EasyManuals Logo

NETGEAR UTM9S Reference Manual

NETGEAR UTM9S
631 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #122 background imageLoading...
Page #122 background image
Firewall Protection
122
ProSecure Unified Threat Management (UTM) Appliance
Administrator Tips
Consider the following operational items:
1. As an option, you can enable remote management if you have to manage distant sites
from a central location (see Configure Authentication Domains, Groups, and Users on
page 345 and Configure Remote Management Access on page 399).
2. Although rules are the basic way of managing the traffic through your system (see Use
Rules to Block or Allow Specific Kinds of Traffic on page 122), you can further refine your
control using the following features and capabilities of the UTM:
- Groups and hosts (see Manage Groups and Hosts (LAN Groups) on page 106)
- Services (see Service-Based Rules on page 123)
- Schedules (see Set a Schedule to Block or Allow Specific Traffic on page 163)
- Allow or block sites and applications (see Set Web Access Exception Rules on
page 221)
- Source MAC filtering (see Enable Source MAC Filtering on page 164)
- Port triggering (see Configure Port Triggering on page 168)
3. Content filtering is a firewall component. The UTM provides such extensive content-filtering
options that an entire chapter is dedicated to this subject; see Chapter 6, Content Filtering
and Optimizing Scans.
4. Some firewall settings might affect the performance of the UTM. For more information, see
Performance Management on page 389.
5. You can monitor blocked content and malware threats in real time. For more information,
see Monitor Real-Time Traffic, Security, and Statistics on page 433.
6. The firewall logs can be configured to log and then email denial of access, general attack,
and other information to a specified email address. For information about how to configure
logging and notifications, see Configure Logging, Alerts, and Event Notifications on
page 422.
Use Rules to Block or Allow Specific Kinds of Traffic
Firewall rules are used to block or allow specific traffic passing through from one side to the
other. You can configure up to 800 rules on the UTM. Inbound rules (WAN to LAN) restrict
access by outsiders to private resources, selectively allowing only specific outside users to
access specific resources. Outbound rules (LAN to WAN) determine what outside resources
local users can have access to.
A firewall has two default rules, one for inbound traffic and one for outbound. The default
rules of the UTM are:
• Inbound. Block all access from outside except responses to requests from the LAN side.
• Outbound. Allow all access from the LAN side to the outside.

Table of Contents

Other manuals for NETGEAR UTM9S

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM9S and is the answer not in the manual?

NETGEAR UTM9S Specifications

General IconGeneral
BrandNETGEAR
ModelUTM9S
CategoryNetwork Hardware
LanguageEnglish

Related product manuals