen
19. Benefits of IPv4 based MAC filtering
• Permitted MAC address with IP is only
allowed to access our network.
• User is Provided by individual
username & Password to access web.
• Logs can be maintained for each web
access.
• Various web Policy can be mapped for
various users
• System will be in Control by IT admin.