Netgear FVS124G FVS124G Reference Manual - Page 111

Administrator Information, Using Rules to Block or Allow Specific Kinds of Traffic

Page 111 highlights

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports Table 6-7. Log entry descriptions Field Description Source port and interface The service port number of the initiating device, and whether it originated from the LAN or WAN Destination The name or IP address of the destination device or website. Destination port and The service port number of the destination device, and whether it's on the interface LAN or WAN. Table 6-8. Field Refresh Clear Log Send Log Log action buttons Description Click this button to refresh the log screen. Click this button to clear the log entries. Click this button to email the log immediately. Administrator Information Consider the following operational items: 1. As an option, you can enable remote management if you have to manage distant sites from a central location (see "Enabling Remote Management Access" on page 8-9). 2. Although rules (see "Using Rules to Block or Allow Specific Kinds of Traffic" on page 6-1) is the basic way of managing the traffic through your system, you can further refine your control with the following optional features of the FVS124G VPN Firewall: - Groups and hosts (see "Managing Groups and Hosts" on page 6-20) - Services (see "Services-Based Rules" on page 6-4) - Schedules (see "Using a Schedule to Block or Allow Specific Traffic" on page 6-22) - Block sites (see "Block Sites" on page 6-24) - Source MAC filtering (see "Source MAC Filtering" on page 6-27) - Port triggering (see "Port Triggering" on page 6-28) Firewall Protection and Content Filtering 202-10085-01, March 2005 6-35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
Firewall Protection and Content Filtering
6-35
202-10085-01, March 2005
Administrator Information
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Enabling Remote Management Access” on page 8-9
).
2.
Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 6-1
) is
the basic way of managing the traffic through your system, you can further refine your control
with the following optional features of the FVS124G VPN Firewall:
Groups and hosts (see
“Managing Groups and Hosts” on page 6-20
)
Services (see
“Services-Based Rules” on page 6-4
)
Schedules (see
“Using a Schedule to Block or Allow Specific Traffic” on page 6-22
)
Block sites (see
“Block Sites” on page 6-24
)
Source MAC filtering (see
“Source MAC Filtering” on page 6-27
)
Port triggering (see
“Port Triggering” on page 6-28
)
Source port and
interface
The service port number of the initiating device, and whether it originated
from the LAN or WAN
Destination
The name or IP address of the destination device or website.
Destination port and
interface
The service port number of the destination device, and whether it’s on the
LAN or WAN.
Table 6-8.
Log action buttons
Field
Description
Refresh
Click this button to refresh the log screen.
Clear Log
Click this button to clear the log entries.
Send Log
Click this button to email the log immediately.
Table 6-7.
Log entry descriptions
Field
Description