Netgear FVX538 FVX538 Reference Manual - Page 108

Getting E-Mail Notifications of Event Logs and Alerts, E-Mail Logs subheading - open port

Page 108 highlights

Reference Manual for the ProSafe VPN Firewall 200 FVX538 Table 6-6. Port Triggering Item Description Port Triggering Rules • Enable - Indicates if the rule is enabled or disabled. Generally, there is no need to disable a rule unless it interferes with some other function such as Port Forwarding. • Name - The name for this rule. • Outgoing Ports - The port or port range for outgoing traffic. An outgoing connection using one of these ports will trigger this rule. • Incoming Ports - The port or port range used by the remote system when it responds to the outgoing request. A response using one of these ports will be forwarded to the PC which triggered this rule. Adding a new Rule • To add a new rule, click the Add and enter the following data on the resulting screen. • Name - enter a suitable name for this rule (e.g., the name of the application) • Enable/Disable - select the desired option. • Outgoing (Trigger) Port Range - enter the range of port numbers used by the application when it generates an outgoing request. • Incoming (Response) Port Range - enter the range of port numbers used by the remote system when it responds to the PC's request. Modifying or Deleting • Select the desired rule by clicking the radio button beside the rule. an existing Rule: • Click Edit or Delete as desired. Checking Operation and Status To see which rules are currently being used, click the Status button. The following data will be displayed: • Rule - the name of the Rule. • LAN IP Address - The IP address of the PC currently using this rule. • Open Ports - the Incoming ports which are associated the this rule. Incoming traffic using one of these ports will be sent to the IP address above. • Time Remaining - The time remaining before this rule is released, and thus available for other PCs. This timer is restarted whenever incoming or outgoing traffic is received. Getting E-Mail Notifications of Event Logs and Alerts Your router will log security-related events such as denied incoming service requests, hacker probes, and administrator logins, according to your settings on this screen. If you have set up content filtering on the Block Sites page (see "Block Sites" on page 6-24), you can also log when someone on your network tried to access a blocked site. In order to receive logs and alerts by e-mail, you must provide your e-mail information in the E-Mail Logs subheading: 6-30 Firewall Protection and Content Filtering January 2005

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242

Reference Manual for the ProSafe VPN Firewall 200 FVX538
6-30
Firewall Protection and Content Filtering
January 2005
Getting E-Mail Notifications of Event Logs and Alerts
Your router will log security-related events such as denied incoming service requests, hacker
probes, and administrator logins, according to your settings on this screen.
If you have set up content filtering on the Block Sites page (see
“Block Sites” on page 6-24
), you
can also log when someone on your network tried to access a blocked site.
In order to receive logs and alerts by e-mail, you must provide your e-mail information in the
E-Mail Logs subheading:
Table 6-6.
Port Triggering
Item
Description
Port Triggering
Rules
Enable - Indicates if the rule is enabled or disabled. Generally, there is no need to
disable a rule unless it interferes with some other function such as Port Forwarding.
Name - The name for this rule.
Outgoing Ports - The port or port range for outgoing traffic. An outgoing connection
using one of these ports will trigger this rule.
Incoming Ports - The port or port range used by the remote system when it
responds to the outgoing request. A response using one of these ports will be
forwarded to the PC which triggered this rule.
Adding a new Rule
To add a new rule, click the Add and enter the following data on the resulting
screen.
Name - enter a suitable name for this rule (e.g., the name of the application)
Enable/Disable - select the desired option.
Outgoing (Trigger) Port Range - enter the range of port numbers used by the
application when it generates an outgoing request.
Incoming (Response) Port Range - enter the range of port numbers used by the
remote system when it responds to the PC's request.
Modifying or Deleting
an existing Rule:
Select the desired rule by clicking the radio button beside the rule.
Click Edit or Delete as desired.
Checking Operation
and Status
To see which rules are currently being used, click the Status button. The following
data will be displayed:
Rule - the name of the Rule.
LAN IP Address - The IP address of the PC currently using this rule.
Open Ports - the Incoming ports which are associated the this rule. Incoming traffic
using one of these ports will be sent to the IP address above.
Time Remaining - The time remaining before this rule is released, and thus
available for other PCs. This timer is restarted whenever incoming or outgoing
traffic is received.