ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
7. Click Add. The port triggering rule will be added to the Port Triggering Rules table.
To check the status of the port triggering rules, click the Status option arrow to the right of the tab
on the Port Triggering screen. The following data is displayed:
•
Rule – The name of the port triggering rule.
•
LAN IP Address – The IP address of the PC currently using this rule.
•
Open Ports – The incoming ports associated with this rule. Incoming traffic using these ports
will be sent to the LAN IP address above.
•
Time Remaining – The time remaining before this rule is released, and thus available for other
PCs. The timer is reset whenever incoming or outgoing traffic is received.
E-Mail Notifications of Event Logs and Alerts
The firewall logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings that you enter on the Firewall Logs & E-mail
screen. In addition, if you have set up content filtering on the Block Sites screen (see
Internet Sites (Content Filtering)" on page
network tries to access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see
Events and Alerts" on page
Administrator Tips
Consider the following operational items:
•
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
•
Although rules (see
are the basic way of managing the traffic through your system, you can further refine your
control with the following optional features of the VPN firewall:
–
Groups and hosts (see
–
Services (see
Firewall Protection and Content Filtering
4-25), a log will be generated when someone on your
9-4.
"Enabling Remote Management Access" on page
"Using Rules to Block or Allow Specific Kinds of Traffic" on page
"Managing Groups and Hosts (LAN Groups)" on page
"About Services-Based Rules" on page
v1.0, January 2010
"Activating Notification of
8-10).
4-3)
"Blocking
4-2)
3-6)
4-33