NETGEAR UTM5EW-100NAS Appliance Reference Manual page 339

Unified threat management
Table of Contents

Advertisement

ALLOW by schedule, otherwise block
The section below summarizes the various criteria that you can apply to outbound rules in order to
reduce traffic. For more information about outbound rules, see
Blocking)" on page
5-4. For detailed procedures on how to configure outbound rules, see
LAN WAN Rules" on page 5-12
When you define outbound firewall rules, you can further refine their application according to the
following criteria:
Services. You can specify the services or applications to be covered by an outbound rule. If the
desired service or application does not appear in the list, you must define it using the Services
screen (see
"Services-Based Rules" on page 5-3
page
5-32).
LAN Users. You can specify which computers on your network are affected by an outbound
rule. There are several options:
Any. All PCs and devices on your LAN.
Single address. The rule is applied to the address of a particular PC.
Address range. The rule is applied to a range of addresses.
Groups. The rule is applied to a group of PCs. (You can configure groups for LAN WAN
outbound rules but not for DMZ WAN outbound rules.) The Known PCs and Devices
table is an automatically-maintained list of all known PCs and network devices and is
generally referred to as the Network Database, which is described in
Network Database" on page
Database by various methods that are described in
Groups)" on page
WAN Users. You can specify which Internet locations are covered by an outbound rule, based
on their IP address:
Any. The rule applies to all Internet IP address.
Single address. The rule applies to a single Internet IP address.
Address range. The rule is applied to a range of Internet IP addresses.
Schedule. You can configure three different schedules to specify when a rule is applied. Once
a schedule is configured, it affects all rules that use this schedule. You specify the days of the
week and time of day for each schedule. For more information, see
Block or Allow Specific Traffic" on page
Network and System Management
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
and
"Setting DMZ WAN Rules" on page
4-13. PCs and network devices are entered into the Network
4-12.
v1.0, January 2010
"Outbound Rules (Service
and
"Adding Customized Services" on
"Managing Groups and Hosts (LAN
5-41.
"Setting
5-15.
"Managing the
"Setting a Schedule to
10-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents