NETGEAR FVS318N Reference Manual page 110

Prosafe wireless-n 8-port gigabit vpn firewall
Hide thumbs Also See for FVS318N:
Table of Contents

Advertisement

ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
The following table describes the fields that define the rules for outbound traffic and that are
common to most Outbound Service screens (see
page 121, and
Figure 61
The steps to configure outbound rules are described in the following sections:
Set LAN WAN Rules
Create DMZ WAN Rules
Create LAN DMZ Rules
Table 27. Outbound rules overview
Setting
Description
Service
The service or application to be covered by this rule. If the service or application does not
display in the list, you need to define it using the Services screen (see
Services
Action
The action for outgoing connections covered by this rule:
• BLOCK always
• BLOCK by schedule, otherwise allow
• ALLOW always
• ALLOW by schedule, otherwise block
Note:
default rule.
Note:
is, you wish to allow a subset of traffic that is currently blocked by another rule.
Select Schedule
The time schedule (that is, Schedule1, Schedule2, or Schedule3) that is used by this rule.
• This drop-down list is activated only when BLOCK by schedule, otherwise allow or
ALLOW by schedule, otherwise block is selected as the action.
• Use the Schedule screen to configure the time schedules (see
or Allow Specific Traffic
LAN Users
The settings that determine which computers on your network are affected by this rule.
The options are:
• Any. All PCs and devices on your LAN.
• Single address. Enter the required address in the Start field to apply the rule to a
single device on your LAN.
• Address range. Enter the required addresses in the Start and Finish fields to apply the
rule to a range of devices.
• Group. Select the LAN group to which the rule applies. Use the LAN Groups screen to
assign PCs to groups (see
WAN Users
The settings that determine which Internet locations are covered by the rule, based on
their IP address. The options are:
• Any. All Internet IP address are covered by this rule.
• Single address. Enter the required address in the Start field.
• Address range. Enter the required addresses the Start and Finish fields.
on page 124).
on page 136).
Any outbound traffic that is not blocked by rules you create is allowed by the
ALLOW rules are useful only if the traffic is already covered by a BLOCK rule. That
on page 146).
Manage the Network Database
IPv4 Firewall Protection
110
Figure 55
on page 118,
on page 60).
Figure 58
on
Add Customized
Set a Schedule to Block

Advertisement

Table of Contents
loading

Table of Contents