Netgear SRXN3205 SRXN3205 Reference Manual - Page 88

Outbound Rules Example, Enabling Session Limits, LAN WAN Outbound Rule: Blocking Instant Messenger

Page 88 highlights

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual 2. Place the new rule below all other inbound rules. Note: For security, NETGEAR strongly recommends that you avoid creating an exposed host. When a computer on your LAN is designated as the exposed host, it loses much of the protection of the firewall and is exposed to many exploits from the Internet. If compromised, the computer can be used to attack your network. Outbound Rules Example Outbound rules let you prevent users from using applications such as Instant Messenger, Real Audio, or other non-essential services. LAN WAN Outbound Rule: Blocking Instant Messenger To block Instant Messenger usage by employees during working hours, you can create an outbound rule to block that application from any internal IP address to any external address according to the schedule that you have created in the Schedule menu. You can also have the firewall log any attempt to use Instant Messenger during that blocked period. Enabling Session Limits This page allows you to specify total number sessions per user (IP) allowed across the router. Session limiting is disabled by default. When enabling session limiting you can give the maximum number of sessions per IP either in percentage of maximum sessions or absolute number of maximum sessions. If you want to give the maximum number of sessions per IP in percentage check "yes" radio button otherwise check "No" radio button. The percentage is computed on the total connection capacity of the device. "User Limit" specifies the maximum number of sessions that should be allowed via router from a single source machine (i.e. session limiting is per machine based) as percentage of total connection capacity. Note that some protocols like ftp, rstp create two sessions per connection which should be considered when configuring session limiting. The label "Total Number of Packets Dropped due to Session Limit:" shows total number of packets dropped when session limit is reached The Session TimeOut table displays the TCP, UDP and ICMP Timeout values. Default Timeout values are 1200 seconds for Tcp,180 seconds for Udp and 8 seconds for Icmp. Timeout values can also be configured with user defined values. The maximum value for timeout is 43200 seconds. 5-14 Firewall Security and Content Filtering v1.0, October 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
5-14
Firewall Security and Content Filtering
v1.0, October 2008
2.
Place the new rule
below
all other inbound rules.
Outbound Rules Example
Outbound rules let you prevent users from using applications such as Instant Messenger, Real
Audio, or other non-essential services.
LAN WAN Outbound Rule: Blocking Instant Messenger
To block Instant Messenger usage by employees during working hours, you can create an
outbound rule to block that application from any internal IP address to any external address
according to the schedule that you have created in the Schedule menu. You can also have the
firewall log any attempt to use Instant Messenger during that blocked period.
Enabling Session Limits
This page allows you to specify total number sessions per user (IP) allowed across the router.
Session limiting is disabled by default. When enabling session limiting you can give the maximum
number of sessions per IP either in percentage of maximum sessions or absolute number of
maximum sessions. If you want to give the maximum number of sessions per IP in percentage
check “yes” radio button otherwise check “No” radio button. The percentage is computed on the
total connection capacity of the device. “User Limit” specifies the maximum number of sessions
that should be allowed via router from a single source machine (i.e. session limiting is per machine
based) as percentage of total connection capacity. Note that some protocols like ftp, rstp create two
sessions per connection which should be considered when configuring session limiting. The label
“Total Number of Packets Dropped due to Session Limit:” shows total number of packets dropped
when session limit is reached
The Session TimeOut table displays the TCP, UDP and ICMP Timeout values. Default Timeout
values are 1200 seconds for Tcp,180 seconds for Udp and 8 seconds for Icmp. Timeout values can
also be configured with user defined values. The maximum value for timeout is 43200 seconds.
Note:
For security, NETGEAR strongly recommends that you avoid creating an exposed
host. When a computer on your LAN is designated as the exposed host, it loses
much of the protection of the firewall and is exposed to many exploits from the
Internet. If compromised, the computer can be used to attack your network.