NETGEAR ProSafe FVS124G User Manual

Page 137

Advertising
background image

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports

Router and Network Management

8-3

202-10085-01, March 2005

Address range: The rule is applied to a range of Internet IP addresses.

Services—You can specify the desired Services or applications to be covered by this rule. If
the desired service or application does not appear in the list, you must define it using the
Services menu (see

“Services” on page 8-3

).

Schedule—You can specify whether the rule is to be applied on the Schedule 1, Schedule 2, or
Schedule 3 time schedule (see

“Schedule” on page 8-3

).

See

“Using Rules to Block or Allow Specific Kinds of Traffic” on page 6-1

for the procedure on

how to use this feature.

Services

The Rules menu contains a list of predefined Services for creating firewall rules. If a service does
not appear in the predefined Services list, you can define the service. The new service will then
appear in the Rules menu's Services list.

See

“Services-Based Rules” on page 6-4

for the procedure on how to use this feature.

Groups and Hosts

You can apply these rules selectively to groups of PCs to reduce the outbound or inbound traffic.
The Network Database is an automatically-maintained list of all known PCs and network devices.
PCs and devices become known by the following methods:

DHCP Client Request—By default, the DHCP server in this Router is enabled, and will accept
and respond to DHCP client requests from PCs and other network devices. These requests also
generate an entry in the Network Database. Because of this, leaving the DHCP Server feature
(on the LAN screen) enabled is strongly recommended.

Scanning the Network—The local network is scanned using standard methods such as arp.
This will detect active devices which are not DHCP clients. However, sometimes the name of
the PC or device cannot be accurately determined, and will be shown as Unknown.

See

“Managing Groups and Hosts” on page 6-20

for the procedure on how to use this feature.

Schedule

If you have set firewall rules on the Rules screen, you can configure three different schedules (i.e.,
schedule 1, schedule 2, and schedule 3) for when a rule is to be applied. Once a schedule is
configured, it affects all Rules that use this schedule. You specify the days of the week and time of
day for each schedule.

Advertising