P312 Broadband Security Gateway
14.3
Exempt Computers ............................................................................................................... 14-1
14.4
Customizing.......................................................................................................................... 14-2
14.5
Keywords.............................................................................................................................. 14-2
14.6
Log Records ......................................................................................................................... 14-2
ADVANCED MANAGEMENT ................................................................................................................... IV
15.1
About Filtering ..................................................................................................................... 15-1
15.1.1
15.2
Configuring a Filter Set ........................................................................................................ 15-4
15.2.1
15.2.2
Configuring a Filter Rule.................................................................................................. 15-7
15.2.3
TCP/IP Filter Rule ............................................................................................................ 15-7
15.2.4
Generic Filter Rule ......................................................................................................... 15-12
15.3
Example Filter .................................................................................................................... 15-14
15.4
Filter Types and NAT......................................................................................................... 15-17
15.5
Firewall............................................................................................................................... 15-17
15.6
15.6.1
LAN traffic ..................................................................................................................... 15-18
15.6.2
Remote Node Filters....................................................................................................... 15-18
16.1
About SNMP ........................................................................................................................ 16-1
16.2
Supported MIBs.................................................................................................................... 16-3
16.3
Configuring SNMP............................................................................................................... 16-3
16.4
SNMP Traps ......................................................................................................................... 16-4
xiv
Table Of Contents