Administrator Tips; Use Rules To Block Or Allow Specific Kinds Of Traffic - NETGEAR UTM9S Reference Manual

Prosecure unified threat management (utm) appliance
Hide thumbs Also See for UTM9S:
Table of Contents

Advertisement

Administrator Tips

Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites
from a central location (see
page 345 and
2.
Although rules are the basic way of managing the traffic through your system (see
Rules to Block or Allow Specific Kinds of Traffic
control using the following features and capabilities of the UTM:
-
Groups and hosts (see
-
Services (see
-
Schedules (see
-
Allow or block sites and applications (see
page 221)
-
Source MAC filtering (see
-
Port triggering (see
3.
Content filtering is a firewall component. The UTM provides such extensive content-filtering
options that an entire chapter is dedicated to this subject; see
and Optimizing
4.
Some firewall settings might affect the performance of the UTM. For more information, see
Performance Management
5.
You can monitor blocked content and malware threats in real time. For more information,
see
Monitor Real-Time Traffic, Security, and Statistics
6.
The firewall logs can be configured to log and then email denial of access, general attack,
and other information to a specified email address. For information about how to configure
logging and notifications, see
page 422.

Use Rules to Block or Allow Specific Kinds of Traffic

Firewall rules are used to block or allow specific traffic passing through from one side to the
other. You can configure up to 800 rules on the UTM. Inbound rules (WAN to LAN) restrict
access by outsiders to private resources, selectively allowing only specific outside users to
access specific resources. Outbound rules (LAN to WAN) determine what outside resources
local users can have access to.
A firewall has two default rules, one for inbound traffic and one for outbound. The default
rules of the UTM are:
Inbound. Block all access from outside except responses to requests from the LAN side.
Outbound. Allow all access from the LAN side to the outside.
ProSecure Unified Threat Management (UTM) Appliance
Configure Authentication Domains, Groups, and Users
Configure Remote Management Access
Manage Groups and Hosts (LAN Groups)
Service-Based Rules
Set a Schedule to Block or Allow Specific Traffic
Enable Source MAC Filtering
Configure Port Triggering
Scans.
on page 389.
Configure Logging, Alerts, and Event Notifications
Firewall Protection
on page 399).
on page 122), you can further refine your
on page 123)
Set Web Access Exception Rules
on page 164)
on page 168)
Chapter 6, Content Filtering
on page 433.
122
on
Use
on page 106)
on page 163)
on
on

Advertisement

Table of Contents
loading

Table of Contents