NETGEAR UTM5 Reference Manual page 227

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Private protocols
Social networks
Control is set for entire categories of applications (for example, to block gaming during
business hours), for individual applications (for example, to allow Skype but block some other
applications), or for a combination of both. Individual application rules take priority over
category rules. After you have allowed or blocked applications, you can easily create
exceptions for individual users and groups of users (see
Application Access
on page 234).
Application control is disabled by default. When you enable application control, you have the
option to either use a single global profile or create multiple custom profiles:
Global profile. There is a single global application control profile. All traffic between the
WAN and LAN is scanned according to the settings in the global profile. The global profile
functions as a standalone control engine; you do not assign the global profile to a firewall
rule.
Custom profiles. There are no default custom application control profiles; you need to
create custom profiles. A custom application control profile takes effect only after it has
been assigned to a firewall rule and the firewall rule has been enabled. Traffic that
matches the firewall rule is scanned according to the settings in the custom profile.
For any profile, you can configure which categories of applications and individual applications
are allowed and blocked, and you can even differentiate between application login and
application connection. Traffic that does not match a profile is not scanned.
After you have configured a custom application control profile, you can assign it to firewall
rules on the following screens:
Add LAN WAN Outbound Services screen (see
Add LAN WAN Inbound Services screen (see
Add DMZ WAN Outbound Services screen (see
Add DMZ WAN Inbound Services screen (see
Content Filtering and Optimizing Scans
227
Set Exception Rules for Web and
Figure 66
on page 132).
Figure 67
on page 133).
Figure 69
on page 135).
Figure 70
on page 136).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents