Manage The Network Database - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
These are some advantages of the network database:
Generally, you do not need to enter an IP address or a MAC address. Instead, you can
just select the name of the desired PC or device.
There is no need to reserve an IP address for a PC in the DHCP server. All IP address
assignments made by the DHCP server are maintained until the PC or device is removed
from the network database, either by expiration (inactive for a long time) or by you.
There is no need to use a fixed IP address on a PC. Because the IP address allocated by
the DHCP server never changes, you do not need to assign a fixed IP address to a PC to
ensure that it always has the same IP address.
A PC is identified by its MAC address—not its IP address. The network database uses
the MAC address to identify each PC or device. Therefore, changing a PC's IP address
does not affect any restrictions applied to that PC.
Control over PCs can be assigned to groups and individuals:
-
You can assign PCs to groups (see
apply restrictions (outbound rules and inbound rules) to each group (see
Block or Allow Specific Kinds of Traffic
-
You can select groups that are allowed access to applications, web categories, and
URLs that you have blocked for all other users, or the other way around, block access
to applications, web categories, and URLs that you have allowed access to for all
other users (see
-
If necessary, you can also create firewall rules to apply to a single PC (see
Source MAC Filtering
each PC, users cannot avoid these restrictions by changing their IP address.

Manage the Network Database

You can view the network database, manually add or remove database entries, and edit
database entries.
To view the network database, select Network Config > LAN Settings > LAN Groups. The
LAN Groups screen displays. (The following figure shows some examples in the Known PCs
and Devices table.)
Manage the Network Database
Set Web Access Exception Rules
on page 164). Because the MAC address is used to identify
LAN Configuration
107
on page 122).
on page 221).
on this page) and
Use Rules to
Enable

Advertisement

Table of Contents
loading

Table of Contents