Netgear UTM5 User Manual Page 343

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 342
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Network and System Management 10-7
v1.0, January 2010
Address range. The rule is applied to a range of addresses.
Groups. The rule is applied to a group of PCs. (You can configure groups for LAN WAN
outbound rules but not for DMZ WAN outbound rules.) The Known PCs and Devices
table is an automatically-maintained list of all known PCs and network devices and is
generally referred to as the Network Database, which is described in “Managing the
Network Database” on page 4-13. PCs and network devices are entered into the Network
Database by various methods that are described in “Managing Groups and Hosts (LAN
Groups)” on page 4-12.
WAN Users. You can specify which Internet locations are covered by an inbound rule, based
on their IP address:
Any. The rule applies to all Internet IP address.
Single address. The rule applies to a single Internet IP address.
Address range. The rule is applied to a range of Internet IP addresses.
Schedule. You can configure three different schedules to specify when a rule is applied. Once
a schedule is configured, it affects all rules that use this schedule. You specify the days of the
week and time of day for each schedule. For more information, see “Setting a Schedule to
Block or Allow Specific Traffic” on page 5-41.
QoS Profile. You can define QoS profiles and then apply them to inbound rules to regulate the
priority of traffic. To define QoS profiles, see “Creating Quality of Service (QoS) Profiles” on
page 5-35.
Bandwidth Profile. You can define bandwidth profiles and then apply them to inbound rules
to limit traffic. To define bandwidth profiles, see “Creating Bandwidth Profiles” on page 5-38.
Port Triggering
Port triggering allows some applications running on a LAN network to be available to external
applications that would otherwise be partially blocked by the firewall. Using this the port
triggering feature requires that you know the port numbers used by the application. Without port
triggering, the response from the external application would be treated as a new connection request
rather than a response to a requests from the LAN network. As such, it would be handled in
accordance with the inbound port forwarding rules, and most likely would be blocked.
For the procedure on how to configure port triggering, see “Configuring Port Triggering” on
page 5-46.
Configuring the DMZ Port
The De-Militarized Zone (DMZ) is a network that, by default, has fewer firewall restrictions when
compared to the LAN. The DMZ can be used to host servers (such as a Web server, FTP server, or
Page view 342
1 2 ... 338 339 340 341 342 343 344 345 346 347 348 ... 483 484

Comments to this Manuals

No comments