Netgear SRXN3205 SRXN3205 Reference Manual - Page 94

Enabling Source MAC Filtering (Address Filter), Trusted Domains, Apply, Blocked MAC Addresses

Page 94 highlights

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual The Trusted Domain will appear in the Trusted Domains table. You can also edit any entry by clicking Edit in the Action column adjacent to the entry. 8. Click Apply to save your settings. Enabling Source MAC Filtering (Address Filter) In the Address Filter submenu, the Source MAC Filter tab allows you to block traffic coming from certain known machines or devices. • By default, the source MAC address filter is disabled. Traffic received from any MAC address is allowed. • When source MAC address filtering is enabled, traffic will be dropped from any computers or devices whose MAC addresses are listed in the Blocked MAC Addresses table. Note: For additional ways of restricting outbound traffic, see "Outbound Rules (Service Blocking)" on page 5-3 To enable MAC filtering and add MAC addresses for blocking: 1. Select Security > Address Filter from the main/submenu. The Source MAC Filter screen displays. 2. Click the Yes radio button to enable Source MAC Filtering. 3. Select the desired Policy for MAC Addresses listed below. Block and Permit the rest, or Permit and Block the rest. Figure 5-11 5-20 Firewall Security and Content Filtering v1.0, October 2008

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218

ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
5-20
Firewall Security and Content Filtering
v1.0, October 2008
The Trusted Domain will appear in the
Trusted Domains
table. You can also edit any entry by
clicking
Edit
in the Action column adjacent to the entry.
8.
Click
Apply
to save your settings.
Enabling Source MAC Filtering (Address Filter)
In the Address Filter submenu, the Source MAC Filter tab allows you to block traffic coming from
certain known machines or devices.
By default, the source MAC address filter is disabled. Traffic received from any MAC address
is allowed.
When source MAC address filtering is enabled, traffic will be dropped from any computers or
devices whose MAC addresses are listed in the
Blocked MAC Addresses
table.
To enable MAC filtering and add MAC addresses for blocking:
1.
Select
Security > Address Filter
from the main/submenu.
The Source MAC Filter screen displays.
2.
Click the
Yes
radio button to enable Source MAC Filtering.
3.
Select the desired Policy for MAC Addresses listed below.
Block and Permit the rest, or Permit and Block the rest.
Note:
For additional ways of restricting outbound traffic, see
“Outbound Rules
(Service Blocking)” on page 5-3
Figure 5-11