Features That Increase Traffic - NETGEAR UTM5EW-100NAS Appliance Reference Manual

Unified threat management
Table of Contents

Advertisement

URL blocking. You can specify up to 200 URLs that are blocked by the UTM. For more
information, see
Web services blocking. You can block Web services such as instant messaging and peer-
to-peer services. For more information, see
Services" on page
Web object blocking. You can block the following Web component types: embedded
objects (ActiveX, Java, Flash), proxies, and cookies, and you can disable Java scripts. For
more information, see
Setting the size of Web files to be scanned. Scanning large Web files requires network
resources and might slow down traffic. You can specify the maximum file size that is
scanned, and if files that exceed the maximum size are skipped (which might compromise
security) or blocked. For more information, see
page
6-21.
For these features (with the exception of Web object blocking and setting the size of files to be
scanned), you can set schedules to specify when Web content is filtered (see
Web Content Filtering" on page
Access Exception Rules" on page
Source MAC Filtering
If you want to reduce outgoing traffic by preventing Internet access by certain PCs on the LAN,
you can use the source MAC filtering feature to drop the traffic received from the PCs with the
specified MAC addresses. By default, this feature is disabled; all traffic received from PCs with
any MAC address is allowed. See
procedure on how to use this feature.

Features That Increase Traffic

The following features of the UTM tend to increase the traffic load on the WAN-side:
LAN WAN inbound rules (also referred to as port forwarding)
DMZ WAN inbound rules (also referred to as port forwarding)
Port triggering
Enabling the DMZ port
Configuring Exposed hosts
Configuring VPN tunnels
Network and System Management
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
"Configuring Web URL Filtering" on page
6-19.
"Configuring Web Content Filtering" on page
6-23) and configure exceptions for groups (see
6-41).
"Enabling Source MAC Filtering" on page 5-42
v1.0, January 2010
6-30.
"Customizing Web Protocol Scan Settings and
"Configuring Web Malware Scans" on
6-23.
"Configuring
"Setting Web
for the
10-5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents