Netgear FVS338 FVS338 Reference Manual - Page 92

Administrator Information

Page 92 highlights

FVS338 ProSafe VPN Firewall 50 Reference Manual Table 4-3. Log Entry Descriptions Field Date and Time Description or Action Source IP Source port and interface Destination Destination port and interface Description The date and time the log entry was recorded. The type of event and what action was taken if any. The IP address of the initiating device for this log entry. The service port number of the initiating device, and whether it originated from the LAN, WAN or DMZ. The name or IP address of the destination device or Web site. The service port number of the destination device, and whether it's on the LAN, WAN or DMZ. Administrator Information Consider the following operational items: 1. As an option, you can enable remote management if you have to manage distant sites from a central location (see "Enabling Remote Management Access" on page 6-9). 2. Although setting firewall rules (see "Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-1) is the basic way of managing the traffic through your system, you can further refine your control with the following features of the VPN firewall: - Groups and hosts (see "Managing Groups and Hosts" on page 3-6) - Services (see "Services-Based Rules" on page 4-2) - Schedules (see "Setting a Schedule to Block or Allow Traffic" on page 4-21) - Block sites (see "Setting Block Sites (Content Filtering)" on page 4-22) - Source MAC filtering (see "Enabling Source MAC Filtering" on page 4-24) - Port triggering (see "Setting Up Port Triggering" on page 4-28) 4-36 Firewall Protection and Content Filtering v1.0, March 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198

FVS338 ProSafe VPN Firewall 50 Reference Manual
4-36
Firewall Protection and Content Filtering
v1.0, March 2008
Administrator Information
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Enabling Remote Management Access” on page 6-9
).
2.
Although setting firewall rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic”
on page 4-1
) is the basic way of managing the traffic through your system, you can further
refine your control with the following features of the VPN firewall:
Groups and hosts (see
“Managing Groups and Hosts” on page 3-6
)
Services (see
“Services-Based Rules” on page 4-2
)
Schedules (see
“Setting a Schedule to Block or Allow Traffic” on page 4-21
)
Block sites (see
“Setting Block Sites (Content Filtering)” on page 4-22
)
Source MAC filtering (see
“Enabling Source MAC Filtering” on page 4-24
)
Port triggering (see
“Setting Up Port Triggering” on page 4-28
)
Table 4-3.
Log Entry Descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Description or Action
The type of event and what action was taken if any.
Source IP
The IP address of the initiating device for this log entry.
Source port and
interface
The service port number of the initiating device, and whether it originated from the
LAN, WAN or DMZ.
Destination
The name or IP address of the destination device or Web site.
Destination port and
interface
The service port number of the destination device, and whether it’s on the LAN,
WAN or DMZ.