Netgear FVS336G-100NAS Reference Manual - Page 87

E-Mail Notifications of Event Logs and Alerts, Administrator Tips, Incoming Response Port Range

Page 87 highlights

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual 4. From the Protocol pull-down menu, choose either TCP or UDP transport protocol. 5. In the Outgoing (Trigger) Port Range fields: a. Enter the Start Port range (1 - 65534). b. Enter the End Port range (1 - 65534). 6. In the Incoming (Response) Port Range fields: a. Enter the Start Port range (1 - 65534). b. Enter the End Port range (1 - 65534). 7. Click Add. The port triggering rule will be added to the Port Triggering Rules table. To check the status of the port triggering rules, click the Status option arrow to the right of the tab on the Port Triggering screen. E-Mail Notifications of Event Logs and Alerts The Firewall Logs can be configured to log and then e-mail denial of access, general attack information, and other information to a specified e-mail address. For example, your VPN firewall will log security-related events such as: accepted and dropped packets on different segments of your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and other general information based on the settings you input on the Firewall Logs & E-mail menu. In addition, if you have set up Content Filtering on the Block Sites screen (see "Setting Block Sites (Content Filtering)" on page 4-19), a log will be generated when someone on your network tries to access a blocked site. To configure e-mail or syslog notification, or to view the logs, see "Activating Notification of Events and Alerts" on page 9-4. Administrator Tips Consider the following operational items: 1. As an option, you can enable remote management if you have to manage distant sites from a central location (see "Enabling Remote Management Access" on page 8-10). 2. Although rules (see "Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-2) are the basic way of managing the traffic through your system, you can further refine your control with the following optional features of the VPN firewall: Firewall Protection and Content Filtering v1.0, October 2007 4-25

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Firewall Protection and Content Filtering
4-25
v1.0, October 2007
4.
From the
Protocol
pull-down menu, choose either TCP or UDP transport protocol.
5.
In the
Outgoing (Trigger) Port Range
fields:
a.
Enter the
Start Port
range (1 - 65534).
b.
Enter the
End Port
range (1 - 65534).
6.
In the
Incoming (Response) Port Range
fields:
a.
Enter the
Start Port
range (1 - 65534).
b.
Enter the
End Port
range (1 - 65534).
7.
Click
Add.
The port triggering rule will be added to the
Port Triggering Rules
table.
To check the status of the port triggering rules, click the
Status
option arrow to the right of the tab
on the
Port Triggering
screen.
E-Mail Notifications of Event Logs and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings you input on the
Firewall Logs & E-mail
menu. In
addition, if you have set up Content Filtering on the Block Sites screen (see
“Setting Block Sites
(Content Filtering)” on page 4-19
), a log will be generated when someone on your network tries to
access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see
“Activating Notification of
Events and Alerts” on page 9-4
.
Administrator Tips
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Enabling Remote Management Access” on page 8-10
).
2.
Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 4-2
)
are the basic way of managing the traffic through your system, you can further refine your
control with the following optional features of the VPN firewall: