Netgear DG834G DG834Gv4 Reference Manual - Page 43

Instant Messaging (IM) Ports, Delete, Close IM Ports

Page 43 highlights

ADSL2+ Modem Wireless Router DG834G Reference Manual You can define additional rules that will specify exceptions to the default rules. By adding custom rules, you can block or allow access based on the service or application, source or destination IP addresses, and time of day. You can also choose to log traffic that matches or does not match the rule you have defined. You can change the order of precedence of rules so that the rule that applies most often will take effect first. See "Order of Precedence for Rules" for more details. To view or change firewall rules, select Firewall Rules on the main menu. Figure 3-4 • To edit an existing rule, select its button on the left side of the table and click Edit. • To delete an existing rule, select its button on the left side of the table and click Delete. • To move a rule to a different position in the table, select its button, and then click Move. At the prompt, enter the number of the desired new position, and then click OK. Instant Messaging (IM) Ports In addition to the handling of rules for inbound and outbound services, the Firewall Rules screen provides options for the handling of instant messaging (IM) ports. By default, IM ports are open. If you select the Close IM Ports option, instant messaging will be effectively disabled on your local area network. Protecting Your Network 3-5 v2.0, September 2007

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

ADSL2+ Modem Wireless Router DG834G Reference Manual
Protecting Your Network
3-5
v2.0, September 2007
You can define additional rules that will specify exceptions to the default rules. By adding custom
rules, you can block or allow access based on the service or application, source or destination IP
addresses, and time of day. You can also choose to log traffic that matches or does not match the
rule you have defined.
You can change the order of precedence of rules so that the rule that applies most often will take
effect first. See
“Order of Precedence for Rules”
for more details.
To view or change firewall rules, select Firewall Rules on the main menu.
To edit an existing rule, select its button on the left side of the table and click
Edit
.
To delete an existing rule, select its button on the left side of the table and click
Delete
.
To move a rule to a different position in the table, select its button, and then click
Move
. At the
prompt, enter the number of the desired new position, and then click
OK
.
Instant Messaging (IM) Ports
In addition to the handling of rules for inbound and outbound services, the Firewall Rules screen
provides options for the handling of instant messaging (IM) ports. By default, IM ports are open. If
you select the
Close IM Ports
option, instant messaging will be effectively disabled on your local
area network.
Figure 3-4