Netgear PROSAFE FVS338 User Manual Page 49

  • Download
  • Add to my manuals
  • Print
  • Page
    / 178
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 48
FVS338 ProSafe VPN Firewall 50 Reference Manual
LAN Configuration 3-5
v1.0, September 2006
Managing Groups and Hosts
The Known PCs and Devices table on the Groups and Hosts screen contains a list of all known
PCs and network devices, as well as hosts, that are assigned dynamic IP addresses by this router.
Collectively, these entries make up the Network Database. The Network Database is created in two
ways:
Using the DHCP Server. The routers DHCP server will accept and respond to DHCP client
requests from PCs and other network devices. Every computer that is responded to will be
added to the Network Database in the Known PCs and Devices table.
Scanning the Network. The router will scan the local network periodically, using standard
methods such as ARP and NetBIOS, to detect active computers or devices which are not
DHCP clients. For computers that do not support the NetBIOS protocol, the name will be
displayed in the known PCs and Devices table as “Unknown”.
Creating the Network Database
The Network Database offers a number of advantages:
Generally, you do not need to enter either IP address or MAC addresses. Instead, you can just
select the desired PC or device.
No need to reserve an IP address for a PC in the DHCP Server. All IP address assignments
made by the DHCP Server will be maintained until the PC or device is removed from the
database, either by expiry (inactive for a long time) or by you.
No need to use a Fixed IP on PCs. Because the address allocated by the DHCP Server will
never change, you don't need to assign a fixed IP to a PC to ensure it always has the same IP
address.
MAC-level Control over PCs. The Network Database uses the MAC address to identify each
PC or device. So changing a PC's IP address does not affect any restrictions on that PC.
Group and Individual Control over PCs
You can assign PCs to Groups and apply restrictions to each Group using the Firewall
Rules screen (see “Services-Based Rules” on page 4-2).
You can also select the Groups to be covered by the Block Sites feature (see “Setting
Block Sites (Content Filtering)” on page 4-21).
If necessary, you can also create Firewall Rules to apply to a single PC (see “Enabling
Source MAC Filtering” on page 4-23). Because the MAC address is used to identify each
PC, users cannot avoid these restrictions by changing their IP address.
Page view 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 177 178

Comments to this Manuals

No comments