Netgear FVX538v1 FVX538 Reference Manual - Page 103

Administrator Tips

Page 103 highlights

ProSafe VPN Firewall 200 FVX538 Reference Manual Table 4-4. Firewall Log Field Descriptions (continued) Field Source port and interface Destination Destination port and interface Description The service port number of the initiating device, and whether it originated from the LAN, WAN or DMZ. The name or IP address of the destination device or Web site. The service port number of the destination device, and whether it's on the LAN, WAN or DMZ. Administrator Tips Consider the following operational items: 1. As an option, you can enable remote management if you have to manage distant sites from a central location (see "RADIUS Server External Authentication" on page 6-10). 2. Although rules (see "Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-2) is the basic way of managing the traffic through your system, you can further refine your control with the following optional features of the VPN firewall: - Groups and hosts (see "Managing Groups and Hosts (LAN Groups)" on page 3-6) - Services (see "Services-Based Rules" on page 4-2) - Schedules (see "Setting a Schedule to Block or Allow Specific Traffic" on page 4-28) - Block sites (see "Setting Block Sites (Content Filtering)" on page 4-29) - Source MAC filtering (see "Enabling Source MAC Filtering" on page 4-31) - Port triggering (see "Port Triggering" on page 4-35) Firewall Protection and Content Filtering v1.0, March 2009 4-43

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering
4-43
v1.0, March 2009
Administrator Tips
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“RADIUS Server External Authentication” on page 6-10
).
2.
Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 4-2
) is
the basic way of managing the traffic through your system, you can further refine your control
with the following optional features of the VPN firewall:
Groups and hosts (see
“Managing Groups and Hosts (LAN Groups)” on page 3-6
)
Services (see
“Services-Based Rules” on page 4-2
)
Schedules (see
“Setting a Schedule to Block or Allow Specific Traffic” on page 4-28
)
Block sites (see
“Setting Block Sites (Content Filtering)” on page 4-29
)
Source MAC filtering (see
“Enabling Source MAC Filtering” on page 4-31
)
Port triggering (see
“Port Triggering” on page 4-35
)
Source port and
interface
The service port number of the initiating device, and whether it originated from the
LAN, WAN or DMZ.
Destination
The name or IP address of the destination device or Web site.
Destination port and
interface
The service port number of the destination device, and whether it’s on the LAN,
WAN or DMZ.
Table 4-4.
Firewall Log Field Descriptions (continued)
Field
Description