NETGEAR UTM5EW-100NAS Appliance Reference Manual page 77

Unified threat management
Table of Contents

Advertisement

Figure 3-9
a.
Figure 3-9
shows one example in the Protocol Binding table. Configure the protocol
binding settings as explained in
Table 3-6. Protocol Binding Settings (Dual-WAN Port Models Only)
Setting
Add Protocol Binding
Service
Source Network
Manually Configuring Internet and WAN Settings
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Table
Description (or Subfield and Description)
From the pull-down menu, select a service or application to be covered by this
rule. If the service or application does not appear in the list, you must define it
using the Services menu (see
The source network settings determine which computers on your network are
affected by this rule. Select one of the following options from the pull-down
menu:
Any
All devices on your LAN.
Single address
In the Start Address field, enter the IP address to which the
rule is applied.
Address range
In the Start Address field and End Address field, enter the
IP addresses for the range to which the rule is applied.
v1.0, January 2010
3-6.
"Services-Based Rules" on page
5-3).
3-15

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents