E-Mail Notifications Of Event Logs And Alerts; Administrator Tips; Managing Groups And Hosts (Lan Groups) - NETGEAR FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall Reference Manual

Dual wan gigabit firewall with ssl & ipsec vpn
Hide thumbs Also See for FVS336Gv1 - ProSafe Dual WAN Gigabit Firewall:
Table of Contents

Advertisement

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
7. Click Add. The port triggering rule will be added to the Port Triggering Rules table.
To check the status of the port triggering rules, click the Status option arrow to the right of the tab
on the Port Triggering screen. The following data is displayed:
Rule – The name of the port triggering rule.
LAN IP Address – The IP address of the PC currently using this rule.
Open Ports – The incoming ports associated with this rule. Incoming traffic using these ports
will be sent to the LAN IP address above.
Time Remaining – The time remaining before this rule is released, and thus available for other
PCs. The timer is reset whenever incoming or outgoing traffic is received.

E-Mail Notifications of Event Logs and Alerts

The firewall logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings that you enter on the Firewall Logs & E-mail
screen. In addition, if you have set up content filtering on the Block Sites screen (see
Internet Sites (Content Filtering)" on page
network tries to access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see
Events and Alerts" on page

Administrator Tips

Consider the following operational items:
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
Although rules (see
are the basic way of managing the traffic through your system, you can further refine your
control with the following optional features of the VPN firewall:
Groups and hosts (see
Services (see
Firewall Protection and Content Filtering
4-25), a log will be generated when someone on your
9-4.
"Enabling Remote Management Access" on page
"Using Rules to Block or Allow Specific Kinds of Traffic" on page
"Managing Groups and Hosts (LAN Groups)" on page
"About Services-Based Rules" on page
v1.0, January 2010
"Activating Notification of
8-10).
4-3)
"Blocking
4-2)
3-6)
4-33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosafe fvs336g

Table of Contents